<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
<url>
<loc>https://threatfrontier.com/</loc>
<lastmod>2026-05-20T19:31:48.627Z</lastmod>
</url>
<url>
<loc>https://threatfrontier.com/latest</loc>
<lastmod>2026-05-20T19:31:48.627Z</lastmod>
</url>
<url>
<loc>https://threatfrontier.com/categories</loc>
<lastmod>2026-05-20T19:31:48.627Z</lastmod>
</url>
<url>
<loc>https://threatfrontier.com/tags</loc>
<lastmod>2026-05-20T19:31:48.627Z</lastmod>
</url>
<url>
<loc>https://threatfrontier.com/research</loc>
<lastmod>2026-05-20T19:31:48.627Z</lastmod>
</url>
<url>
<loc>https://threatfrontier.com/authors</loc>
<lastmod>2026-05-20T19:31:48.627Z</lastmod>
</url>
<url>
<loc>https://threatfrontier.com/about</loc>
<lastmod>2026-05-20T19:31:48.627Z</lastmod>
</url>
<url>
<loc>https://threatfrontier.com/contact</loc>
<lastmod>2026-05-20T19:31:48.627Z</lastmod>
</url>
<url>
<loc>https://threatfrontier.com/subscribe</loc>
<lastmod>2026-05-20T19:31:48.627Z</lastmod>
</url>
<url>
<loc>https://threatfrontier.com/privacy</loc>
<lastmod>2026-05-20T19:31:48.627Z</lastmod>
</url>
<url>
<loc>https://threatfrontier.com/terms</loc>
<lastmod>2026-05-20T19:31:48.627Z</lastmod>
</url>
<url>
<loc>https://threatfrontier.com/search</loc>
<lastmod>2026-05-20T19:31:48.627Z</lastmod>
</url>
<url>
<loc>https://threatfrontier.com/categories/ai-security</loc>
<lastmod>2026-05-20T19:31:48.627Z</lastmod>
</url>
<url>
<loc>https://threatfrontier.com/categories/exploits</loc>
<lastmod>2026-05-18T14:50:39.018Z</lastmod>
</url>
<url>
<loc>https://threatfrontier.com/categories/supply-chain</loc>
<lastmod>2026-05-18T15:06:36.632Z</lastmod>
</url>
<url>
<loc>https://threatfrontier.com/tags/supply-chain</loc>
<lastmod>2026-05-18T15:06:36.632Z</lastmod>
</url>
<url>
<loc>https://threatfrontier.com/tags/ai-cloud</loc>
<lastmod>2026-05-17T17:58:21.066Z</lastmod>
</url>
<url>
<loc>https://threatfrontier.com/tags/ai-coding-tools</loc>
<lastmod>2026-05-17T17:58:21.066Z</lastmod>
</url>
<url>
<loc>https://threatfrontier.com/tags/ai-gateway-security</loc>
<lastmod>2026-05-18T15:23:23.766Z</lastmod>
</url>
<url>
<loc>https://threatfrontier.com/tags/claude-code</loc>
<lastmod>2026-05-20T19:31:48.627Z</lastmod>
</url>
<url>
<loc>https://threatfrontier.com/tags/cpu-security</loc>
<lastmod>2026-05-17T17:58:21.066Z</lastmod>
</url>
<url>
<loc>https://threatfrontier.com/tags/edge-appliances</loc>
<lastmod>2026-05-17T17:58:21.066Z</lastmod>
</url>
<url>
<loc>https://threatfrontier.com/tags/enterprise-apps</loc>
<lastmod>2026-05-17T17:58:21.066Z</lastmod>
</url>
<url>
<loc>https://threatfrontier.com/tags/exploited-vulnerability</loc>
<lastmod>2026-05-18T14:50:39.018Z</lastmod>
</url>
<url>
<loc>https://threatfrontier.com/tags/linux-kernel</loc>
<lastmod>2026-05-17T17:58:21.066Z</lastmod>
</url>
<url>
<loc>https://threatfrontier.com/tags/local-ai</loc>
<lastmod>2026-05-17T17:58:21.066Z</lastmod>
</url>
<url>
<loc>https://threatfrontier.com/tags/microsoft-exchange</loc>
<lastmod>2026-05-17T17:58:21.066Z</lastmod>
</url>
<url>
<loc>https://threatfrontier.com/tags/network-security</loc>
<lastmod>2026-05-17T17:58:21.066Z</lastmod>
</url>
<url>
<loc>https://threatfrontier.com/tags/web-framework-security</loc>
<lastmod>2026-05-17T17:58:21.066Z</lastmod>
</url>
<url>
<loc>https://threatfrontier.com/tags/web-server-security</loc>
<lastmod>2026-05-17T17:58:21.066Z</lastmod>
</url>
<url>
<loc>https://threatfrontier.com/tags/zero-day</loc>
<lastmod>2026-05-18T14:39:15.661Z</lastmod>
</url>
<url>
<loc>https://threatfrontier.com/articles/how-claude-code-works-internally-cli-startup-agentic-tool-execution</loc>
<image:image>
<image:loc>https://threatfrontier.com/api/media/media-974660f1-317c-4bff-97d6-2b0a941f4639</image:loc>
</image:image>
<lastmod>2026-05-20T19:31:48.627Z</lastmod>
</url>
<url>
<loc>https://threatfrontier.com/articles/langflow-cve-2026-33017-ai-workflow-rce-api-keys</loc>
<image:image>
<image:loc>https://threatfrontier.com/api/media/media-35630fb7-e129-45e9-98ac-8dd10bb3cc64</image:loc>
</image:image>
<lastmod>2026-05-18T15:23:23.766Z</lastmod>
</url>
<url>
<loc>https://threatfrontier.com/articles/trivy-cve-2026-33634-cicd-scanner-supply-chain-secret-stealing</loc>
<image:image>
<image:loc>https://threatfrontier.com/api/media/media-460a2870-b477-4938-a9e3-014722edbaed</image:loc>
</image:image>
<lastmod>2026-05-18T15:06:36.632Z</lastmod>
</url>
<url>
<loc>https://threatfrontier.com/articles/simplehelp-three-flaw-attack-chain-ransomware-msp-gateway</loc>
<image:image>
<image:loc>https://threatfrontier.com/api/media/media-8490ab8a-723d-4ccf-8fc3-848aa3f0a84a</image:loc>
</image:image>
<lastmod>2026-05-18T14:50:39.018Z</lastmod>
</url>
<url>
<loc>https://threatfrontier.com/articles/cve-2026-41940-cpanel-auth-bypass-ransomware-wave</loc>
<image:image>
<image:loc>https://threatfrontier.com/api/media/media-c5a97323-5c88-4272-bcd9-461610e3e3a6</image:loc>
</image:image>
<lastmod>2026-05-18T14:39:15.661Z</lastmod>
</url>
<url>
<loc>https://threatfrontier.com/articles/palo-alto-zero-day-cve-2026-0300-root-access</loc>
<image:image>
<image:loc>https://threatfrontier.com/api/media/media-4e00afba-1d33-495a-8c56-cd4612c169fc</image:loc>
</image:image>
<lastmod>2026-05-18T14:06:35.060Z</lastmod>
</url>
<url>
<loc>https://threatfrontier.com/articles/best-open-weight-ai-models-128gb-apple-silicon-mac-2026-qwen3-6</loc>
<image:image>
<image:loc>https://threatfrontier.com/api/media/media-202dd0ae-9bef-473f-8a72-f0cc132ec6b1</image:loc>
</image:image>
<lastmod>2026-05-17T17:58:21.066Z</lastmod>
</url>
<url>
<loc>https://threatfrontier.com/articles/best-open-weight-ai-models-24gb-apple-silicon-mac-2026</loc>
<image:image>
<image:loc>https://threatfrontier.com/api/media/media-9481a558-59fa-4350-8b7c-f79aa34197ea</image:loc>
</image:image>
<lastmod>2026-05-17T17:58:21.066Z</lastmod>
</url>
<url>
<loc>https://threatfrontier.com/articles/claude-code-vs-openai-codex-limits-100-200-developers</loc>
<image:image>
<image:loc>https://threatfrontier.com/api/media/media-40ba85fd-4cbd-4163-8c13-16be8f01f240</image:loc>
</image:image>
<lastmod>2026-05-17T17:58:21.066Z</lastmod>
</url>
<url>
<loc>https://threatfrontier.com/articles/claude-max-100-vs-200-claude-code-usage-developers</loc>
<image:image>
<image:loc>https://threatfrontier.com/api/media/media-a85ac306-7039-4161-ae76-25346baf7a3c</image:loc>
</image:image>
<lastmod>2026-05-17T17:58:21.066Z</lastmod>
</url>
<url>
<loc>https://threatfrontier.com/articles/chatgpt-pro-100-vs-200-openai-codex-plan-developers</loc>
<image:image>
<image:loc>https://threatfrontier.com/api/media/media-95525d4c-af76-40c6-a7ff-97f88895c12b</image:loc>
</image:image>
<lastmod>2026-05-17T17:58:21.066Z</lastmod>
</url>
<url>
<loc>https://threatfrontier.com/articles/fragnesia-linux-kernel-cve-2026-46300-root-privilege-escalation</loc>
<image:image>
<image:loc>https://threatfrontier.com/api/media/media-6f488ea1-6a38-4595-b223-e0d6e783a6c4</image:loc>
</image:image>
<lastmod>2026-05-17T17:58:21.066Z</lastmod>
</url>
<url>
<loc>https://threatfrontier.com/articles/cve-2026-23870-react-server-components-dos-nextjs-app-router</loc>
<image:image>
<image:loc>https://threatfrontier.com/api/media/media-f229be98-549f-4826-b644-5bef1e923695</image:loc>
</image:image>
<lastmod>2026-05-17T17:58:21.066Z</lastmod>
</url>
<url>
<loc>https://threatfrontier.com/articles/litellm-cve-2026-42208-ai-gateway-sqli</loc>
<image:image>
<image:loc>https://threatfrontier.com/api/media/media-d8f57f6a-2c39-44c4-8e6f-18a1671b9ed6</image:loc>
</image:image>
<lastmod>2026-05-17T17:58:21.066Z</lastmod>
</url>
<url>
<loc>https://threatfrontier.com/articles/ollama-cloud-slowdown-hosted-open-model-performance</loc>
<image:image>
<image:loc>https://threatfrontier.com/api/media/media-2d39805a-a5d2-4dc6-9203-cc7c6d0b8d3d</image:loc>
</image:image>
<lastmod>2026-05-17T17:58:21.066Z</lastmod>
</url>
<url>
<loc>https://threatfrontier.com/articles/fortivoice-cve-2025-32756-zero-day-rce</loc>
<image:image>
<image:loc>https://threatfrontier.com/api/media/media-c62fde22-2eb8-4e36-8ffe-8081c7da289b</image:loc>
</image:image>
<lastmod>2026-05-17T17:58:21.066Z</lastmod>
</url>
<url>
<loc>https://threatfrontier.com/articles/intel-branch-privilege-injection-cve-2024-45332</loc>
<image:image>
<image:loc>https://threatfrontier.com/api/media/media-045cf0e9-c5f6-4d5a-be0c-122a39f457ce</image:loc>
</image:image>
<lastmod>2026-05-17T17:58:21.066Z</lastmod>
</url>
<url>
<loc>https://threatfrontier.com/articles/sap-netweaver-cve-2025-42999-chained-zero-day-attacks</loc>
<image:image>
<image:loc>https://threatfrontier.com/api/media/media-b0491377-b872-4487-a338-da8d6d3def58</image:loc>
</image:image>
<lastmod>2026-05-17T17:58:21.066Z</lastmod>
</url>
<url>
<loc>https://threatfrontier.com/articles/mini-shai-hulud-supply-chain-worm-trusted-publishing</loc>
<image:image>
<image:loc>https://threatfrontier.com/api/media/media-c496d807-552b-4554-82cd-452a4d1b6d7a</image:loc>
</image:image>
<lastmod>2026-05-17T17:58:21.066Z</lastmod>
</url>
<url>
<loc>https://threatfrontier.com/articles/nginx-rift-cve-2026-42945-rewrite-module-flaw</loc>
<image:image>
<image:loc>https://threatfrontier.com/api/media/media-b1f66933-fabb-4274-b151-401591582f1c</image:loc>
</image:image>
<lastmod>2026-05-17T17:58:21.066Z</lastmod>
</url>
<url>
<loc>https://threatfrontier.com/articles/microsoft-exchange-owa-cve-2026-42897-exploited</loc>
<image:image>
<image:loc>https://threatfrontier.com/api/media/media-c823d9a3-f261-4b9e-b39e-6a0cc5748e23</image:loc>
</image:image>
<lastmod>2026-05-17T17:58:21.066Z</lastmod>
</url>
<url>
<loc>https://threatfrontier.com/articles/cisco-patches-critical-sd-wan-zero-day-cve-2026-20182</loc>
<image:image>
<image:loc>https://threatfrontier.com/api/media/media-afd5d12f-20c2-47d0-8fdd-237b3dd40d05</image:loc>
</image:image>
<lastmod>2026-05-17T17:58:21.066Z</lastmod>
</url>
</urlset>
