<?xml version='1.0' encoding='UTF-8'?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1"><url><loc>https://codekeeper.co/comparison/le-as</loc><lastmod>2024-12-17</lastmod></url><url><loc>https://codekeeper.co/ticker/zlib-untgz-buffer-overflow-vulnerability</loc><lastmod>2026-01-12</lastmod></url><url><loc>https://codekeeper.co/nl/source-code-escrow</loc><lastmod>2025-09-23</lastmod></url><url><loc>https://codekeeper.co/ticker/sonicwall-cloud-backup-breach-exposes-user-data</loc><lastmod>2025-10-09</lastmod></url><url><loc>https://codekeeper.co/ticker/cisa-warns-openplc-scadabr-xss-vulnerability</loc><lastmod>2025-11-30</lastmod></url><url><loc>https://codekeeper.co/ticker/react2shell-vulnerability-critical-update</loc><lastmod>2025-12-06</lastmod></url><url><loc>https://codekeeper.co/ticker/chrome-extensions-attack-enterprise-platforms</loc><lastmod>2026-01-20</lastmod></url><url><loc>https://codekeeper.co/ticker/data-breach-notifications-rise-identity-protection</loc><lastmod>2026-03-04</lastmod></url><url><loc>https://codekeeper.co/ticker/tomiris-cyber-campaign-cis-ministries</loc><lastmod>2025-12-02</lastmod></url><url><loc>https://codekeeper.co/ticker/critical-docker-desktop-flaw-lets-hackers-take-full-windows-control</loc><lastmod>2025-08-26</lastmod></url><url><loc>https://codekeeper.co/ticker/asahi-ransomware-attack-data-breach</loc><lastmod>2025-11-28</lastmod></url><url><loc>https://codekeeper.co/pricing/continuity-add-ons</loc><lastmod>2026-03-10</lastmod></url><url><loc>https://codekeeper.co/pricing/continuity-escrow</loc><lastmod>2026-04-08</lastmod></url><url><loc>https://codekeeper.co/ticker/georgia-dhs-data-breach-notification</loc><lastmod>2025-10-11</lastmod></url><url><loc>https://codekeeper.co/ticker/batshadow-vampire-bot-targets-job-seekers</loc><lastmod>2025-10-09</lastmod></url><url><loc>https://codekeeper.co/video-guides/how-to-build-software-resilience</loc><lastmod>2026-04-15</lastmod></url><url><loc>https://codekeeper.co/source-code-escrow</loc><lastmod>2025-12-04</lastmod></url><url><loc>https://codekeeper.co/ticker/foster-city-ransomware-attack-emergency-declared</loc><lastmod>2026-03-21</lastmod></url><url><loc>https://codekeeper.co/ticker/malware-hides-in-ai-model-files-on-windows</loc><lastmod>2025-10-31</lastmod></url><url><loc>https://codekeeper.co/about-us/how-codekeeper-made-software-verification-more-affordable</loc><lastmod>2025-10-27</lastmod></url><url><loc>https://codekeeper.co/articles/how-i-saved-50000-on-outsourcing</loc><lastmod>2025-07-25</lastmod></url><url><loc>https://codekeeper.co/comparison/swiss-escrow</loc><lastmod>2024-12-17</lastmod></url><url><loc>https://codekeeper.co/ticker/cometjacking-ai-browser-vulnerability</loc><lastmod>2025-10-05</lastmod></url><url><loc>https://codekeeper.co/ticker/iran-linked-hack-on-stryker</loc><lastmod>2026-03-16</lastmod></url><url><loc>https://codekeeper.co/ticker/openai-axios-supply-chain-attack-north-korea</loc><lastmod>2026-04-13</lastmod></url><url><loc>https://codekeeper.co/about-us/all-in-compliance-solutions</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://codekeeper.co/ticker/jaguar-land-rover-cyber-attack-shutdown</loc><lastmod>2025-09-10</lastmod></url><url><loc>https://codekeeper.co/ticker/microsoft-warns-of-phishing-scam-during-tax-season</loc><lastmod>2026-03-23</lastmod></url><url><loc>https://codekeeper.co/ticker/google-emergency-chrome-update-zero-day-vulnerability</loc><lastmod>2025-11-18</lastmod></url><url><loc>https://codekeeper.co/ticker/cisa-orders-patch-f5-systems-hack</loc><lastmod>2025-10-16</lastmod></url><url><loc>https://codekeeper.co/integrations/gitlab-private</loc><lastmod>2026-01-14</lastmod></url><url><loc>https://codekeeper.co/ticker/signal-russia-scam-warning-phishing-attack</loc><lastmod>2026-03-11</lastmod></url><url><loc>https://codekeeper.co/ticker/royal-cornwall-nhs-trust-data-leak</loc><lastmod>2025-12-10</lastmod></url><url><loc>https://codekeeper.co/ticker/apt-exploits-citrix-cisco-zero-days</loc><lastmod>2025-11-13</lastmod></url><url><loc>https://codekeeper.co/pricing/saas-escrow</loc><lastmod>2026-04-08</lastmod></url><url><loc>https://codekeeper.co/book-legal-briefing-call</loc><lastmod>2025-08-20</lastmod></url><url><loc>https://codekeeper.co/ticker/2025-black-friday-phishing-attacks-target-shoppers-gamers</loc><lastmod>2025-11-25</lastmod></url><url><loc>https://codekeeper.co/ticker/att-settlement-claim-deadline-december-18</loc><lastmod>2025-12-08</lastmod></url><url><loc>https://codekeeper.co/ticker/aussie-fluid-power-cyberattack-anubis-ransomware</loc><lastmod>2025-10-21</lastmod></url><url><loc>https://codekeeper.co/decision-maker-briefing</loc><lastmod>2026-01-30</lastmod></url><url><loc>https://codekeeper.co/comparison/denic-digital</loc><lastmod>2024-12-17</lastmod></url><url><loc>https://codekeeper.co/ticker/ransomware-gang-phone-hijack-us-industries</loc><lastmod>2025-08-09</lastmod></url><url><loc>https://codekeeper.co/ticker/shai-hulud-worm-infects-640-npm-packages</loc><lastmod>2025-11-25</lastmod></url><url><loc>https://codekeeper.co/ticker/jaguar-land-rover-cyberattack-uk-impact</loc><lastmod>2025-10-27</lastmod></url><url><loc>https://codekeeper.co/ticker/ai-driven-cyber-threats-industrial-sector-impact</loc><lastmod>2025-10-25</lastmod></url><url><loc>https://codekeeper.co/ticker/gitlab-security-updates-critical-vulnerabilities</loc><lastmod>2025-11-28</lastmod></url><url><loc>https://codekeeper.co/ticker/cyber-attack-cripples-european-airports</loc><lastmod>2025-09-22</lastmod></url><url><loc>https://codekeeper.co/ticker/cisa-alert-chinese-cyberattacks-vmware</loc><lastmod>2025-12-05</lastmod></url><url><loc>https://codekeeper.co/ticker/jersey-warns-of-toolshell-cyberattack</loc><lastmod>2025-08-09</lastmod></url><url><loc>https://codekeeper.co/ticker/asahi-beer-shortages-after-cyber-attack</loc><lastmod>2025-10-04</lastmod></url><url><loc>https://codekeeper.co/about-us/the-codekeeper-advantage</loc><lastmod>2026-02-24</lastmod></url><url><loc>https://codekeeper.co/ticker/s-rm-uk-cyber-response-ethical-dilemmas</loc><lastmod>2025-12-30</lastmod></url><url><loc>https://codekeeper.co/ticker/europol-crackdown-black-axe-arrests-spain</loc><lastmod>2026-01-10</lastmod></url><url><loc>https://codekeeper.co/articles/how-to-protect-your-source-code-with-escrow</loc><lastmod>2025-07-24</lastmod></url><url><loc>https://codekeeper.co/articles/managing-software-escrow-release-conditions</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://codekeeper.co/articles/what-crowdstrike-exposed-about-third-party-software-risk</loc><lastmod>2026-03-17</lastmod></url><url><loc>https://codekeeper.co/ticker/stryker-cyberattack-disrupts-global-operations</loc><lastmod>2026-03-13</lastmod></url><url><loc>https://codekeeper.co/ticker/salesloft-drift-supply-chain-attack-tech-firms</loc><lastmod>2025-09-10</lastmod></url><url><loc>https://codekeeper.co/ticker/trivy-supply-chain-attack-exposes-credentials</loc><lastmod>2026-03-25</lastmod></url><url><loc>https://codekeeper.co/account-setup-briefing</loc><lastmod>2026-01-30</lastmod></url><url><loc>https://codekeeper.co/ticker/adobe-emergency-patch-zero-day-vulnerability</loc><lastmod>2026-04-13</lastmod></url><url><loc>https://codekeeper.co/ticker/axios-npm-account-hijack-malicious-versions</loc><lastmod>2026-03-31</lastmod></url><url><loc>https://codekeeper.co/ticker/warp-panda-hacks-us-firms-with-brickstorm-malware</loc><lastmod>2025-12-06</lastmod></url><url><loc>https://codekeeper.co/ticker/freedom-mobile-data-breach-2023</loc><lastmod>2025-12-27</lastmod></url><url><loc>https://codekeeper.co/ticker/iranian-hackers-stryker-corp-attack</loc><lastmod>2026-03-15</lastmod></url><url><loc>https://codekeeper.co/ticker/under-armour-data-breach-72-million-emails</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://codekeeper.co/ticker/keenadu-malware-android-firmware-attack</loc><lastmod>2026-02-18</lastmod></url><url><loc>https://codekeeper.co/ticker/ni-police-officers-data-breach-court-listings</loc><lastmod>2026-02-12</lastmod></url><url><loc>https://codekeeper.co/articles/challenges-in-modern-software-licensing</loc><lastmod>2025-07-24</lastmod></url><url><loc>https://codekeeper.co/ticker/aspire-rural-health-data-breach-2025</loc><lastmod>2025-08-26</lastmod></url><url><loc>https://codekeeper.co/ticker/apt28-exploits-office-zero-day-in-europe</loc><lastmod>2026-02-03</lastmod></url><url><loc>https://codekeeper.co/ticker/ivanti-vulnerabilities-eu-attacks</loc><lastmod>2026-02-13</lastmod></url><url><loc>https://codekeeper.co/integrations/google-cloud-platform</loc><lastmod>2025-04-17</lastmod></url><url><loc>https://codekeeper.co/articles/what-is-software-verification</loc><lastmod>2025-09-02</lastmod></url><url><loc>https://codekeeper.co/document-escrow</loc><lastmod>2025-12-04</lastmod></url><url><loc>https://codekeeper.co/hosting-environment-escrow</loc><lastmod>2025-12-04</lastmod></url><url><loc>https://codekeeper.co/articles/choosing-a-software-escrow-agent</loc><lastmod>2025-07-24</lastmod></url><url><loc>https://codekeeper.co/comparison/guardit</loc><lastmod>2024-12-17</lastmod></url><url><loc>https://codekeeper.co/ticker/filefix-phishing-campaign-facebook-scam</loc><lastmod>2025-09-17</lastmod></url><url><loc>https://codekeeper.co/technology-designs-escrow</loc><lastmod>2025-12-04</lastmod></url><url><loc>https://codekeeper.co/ticker/malware-complexity-surges-as-legacy-security-systems-fail-to-keep-pace</loc><lastmod>2025-08-09</lastmod></url><url><loc>https://codekeeper.co/ticker/iranian-hackers-target-european-infrastructure</loc><lastmod>2025-09-23</lastmod></url><url><loc>https://codekeeper.co/ticker/f5-state-sponsored-hack-big-ip-source-code-theft</loc><lastmod>2025-10-15</lastmod></url><url><loc>https://codekeeper.co/articles/elizabeth-holmes-theranos-case-why-technical-due-diligence-matters</loc><lastmod>2025-07-24</lastmod></url><url><loc>https://codekeeper.co/ticker/ex-whatsapp-security-head-sues-meta</loc><lastmod>2025-09-10</lastmod></url><url><loc>https://codekeeper.co/ticker/nike-cybersecurity-breach-worldleaks-data-threat</loc><lastmod>2026-01-24</lastmod></url><url><loc>https://codekeeper.co/ticker/emeditor-hacked-malware-steals-data</loc><lastmod>2025-12-29</lastmod></url><url><loc>https://codekeeper.co/ticker/hackers-hit-us-chemical-company-sap-security-flaw</loc><lastmod>2025-08-09</lastmod></url><url><loc>https://codekeeper.co/integrations/assembla</loc><lastmod>2025-04-17</lastmod></url><url><loc>https://codekeeper.co/ticker/adobe-acrobat-critical-vulnerability-cve-2026-34621</loc><lastmod>2026-04-14</lastmod></url><url><loc>https://codekeeper.co/articles/builderai-collapse-why-you-need-software-escrow</loc><lastmod>2025-12-30</lastmod></url><url><loc>https://codekeeper.co/ticker/sonicwall-breach-exposes-firewall-data</loc><lastmod>2025-09-17</lastmod></url><url><loc>https://codekeeper.co/ready-for-continuity</loc><lastmod>2025-12-19</lastmod></url><url><loc>https://codekeeper.co/ticker/uk-car-production-plummets-after-jlr-cyber-attack</loc><lastmod>2025-10-25</lastmod></url><url><loc>https://codekeeper.co/articles/steps-to-ensure-operational-resilience</loc><lastmod>2025-07-24</lastmod></url><url><loc>https://codekeeper.co/3rd-party-dependencies</loc><lastmod>2025-12-04</lastmod></url><url><loc>https://codekeeper.co/ticker/bridging-ot-cybersecurity-gap</loc><lastmod>2025-11-30</lastmod></url><url><loc>https://codekeeper.co/ticker/urgent-chrome-update-fixes-zero-day-vulnerabilities</loc><lastmod>2026-03-13</lastmod></url><url><loc>https://codekeeper.co/ticker/cisa-git-vulnerability-cve-2025-48384</loc><lastmod>2025-08-26</lastmod></url><url><loc>https://codekeeper.co/ticker/cybercriminals-weaponize-ai-to-launch-more-sophisticated-attacks</loc><lastmod>2025-08-20</lastmod></url><url><loc>https://codekeeper.co/ticker/model-namespace-reuse-attack-exploits</loc><lastmod>2025-09-10</lastmod></url><url><loc>https://codekeeper.co/ticker/deepload-ai-malware-steals-passwords</loc><lastmod>2026-03-31</lastmod></url><url><loc>https://codekeeper.co/ticker/chinese-hackers-hit-400-organizations-in-massive-sharepoint-attack</loc><lastmod>2025-08-09</lastmod></url><url><loc>https://codekeeper.co/articles/software-escrow-for-mergers-and-acquisitions</loc><lastmod>2025-07-24</lastmod></url><url><loc>https://codekeeper.co/ticker/citrix-netscaler-zero-day-vulnerability-exploit</loc><lastmod>2025-08-28</lastmod></url><url><loc>https://codekeeper.co/what-is-saas-escrow</loc><lastmod>2026-03-26</lastmod></url><url><loc>https://codekeeper.co/ticker/cbo-cybersecurity-breach-foreign-hackers</loc><lastmod>2025-11-07</lastmod></url><url><loc>https://codekeeper.co/ticker/uk-cyber-attacks-surge-2023</loc><lastmod>2025-10-15</lastmod></url><url><loc>https://codekeeper.co/articles/why-you-need-a-disaster-recovery-plan</loc><lastmod>2025-07-24</lastmod></url><url><loc>https://codekeeper.co/ticker/cisco-zero-day-vulnerability-email-security</loc><lastmod>2025-12-21</lastmod></url><url><loc>https://codekeeper.co/ticker/hackers-target-citrix-netscaler-cve-2026-3055</loc><lastmod>2026-03-30</lastmod></url><url><loc>https://codekeeper.co/ticker/china-demands-nvidia-ai-chip-security</loc><lastmod>2025-08-26</lastmod></url><url><loc>https://codekeeper.co/video-guides/what-is-ai-escrow</loc><lastmod>2026-04-16</lastmod></url><url><loc>https://codekeeper.co/articles/software-escrow-for-vendor-risk-management</loc><lastmod>2025-09-02</lastmod></url><url><loc>https://codekeeper.co/ticker/saudi-arabia-ordered-to-pay-satirist-pegasus-spyware-case</loc><lastmod>2026-01-29</lastmod></url><url><loc>https://codekeeper.co/ticker/microsoft-january-update-fixes-112-vulnerabilities</loc><lastmod>2026-01-14</lastmod></url><url><loc>https://codekeeper.co/ticker/cisa-warns-zero-day-exploits-cisco-devices</loc><lastmod>2025-09-26</lastmod></url><url><loc>https://codekeeper.co/es/reservar-una-demostraci%C3%B3n</loc><lastmod>2025-12-04</lastmod></url><url><loc>https://codekeeper.co/ticker/hackers-exploit-langflow-ai-flaw</loc><lastmod>2026-03-20</lastmod></url><url><loc>https://codekeeper.co/articles/codekeeper-vs-escrow-london</loc><lastmod>2025-10-01</lastmod></url><url><loc>https://codekeeper.co/ticker/cyberattack-oneflip-ai-vulnerability</loc><lastmod>2025-08-26</lastmod></url><url><loc>https://codekeeper.co/articles/software-escrow-for-healthcare-institutions</loc><lastmod>2026-02-25</lastmod></url><url><loc>https://codekeeper.co/articles/software-escrow-types</loc><lastmod>2025-07-24</lastmod></url><url><loc>https://codekeeper.co/ticker/swedish-power-grid-data-breach-investigation</loc><lastmod>2025-10-28</lastmod></url><url><loc>https://codekeeper.co/faq</loc><lastmod>2025-11-17</lastmod></url><url><loc>https://codekeeper.co/ticker/react2shell-vulnerability-exploitation</loc><lastmod>2025-12-09</lastmod></url><url><loc>https://codekeeper.co/ticker/foster-city-recovers-from-ransomware-attack</loc><lastmod>2026-03-28</lastmod></url><url><loc>https://codekeeper.co/ticker/trust-wallet-hack-shai-hulud-attack</loc><lastmod>2025-12-31</lastmod></url><url><loc>https://codekeeper.co/articles/how-saas-escrow-expands-worldwide-business-opportunities</loc><lastmod>2025-07-24</lastmod></url><url><loc>https://codekeeper.co/comparison/fge</loc><lastmod>2024-12-17</lastmod></url><url><loc>https://codekeeper.co/ticker/google-chrome-update-webview-vulnerability</loc><lastmod>2026-01-07</lastmod></url><url><loc>https://codekeeper.co/ticker/critical-freescout-vulnerability-cve-2026-28289</loc><lastmod>2026-03-05</lastmod></url><url><loc>https://codekeeper.co/ticker/transunion-data-breach-exposes-customer-info</loc><lastmod>2025-09-02</lastmod></url><url><loc>https://codekeeper.co/ticker/cisa-warns-of-fortinet-vulnerabilities-exploitation</loc><lastmod>2025-12-18</lastmod></url><url><loc>https://codekeeper.co/ticker/ransomware-attacks-on-critical-infrastructure-2025</loc><lastmod>2025-10-22</lastmod></url><url><loc>https://codekeeper.co/ticker/inquiry-demand-ico-afghan-data-breach</loc><lastmod>2025-11-25</lastmod></url><url><loc>https://codekeeper.co/articles/beginners-guide-to-iso-certification</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://codekeeper.co/ticker/elastic-defend-software-vulnerability</loc><lastmod>2025-11-10</lastmod></url><url><loc>https://codekeeper.co/articles/software-escrow-agent-role</loc><lastmod>2025-07-24</lastmod></url><url><loc>https://codekeeper.co/ticker/windows-server-vulnerability-exploit</loc><lastmod>2025-10-27</lastmod></url><url><loc>https://codekeeper.co/articles/what-is-enterprise-risk-management</loc><lastmod>2025-07-24</lastmod></url><url><loc>https://codekeeper.co/ticker/xwiki-vulnerability-cve-2025-24893-exploited</loc><lastmod>2025-11-17</lastmod></url><url><loc>https://codekeeper.co/ticker/google-looker-vulnerabilities-sql-injection-code-execution</loc><lastmod>2026-02-06</lastmod></url><url><loc>https://codekeeper.co/articles/how-sixt-minimized-cyberattack-losses</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://codekeeper.co/video-guides</loc><lastmod>2025-07-24</lastmod></url><url><loc>https://codekeeper.co/ticker/federal-agencies-consider-tp-link-ban</loc><lastmod>2025-10-31</lastmod></url><url><loc>https://codekeeper.co/ticker/guardarian-supply-chain-attack-strapi-npm</loc><lastmod>2026-04-06</lastmod></url><url><loc>https://codekeeper.co/book-technical-briefing-call</loc><lastmod>2025-08-20</lastmod></url><url><loc>https://codekeeper.co/ticker/lkq-corporation-cl0p-ransomware-breach</loc><lastmod>2025-12-17</lastmod></url><url><loc>https://codekeeper.co/about-us/how-our-software-escrow-solutions-cater-for-various-business-sizes</loc><lastmod>2025-07-10</lastmod></url><url><loc>https://codekeeper.co/ticker/s1ngularity-attack-nx-javascript-ai-exploitation</loc><lastmod>2025-09-02</lastmod></url><url><loc>https://codekeeper.co/about-us/set-up-software-escrow-with-codekeeper</loc><lastmod>2025-07-10</lastmod></url><url><loc>https://codekeeper.co/ticker/microsoft-defender-vulnerabilities-bypass-security</loc><lastmod>2025-10-12</lastmod></url><url><loc>https://codekeeper.co/ticker/ibm-sql-injection-vulnerability-watsonx-orchestrate</loc><lastmod>2025-09-02</lastmod></url><url><loc>https://codekeeper.co/ticker/bluehammer-exploit-microsoft-disclosure-issues</loc><lastmod>2026-04-10</lastmod></url><url><loc>https://codekeeper.co/integrations/projectlocker</loc><lastmod>2025-04-17</lastmod></url><url><loc>https://codekeeper.co/ticker/cisa-warns-of-critical-windchill-vulnerability</loc><lastmod>2026-03-29</lastmod></url><url><loc>https://codekeeper.co/software-custodian</loc><lastmod>2025-09-17</lastmod></url><url><loc>https://codekeeper.co/ticker/google-chrome-emergency-update-zero-day-flaw</loc><lastmod>2026-04-02</lastmod></url><url><loc>https://codekeeper.co/ticker/discord-data-breach-third-party-hack</loc><lastmod>2025-10-10</lastmod></url><url><loc>https://codekeeper.co/ticker/uk-businesses-warned-of-iranian-cyber-threat</loc><lastmod>2026-03-03</lastmod></url><url><loc>https://codekeeper.co/articles/data-escrow-for-hospital-ransomware-attacks</loc><lastmod>2025-07-24</lastmod></url><url><loc>https://codekeeper.co/ticker/bronze-butler-exploits-lanscope-vulnerability</loc><lastmod>2025-11-06</lastmod></url><url><loc>https://codekeeper.co/ticker/iran-hackers-breach-stryker-wipe-devices</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://codekeeper.co/ticker/marks-and-spencer-easter-cyber-attack-impact</loc><lastmod>2025-11-06</lastmod></url><url><loc>https://codekeeper.co/ticker/cisa-orders-federal-agencies-to-patch-papercut-flaw-under-active-attack</loc><lastmod>2025-08-09</lastmod></url><url><loc>https://codekeeper.co/articles/software-escrow-for-australian-tech-insolvencies</loc><lastmod>2025-07-24</lastmod></url><url><loc>https://codekeeper.co/comparison/escrowtech</loc><lastmod>2024-12-17</lastmod></url><url><loc>https://codekeeper.co/software-escrow</loc><lastmod>2026-03-25</lastmod></url><url><loc>https://codekeeper.co/ticker/new-interlock-ransomware-uses-fake-error-messages-to-trick-windows-users</loc><lastmod>2025-08-09</lastmod></url><url><loc>https://codekeeper.co/ticker/cybercriminal-sells-stolen-utility-data</loc><lastmod>2026-01-08</lastmod></url><url><loc>https://codekeeper.co/ticker/ericsson-data-breach-third-party-vendor-2025</loc><lastmod>2026-03-10</lastmod></url><url><loc>https://codekeeper.co/ticker/judge-overturns-us-extradition-for-diogo-coelho</loc><lastmod>2025-09-20</lastmod></url><url><loc>https://codekeeper.co/ticker/phishing-campaign-uses-uuids-to-bypass-security</loc><lastmod>2025-10-26</lastmod></url><url><loc>https://codekeeper.co/ticker/cisco-talos-exposes-uat-7290-cyber-threat</loc><lastmod>2026-01-11</lastmod></url><url><loc>https://codekeeper.co/ticker/cybercriminals-target-fortigate-vulnerabilities</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://codekeeper.co/ticker/washington-post-data-breach-clop-ransomware</loc><lastmod>2025-11-13</lastmod></url><url><loc>https://codekeeper.co/articles/software-vs-saas-escrow</loc><lastmod>2025-09-02</lastmod></url><url><loc>https://codekeeper.co/ticker/cisco-sd-wan-manager-vulnerabilities-fake-exploits</loc><lastmod>2026-04-01</lastmod></url><url><loc>https://codekeeper.co/ticker/escan-update-server-breach-malware-attack</loc><lastmod>2026-01-31</lastmod></url><url><loc>https://codekeeper.co/about-us/get-unlimited-deposits-with-your-software-escrow-agreement</loc><video:video><video:thumbnail_loc>https://codekeeper.co/hubfs/Demo%203%20-%20How%20to%20Deposit%20Your%20Assets%20to%20Software%20Escrow%20(automated).mp4/medium.jpg</video:thumbnail_loc><video:title>Demo 3 - How to Deposit Your Assets to Software Escrow (automated)</video:title><video:description>Demo 3 - How to Deposit Your Assets to Software Escrow (automated)</video:description><video:content_loc>https://codekeeper.co/hubfs/Demo%203%20-%20How%20to%20Deposit%20Your%20Assets%20to%20Software%20Escrow%20(automated).mp4</video:content_loc><video:duration>111</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><lastmod>2025-07-10</lastmod></url><url><loc>https://codekeeper.co/ticker/chinese-hackers-exploit-toolshell-vulnerability</loc><lastmod>2025-10-23</lastmod></url><url><loc>https://codekeeper.co/ticker/arctic-wolf-warns-of-cve-2025-32975-exploit</loc><lastmod>2026-03-21</lastmod></url><url><loc>https://codekeeper.co/articles/risks-of-not-investing-in-software-escrow</loc><lastmod>2025-07-24</lastmod></url><url><loc>https://codekeeper.co/escrow-agreement</loc><lastmod>2025-12-31</lastmod></url><url><loc>https://codekeeper.co/ticker/north-korean-hackers-compromise-axios-library</loc><lastmod>2026-04-01</lastmod></url><url><loc>https://codekeeper.co/de/demo-buchen</loc><lastmod>2025-12-04</lastmod></url><url><loc>https://codekeeper.co/ticker/amazon-disrupts-apt29-credential-theft</loc><lastmod>2025-09-10</lastmod></url><url><loc>https://codekeeper.co/ticker/pro-russia-hacktivists-target-us-infrastructure</loc><lastmod>2025-12-28</lastmod></url><url><loc>https://codekeeper.co/ticker/sonicwall-urges-updating-credentials-to-prevent-ransomware</loc><lastmod>2025-08-09</lastmod></url><url><loc>https://codekeeper.co/solutions/soc-2</loc><lastmod>2025-11-19</lastmod></url><url><loc>https://codekeeper.co/ticker/critical-zero-day-d-link-router-exploit</loc><lastmod>2026-01-08</lastmod></url><url><loc>https://codekeeper.co/pricing/recovery-add-ons</loc><lastmod>2026-03-11</lastmod></url><url><loc>https://codekeeper.co/ticker/samsung-september-2025-security-update-zero-day-fix</loc><lastmod>2025-09-13</lastmod></url><url><loc>https://codekeeper.co/ticker/cyber-attack-disrupts-northern-ireland-school-network</loc><lastmod>2026-04-13</lastmod></url><url><loc>https://codekeeper.co/ticker/packagegate-vulnerabilities-in-javascript-managers</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://codekeeper.co/integrations/github</loc><lastmod>2025-12-23</lastmod></url><url><loc>https://codekeeper.co/privacy-policy</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://codekeeper.co/ticker/chinese-hackers-breach-us-treasury</loc><lastmod>2025-12-09</lastmod></url><url><loc>https://codekeeper.co/ticker/google-chrome-2025-zero-day-vulnerabilities</loc><lastmod>2025-12-17</lastmod></url><url><loc>https://codekeeper.co/ticker/meta-fixes-instagram-vulnerability-data-leak-resurfaces</loc><lastmod>2026-01-12</lastmod></url><url><loc>https://codekeeper.co/ticker/cyberattack-ukraine-fake-police-emails</loc><lastmod>2025-09-30</lastmod></url><url><loc>https://codekeeper.co/what-is-a-software-escrow-agreement</loc><lastmod>2025-03-21</lastmod></url><url><loc>https://codekeeper.co/ticker/microsoft-patches-office-zero-day-vulnerability</loc><lastmod>2026-01-28</lastmod></url><url><loc>https://codekeeper.co/ticker/new-gunra-ransomware-linux-variant-with-100-thread-encryption</loc><lastmod>2025-08-09</lastmod></url><url><loc>https://codekeeper.co/ticker/gpt-5-routing-flaw-security-risk</loc><lastmod>2025-08-26</lastmod></url><url><loc>https://codekeeper.co/ticker/fake-whatsapp-api-lotusbail-steals-data</loc><lastmod>2025-12-23</lastmod></url><url><loc>https://codekeeper.co/ticker/cyberattacks-on-industrial-control-systems</loc><lastmod>2025-09-25</lastmod></url><url><loc>https://codekeeper.co/ticker/apt28-exploits-microsoft-office-vulnerability</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://codekeeper.co/comparison/national-software-escrow</loc><lastmod>2024-12-17</lastmod></url><url><loc>https://codekeeper.co/data-processing-agreement</loc><lastmod>2025-11-25</lastmod></url><url><loc>https://codekeeper.co/ticker/react-server-components-security-flaw</loc><lastmod>2025-12-03</lastmod></url><url><loc>https://codekeeper.co/ticker/air-france-and-klm-hit-by-data-breach-affecting-customer-information</loc><lastmod>2025-08-09</lastmod></url><url><loc>https://codekeeper.co/pricing/build-a-plan</loc><lastmod>2026-03-11</lastmod></url><url><loc>https://codekeeper.co/ticker/hackers-exploit-suspected-zero-day-flaw-in-sonicwall-firewalls-for-ransomware-attacks</loc><lastmod>2025-08-09</lastmod></url><url><loc>https://codekeeper.co/ticker/orleans-parish-ransomware-attack</loc><lastmod>2025-09-18</lastmod></url><url><loc>https://codekeeper.co/ticker/ai-driven-cyberattacks-threaten-us-security</loc><lastmod>2025-10-18</lastmod></url><url><loc>https://codekeeper.co/articles/the-intersection-of-software-escrow-and-cybersecurity</loc><lastmod>2025-07-24</lastmod></url><url><loc>https://codekeeper.co/ticker/cybersecurity-trained-traveler-scammed-on-vacation</loc><lastmod>2026-02-02</lastmod></url><url><loc>https://codekeeper.co/ticker/chinese-hackers-exploit-cisco-zero-day</loc><lastmod>2025-12-20</lastmod></url><url><loc>https://codekeeper.co/ticker/fake-fortinet-vpn-phishing-threat</loc><lastmod>2026-01-10</lastmod></url><url><loc>https://codekeeper.co/ticker/apache-brpc-cve-2025-59789-server-crash-fix</loc><lastmod>2025-12-01</lastmod></url><url><loc>https://codekeeper.co/ticker/google-confirms-data-breach-affecting-2.55-million-business-records</loc><lastmod>2025-08-20</lastmod></url><url><loc>https://codekeeper.co/ticker/russian-hackers-exploit-routers-for-credentials</loc><lastmod>2026-04-09</lastmod></url><url><loc>https://codekeeper.co/ticker/google-hit-by-salesforce-hack-that-targeted-multiple-major-companies</loc><lastmod>2025-08-09</lastmod></url><url><loc>https://codekeeper.co/ticker/safepay-ransomware-shuts-down-global-tech-giant-ingram-micro</loc><lastmod>2025-07-31</lastmod></url><url><loc>https://codekeeper.co/ticker/chrome-zero-day-vulnerability-update</loc><lastmod>2026-02-17</lastmod></url><url><loc>https://codekeeper.co/ticker/passiveneuron-cyber-espionage-targets-global-sectors</loc><lastmod>2025-10-22</lastmod></url><url><loc>https://codekeeper.co/ticker/substack-2025-data-breach-exposes-user-info</loc><lastmod>2026-02-06</lastmod></url><url><loc>https://codekeeper.co/comparison/continew</loc><lastmod>2024-12-18</lastmod></url><url><loc>https://codekeeper.co/ticker/moltbook-data-breach-security-nightmare</loc><lastmod>2026-02-01</lastmod></url><url><loc>https://codekeeper.co/about-us/codekeeper-v4-new-app-launch</loc><lastmod>2025-07-10</lastmod></url><url><loc>https://codekeeper.co/ticker/phishing-technique-invisible-unicode-emails</loc><lastmod>2025-10-29</lastmod></url><url><loc>https://codekeeper.co/articles/what-are-software-backups</loc><lastmod>2026-02-24</lastmod></url><url><loc>https://codekeeper.co/articles/svb-collapse-why-you-need-disaster-recovery-and-business-continuity-plans</loc><lastmod>2025-07-24</lastmod></url><url><loc>https://codekeeper.co/about-us</loc><lastmod>2026-03-20</lastmod></url><url><loc>https://codekeeper.co/ticker/microsoft-disables-hands-free-deployment-due-to-vulnerability</loc><lastmod>2026-03-16</lastmod></url><url><loc>https://codekeeper.co/trust-center</loc><lastmod>2026-02-24</lastmod></url><url><loc>https://codekeeper.co/ticker/critical-oracle-identity-manager-zero-day-vulnerability</loc><lastmod>2025-11-22</lastmod></url><url><loc>https://codekeeper.co/articles/how-to-negotiate-a-source-code-escrow-agreement</loc><lastmod>2025-07-24</lastmod></url><url><loc>https://codekeeper.co/integrations/subversion</loc><lastmod>2025-04-17</lastmod></url><url><loc>https://codekeeper.co/articles/how-a-single-microsoft-365-outage-broke-their-annual-uptime-promise</loc><lastmod>2026-04-15</lastmod></url><url><loc>https://codekeeper.co/articles</loc><lastmod>2025-07-25</lastmod></url><url><loc>https://codekeeper.co/ticker/checkoutcom-data-breach-shinyhunters-legacy-cloud</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://codekeeper.co/ticker/critical-net-snmp-vulnerability-cve-2025-68615</loc><lastmod>2025-12-25</lastmod></url><url><loc>https://codekeeper.co/ticker/libyan-navy-protocol-zero-day-zimbra-exploit</loc><lastmod>2025-10-07</lastmod></url><url><loc>https://codekeeper.co/ticker/cybercriminals-use-ai-for-evasive-malware</loc><lastmod>2025-11-27</lastmod></url><url><loc>https://codekeeper.co/comparison/innovasafe</loc><lastmod>2024-12-17</lastmod></url><url><loc>https://codekeeper.co/how-to-guarantee-software-continuity</loc><lastmod>2025-04-03</lastmod></url><url><loc>https://codekeeper.co/solutions/esma</loc><lastmod>2025-11-19</lastmod></url><url><loc>https://codekeeper.co/integrations/cloudforge</loc><lastmod>2025-04-17</lastmod></url><url><loc>https://codekeeper.co/ticker/shinyhunters-cloud-extortion-attacks</loc><lastmod>2026-02-02</lastmod></url><url><loc>https://codekeeper.co/ticker/python-malware-injects-windows-binaries</loc><lastmod>2025-11-24</lastmod></url><url><loc>https://codekeeper.co/ticker/asahi-cybersecurity-overhaul-after-ransomware-attack</loc><lastmod>2025-12-15</lastmod></url><url><loc>https://codekeeper.co/ticker/massive-nextjs-attack-react2shell-flaw</loc><lastmod>2026-04-04</lastmod></url><url><loc>https://codekeeper.co/ticker/cisco-firewalls-zero-day-vulnerability</loc><lastmod>2025-10-01</lastmod></url><url><loc>https://codekeeper.co/ticker/british-man-arrested-for-airport-cyberattack</loc><lastmod>2025-09-25</lastmod></url><url><loc>https://codekeeper.co/articles/how-much-does-software-escrow-cost</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://codekeeper.co/ticker/ontario-health-agency-hid-cyberattack-from-patients</loc><lastmod>2025-08-09</lastmod></url><url><loc>https://codekeeper.co/ticker/scattered-spider-ransomware-attack-2025</loc><lastmod>2025-08-09</lastmod></url><url><loc>https://codekeeper.co/ticker/russian-hackers-target-polish-power-grid</loc><lastmod>2026-01-30</lastmod></url><url><loc>https://codekeeper.co/ticker/china-hackers-target-us-infrastructure</loc><lastmod>2025-10-31</lastmod></url><url><loc>https://codekeeper.co/ticker/renault-uk-cyber-attack-customer-data-exposed</loc><lastmod>2025-10-20</lastmod></url><url><loc>https://codekeeper.co/ticker/mail2shell-zero-click-vulnerability-freescout</loc><lastmod>2026-03-06</lastmod></url><url><loc>https://codekeeper.co/articles/how-saas-escrow-safeguards-businesses-facing-identity-management-risks</loc><lastmod>2025-07-24</lastmod></url><url><loc>https://codekeeper.co/compliance-team-briefing</loc><lastmod>2026-01-30</lastmod></url><url><loc>https://codekeeper.co/integrations/bitbucket</loc><lastmod>2025-04-17</lastmod></url><url><loc>https://codekeeper.co/ticker/critical-windows-wsus-vulnerability-cve-2025-59287</loc><lastmod>2025-10-20</lastmod></url><url><loc>https://codekeeper.co/ticker/figure-data-breach-shinyhunters-attack</loc><lastmod>2026-02-19</lastmod></url><url><loc>https://codekeeper.co/ticker/cisco-zero-day-flaw-unified-communications</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://codekeeper.co/ticker/cybercriminals-exploit-ai-with-clickfix-attack</loc><lastmod>2025-08-26</lastmod></url><url><loc>https://codekeeper.co/verification</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://codekeeper.co/articles/source-code-escrow-for-mac-ransomware-attacks</loc><lastmod>2025-07-24</lastmod></url><url><loc>https://codekeeper.co/ticker/ai-investment-scam-fake-reality</loc><lastmod>2026-01-09</lastmod></url><url><loc>https://codekeeper.co/ticker/google-nov-2025-android-security-update</loc><lastmod>2025-11-09</lastmod></url><url><loc>https://codekeeper.co</loc><lastmod>2026-03-24</lastmod></url><url><loc>https://codekeeper.co/articles/top-software-escrow-agents</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://codekeeper.co/articles/how-saas-escrow-ensures-continuity-for-ecommerce-businesses</loc><lastmod>2025-07-24</lastmod></url><url><loc>https://codekeeper.co/ticker/darksword-iphone-exploit-targeting-ios-18</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://codekeeper.co/ticker/pennsylvania-data-breach-warning-august-2023</loc><lastmod>2025-11-17</lastmod></url><url><loc>https://codekeeper.co/integrations/git</loc><lastmod>2025-12-23</lastmod></url><url><loc>https://codekeeper.co/ticker/hacktivists-target-canadas-industrial-systems</loc><lastmod>2025-10-30</lastmod></url><url><loc>https://codekeeper.co/ticker/jaguar-land-rover-cyber-attack-crisis</loc><lastmod>2025-10-07</lastmod></url><url><loc>https://codekeeper.co/articles/why-software-escrow-matters</loc><lastmod>2025-10-01</lastmod></url><url><loc>https://codekeeper.co/ticker/windows-gdi-vulnerabilities-code-execution</loc><lastmod>2025-11-03</lastmod></url><url><loc>https://codekeeper.co/ticker/telnyx-python-package-malware-breach</loc><lastmod>2026-03-28</lastmod></url><url><loc>https://codekeeper.co/about-us/what-codekeepers-iso-27001-2022-certification-means-for-your-business</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://codekeeper.co/articles/cybersecurity-awareness-month-2025</loc><lastmod>2025-10-02</lastmod></url><url><loc>https://codekeeper.co/ticker/identity-attacks-2024-survey</loc><lastmod>2026-02-17</lastmod></url><url><loc>https://codekeeper.co/comparison</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://codekeeper.co/articles/software-escrow-release-triggers-and-processes</loc><lastmod>2025-07-24</lastmod></url><url><loc>https://codekeeper.co/ticker/iran-hackers-strike-stryker-corp</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://codekeeper.co/articles/software-escrow-for-business-continuity-planning</loc><lastmod>2025-07-24</lastmod></url><url><loc>https://codekeeper.co/articles/codekeeper-vs-escrow4all</loc><lastmod>2025-10-01</lastmod></url><url><loc>https://codekeeper.co/ticker/linux-cups-vulnerabilities-disrupt-print-authentication</loc><lastmod>2025-09-15</lastmod></url><url><loc>https://codekeeper.co/how-to-configure-a-software-escrow-agreement</loc><lastmod>2025-03-21</lastmod></url><url><loc>https://codekeeper.co/articles/software-escrow-in-mission-critical-industries</loc><lastmod>2025-07-24</lastmod></url><url><loc>https://codekeeper.co/ticker/davita-ransomware-attack-exposes-patient-data</loc><lastmod>2025-08-09</lastmod></url><url><loc>https://codekeeper.co/ticker/hackers-hijack-toptals-github-to-spread-malicious-npm-packages</loc><lastmod>2025-08-09</lastmod></url><url><loc>https://codekeeper.co/ticker/react2shell-vulnerability-exploitation-in-nextjs</loc><lastmod>2026-04-07</lastmod></url><url><loc>https://codekeeper.co/ticker/apple-patches-darksword-exploit-for-ios-18</loc><lastmod>2026-04-05</lastmod></url><url><loc>https://codekeeper.co/articles/mailchimp-data-breach-why-you-need-saas-escrow</loc><lastmod>2025-07-24</lastmod></url><url><loc>https://codekeeper.co/ticker/bouygues-telecom-cyberattack-data-breach</loc><lastmod>2025-08-09</lastmod></url><url><loc>https://codekeeper.co/articles/what-is-saas-escrow</loc><lastmod>2025-07-24</lastmod></url><url><loc>https://codekeeper.co/integrations/visual-studio</loc><lastmod>2025-04-17</lastmod></url><url><loc>https://codekeeper.co/solutions/cra</loc><lastmod>2025-11-19</lastmod></url><url><loc>https://codekeeper.co/ticker/north-korean-hackers-use-vs-code-tunneling</loc><lastmod>2026-01-23</lastmod></url><url><loc>https://codekeeper.co/ticker/att-data-breach-settlement-claim-1</loc><lastmod>2025-11-19</lastmod></url><url><loc>https://codekeeper.co/ticker/pennsylvania-ag-ransomware-attack-data-breach</loc><lastmod>2025-11-18</lastmod></url><url><loc>https://codekeeper.co/procurement-team-briefing</loc><lastmod>2026-01-30</lastmod></url><url><loc>https://codekeeper.co/ticker/nicholas-moore-supreme-court-hacking</loc><lastmod>2026-01-18</lastmod></url><url><loc>https://codekeeper.co/ticker/chinese-cybercrime-group-exploits-iis-servers</loc><lastmod>2025-10-04</lastmod></url><url><loc>https://codekeeper.co/comparison/escrow-alliance</loc><lastmod>2024-12-17</lastmod></url><url><loc>https://codekeeper.co/how-to-configure-saas-escrow</loc><lastmod>2025-03-21</lastmod></url><url><loc>https://codekeeper.co/ticker/gchq-warns-of-rising-cyber-attacks</loc><lastmod>2025-10-24</lastmod></url><url><loc>https://codekeeper.co/ticker/askul-ransomware-attack-700k-records-exposed</loc><lastmod>2025-12-16</lastmod></url><url><loc>https://codekeeper.co/articles/why-you-need-saas-escrow</loc><lastmod>2025-07-24</lastmod></url><url><loc>https://codekeeper.co/ticker/iranian-apt42-hacks-officials-with-tamecat-malware</loc><lastmod>2025-11-17</lastmod></url><url><loc>https://codekeeper.co/ticker/mta-emergency-transit-cyberattack-response</loc><lastmod>2025-09-02</lastmod></url><url><loc>https://codekeeper.co/ticker/cisco-security-breaches-zero-day-vpn-attacks</loc><lastmod>2025-12-20</lastmod></url><url><loc>https://codekeeper.co/comparison/praxis</loc><lastmod>2024-12-17</lastmod></url><url><loc>https://codekeeper.co/ticker/identity-theft-rental-platform-security-concerns</loc><lastmod>2026-02-08</lastmod></url><url><loc>https://codekeeper.co/ticker/critical-gogs-zero-day-exploit-compromises-servers</loc><lastmod>2025-12-12</lastmod></url><url><loc>https://codekeeper.co/ticker/ciro-data-breach-august-2025</loc><lastmod>2026-01-16</lastmod></url><url><loc>https://codekeeper.co/ticker/shadowleak-attack-exploits-chatgpt-email-theft</loc><lastmod>2025-09-20</lastmod></url><url><loc>https://codekeeper.co/ticker/cisa-warns-patch-zimbra-vulnerability</loc><lastmod>2026-01-25</lastmod></url><url><loc>https://codekeeper.co/ticker/cisa-warns-critical-craft-cms-vulnerability</loc><lastmod>2026-03-24</lastmod></url><url><loc>https://codekeeper.co/ticker/smartermail-security-fix-cve-2025-52691</loc><lastmod>2025-12-30</lastmod></url><url><loc>https://codekeeper.co/ticker/akira-ransomware-targets-sonicwall-vulnerability</loc><lastmod>2025-09-12</lastmod></url><url><loc>https://codekeeper.co/articles/software-escrow-for-regulated-industries</loc><lastmod>2025-07-24</lastmod></url><url><loc>https://codekeeper.co/ticker/nyc-housing-lottery-data-breach</loc><lastmod>2025-09-25</lastmod></url><url><loc>https://codekeeper.co/ticker/sitecore-zero-day-vulnerability-exposed-machine-keys</loc><lastmod>2025-09-10</lastmod></url><url><loc>https://codekeeper.co/ticker/shadow-campaign-chinese-hackers-compromise-70-organizations</loc><lastmod>2026-02-09</lastmod></url><url><loc>https://codekeeper.co/ticker/shinyhunters-breach-rockstar-games-demand-ransom</loc><lastmod>2026-04-14</lastmod></url><url><loc>https://codekeeper.co/ticker/chinese-hackers-target-notepad-plus-plus-users</loc><lastmod>2026-02-02</lastmod></url><url><loc>https://codekeeper.co/articles/software-saas-escrow-faqs</loc><lastmod>2025-07-24</lastmod></url><url><loc>https://codekeeper.co/ticker/cisa-urgent-android-zero-day-alert-cve-2025-48543</loc><lastmod>2025-09-10</lastmod></url><url><loc>https://codekeeper.co/products</loc><lastmod>2026-04-15</lastmod></url><url><loc>https://codekeeper.co/ticker/avideo-zero-click-vulnerability-cve-2026-29058</loc><lastmod>2026-03-11</lastmod></url><url><loc>https://codekeeper.co/ticker/qantas-data-leak-hackers-dark-web</loc><lastmod>2025-10-14</lastmod></url><url><loc>https://codekeeper.co/ticker/telnyx-python-sdk-supply-chain-attack</loc><lastmod>2026-03-30</lastmod></url><url><loc>https://codekeeper.co/ticker/australia-cyber-crisis-2024-ai-attacks</loc><lastmod>2025-08-26</lastmod></url><url><loc>https://codekeeper.co/articles/the-metaverse-and-ip-protection</loc><lastmod>2025-07-24</lastmod></url><url><loc>https://codekeeper.co/ready-for-recovery</loc><lastmod>2025-12-19</lastmod></url><url><loc>https://codekeeper.co/comparison/softcrow</loc><lastmod>2024-12-17</lastmod></url><url><loc>https://codekeeper.co/articles/how-ip-escrow-protects-your-intellectual-property</loc><lastmod>2025-07-24</lastmod></url><url><loc>https://codekeeper.co/ticker/hackers-use-60-malicious-npm-packages-to-map-developer-networks</loc><lastmod>2025-08-26</lastmod></url><url><loc>https://codekeeper.co/ticker/oracle-ebusiness-suite-extortion-emails</loc><lastmod>2025-10-03</lastmod></url><url><loc>https://codekeeper.co/ticker/chinese-threat-actors-target-taiwans-chip-industry</loc><lastmod>2025-07-31</lastmod></url><url><loc>https://codekeeper.co/integrations/beanstalk</loc><lastmod>2025-04-17</lastmod></url><url><loc>https://codekeeper.co/ticker/chinese-group-targets-bpo-firms-with-airstalk-malware</loc><lastmod>2025-11-03</lastmod></url><url><loc>https://codekeeper.co/ticker/ccbc-ransomware-attack-encrypts-data</loc><lastmod>2026-03-13</lastmod></url><url><loc>https://codekeeper.co/ticker/ghostaction-supply-chain-attack-hits-github</loc><lastmod>2025-12-26</lastmod></url><url><loc>https://codekeeper.co/comparison/vaultinum</loc><lastmod>2024-12-17</lastmod></url><url><loc>https://codekeeper.co/ticker/vastaamo-hack-therapy-notes-exposed</loc><lastmod>2026-01-20</lastmod></url><url><loc>https://codekeeper.co/ticker/hackers-hijack-npm-packages-phishing</loc><lastmod>2025-09-10</lastmod></url><url><loc>https://codekeeper.co/integrations/bitbucket-server</loc><lastmod>2025-04-17</lastmod></url><url><loc>https://codekeeper.co/integrations/gitlab</loc><lastmod>2025-04-17</lastmod></url><url><loc>https://codekeeper.co/ticker</loc><lastmod>2026-02-24</lastmod></url><url><loc>https://codekeeper.co/ticker/cybercriminals-abuse-oauth-device-codes-in-microsoft-365-attacks</loc><lastmod>2025-12-22</lastmod></url><url><loc>https://codekeeper.co/ticker/watchguard-patches-zero-day-vulnerability-firebox-firewalls</loc><lastmod>2025-12-22</lastmod></url><url><loc>https://codekeeper.co/ticker/auchan-customer-data-breach-august-2025</loc><lastmod>2025-08-26</lastmod></url><url><loc>https://codekeeper.co/ticker/marks-spencer-cto-josie-smith-resigns-after-cyber-attack</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://codekeeper.co/ticker/uk-cyber-attacks-security-threat-bill</loc><lastmod>2025-11-16</lastmod></url><url><loc>https://codekeeper.co/ticker/justice-department-charges-in-atm-jackpotting-scheme</loc><lastmod>2026-01-28</lastmod></url><url><loc>https://codekeeper.co/ticker/hims-hers-data-breach-sensitive-info</loc><lastmod>2026-04-11</lastmod></url><url><loc>https://codekeeper.co/ticker/microsoft-patches-111-vulnerabilities-in-2025</loc><lastmod>2025-08-26</lastmod></url><url><loc>https://codekeeper.co/ticker/troyden-lure-factory-malware-campaign</loc><lastmod>2026-03-25</lastmod></url><url><loc>https://codekeeper.co/ticker/landfall-spyware-targets-samsung-galaxy-users</loc><lastmod>2025-11-08</lastmod></url><url><loc>https://codekeeper.co/comparison/ecambria</loc><lastmod>2024-12-17</lastmod></url><url><loc>https://codekeeper.co/ticker/att-data-breach-settlement-claims</loc><lastmod>2025-08-27</lastmod></url><url><loc>https://codekeeper.co/ticker/stryker-cyberattack-causes-global-disruption</loc><lastmod>2026-03-12</lastmod></url><url><loc>https://codekeeper.co/ticker/discord-data-breach-exposes-user-info</loc><lastmod>2025-10-09</lastmod></url><url><loc>https://codekeeper.co/ticker/ransomware-payments-drop-2024</loc><lastmod>2025-12-08</lastmod></url><url><loc>https://codekeeper.co/ticker/aflac-data-breach-affects-millions</loc><lastmod>2026-01-02</lastmod></url><url><loc>https://codekeeper.co/articles/combating-source-code-threats-with-escrow-solutions</loc><lastmod>2025-07-24</lastmod></url><url><loc>https://codekeeper.co/ticker/foster-city-ransomware-attack-emergency</loc><lastmod>2026-03-25</lastmod></url><url><loc>https://codekeeper.co/ticker/blacon-high-school-ransomware-closure</loc><lastmod>2026-01-18</lastmod></url><url><loc>https://codekeeper.co/ticker/bridgestone-cyberattack-supply-chain-vulnerabilities</loc><lastmod>2025-09-10</lastmod></url><url><loc>https://codekeeper.co/ticker/cl0p-ransomware-oracle-data-breach-threat</loc><lastmod>2025-10-02</lastmod></url><url><loc>https://codekeeper.co/ticker/microsoft-emergency-patch-windows-server-flaw</loc><lastmod>2025-10-25</lastmod></url><url><loc>https://codekeeper.co/ticker/inc-ransom-attack-onsolve-codered-data-breach</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://codekeeper.co/solutions/nis2</loc><lastmod>2026-03-05</lastmod></url><url><loc>https://codekeeper.co/ticker/peabody-data-breach-june-2025</loc><lastmod>2026-02-14</lastmod></url><url><loc>https://codekeeper.co/ticker/amazon-warns-cyber-enabled-kinetic-targeting</loc><lastmod>2025-11-19</lastmod></url><url><loc>https://codekeeper.co/ticker/cyberattack-disrupts-european-airport-check-in-systems</loc><lastmod>2025-09-21</lastmod></url><url><loc>https://codekeeper.co/ticker/interlock-ransomware-exploits-cisco-firewall-vulnerability</loc><lastmod>2026-03-21</lastmod></url><url><loc>https://codekeeper.co/ticker/asahi-ransomware-attack-disrupts-operations</loc><lastmod>2025-10-29</lastmod></url><url><loc>https://codekeeper.co/ticker/google-chrome-security-update-zero-day-patch</loc><lastmod>2025-12-11</lastmod></url><url><loc>https://codekeeper.co/articles/tips-for-securing-your-development-outsourcing</loc><lastmod>2025-07-24</lastmod></url><url><loc>https://codekeeper.co/ticker/qilin-ransomware-attacks-smbs-in-key-sectors</loc><lastmod>2025-11-11</lastmod></url><url><loc>https://codekeeper.co/ticker/cisa-issues-emergency-alert-patch-sharepoint-now-as-chinese-hackers-launch-active-attacks</loc><lastmod>2025-08-09</lastmod></url><url><loc>https://codekeeper.co/pricing</loc><lastmod>2026-04-08</lastmod></url><url><loc>https://codekeeper.co/ticker/microsoft-shuts-down-redvds-cybercrime-hub</loc><lastmod>2026-01-15</lastmod></url><url><loc>https://codekeeper.co/es/dep%C3%B3sito-c%C3%B3digo-fuente</loc><lastmod>2025-09-23</lastmod></url><url><loc>https://codekeeper.co/articles/what-is-software-escrow</loc><lastmod>2026-02-24</lastmod></url><url><loc>https://codekeeper.co/ticker/salesloft-github-breach-supply-chain-attack</loc><lastmod>2025-09-10</lastmod></url><url><loc>https://codekeeper.co/ticker/fbi-cyber-attack-surveillance-breach</loc><lastmod>2026-03-07</lastmod></url><url><loc>https://codekeeper.co/ticker/state-hackers-target-defense-industry-employees</loc><lastmod>2026-02-11</lastmod></url><url><loc>https://codekeeper.co/ticker/uk-arrests-scattered-spider-hackers-for-cyberattacks</loc><lastmod>2025-09-19</lastmod></url><url><loc>https://codekeeper.co/ticker/emergency-directive-cisco-firewall-zero-day-flaws</loc><lastmod>2025-09-25</lastmod></url><url><loc>https://codekeeper.co/credentials-escrow</loc><lastmod>2025-12-04</lastmod></url><url><loc>https://codekeeper.co/ticker/cybercriminals-target-transportation-with-cargo-theft</loc><lastmod>2025-11-04</lastmod></url><url><loc>https://codekeeper.co/integrations/sharefile</loc><lastmod>2025-04-17</lastmod></url><url><loc>https://codekeeper.co/ticker/st-annes-school-ransomware-attack</loc><lastmod>2026-03-29</lastmod></url><url><loc>https://codekeeper.co/solutions/iso-22301</loc><lastmod>2025-11-25</lastmod></url><url><loc>https://codekeeper.co/ticker/beyondtrust-vulnerability-cve-2026-1731</loc><lastmod>2026-02-16</lastmod></url><url><loc>https://codekeeper.co/ticker/kensington-chelsea-council-cyber-attack-1</loc><lastmod>2026-01-25</lastmod></url><url><loc>https://codekeeper.co/saas-escrow</loc><lastmod>2026-03-25</lastmod></url><url><loc>https://codekeeper.co/integrations/azure</loc><lastmod>2025-04-17</lastmod></url><url><loc>https://codekeeper.co/deployment-assets-escrow</loc><lastmod>2025-12-04</lastmod></url><url><loc>https://codekeeper.co/ticker/mongobleed-urgent-mongodb-vulnerability</loc><lastmod>2026-01-06</lastmod></url><url><loc>https://codekeeper.co/ticker/microsoft-emergency-update-dotnet-vulnerability</loc><lastmod>2026-03-11</lastmod></url><url><loc>https://codekeeper.co/ticker/nx-javascript-system-hacked-ai-malware</loc><lastmod>2025-09-02</lastmod></url><url><loc>https://codekeeper.co/ticker/la-poste-ddos-attack-disrupts-services</loc><lastmod>2025-12-23</lastmod></url><url><loc>https://codekeeper.co/ticker/ukrainian-hacker-charged-us-infrastructure-attacks</loc><lastmod>2025-12-10</lastmod></url><url><loc>https://codekeeper.co/comparison/ses-escrow</loc><lastmod>2024-12-19</lastmod></url><url><loc>https://codekeeper.co/ticker/sonicwall-investigates-suspected-zero-day-as-hackers-bypass-mfa-on-firewalls</loc><lastmod>2025-08-09</lastmod></url><url><loc>https://codekeeper.co/ticker/urgent-cisa-warning-zero-day-chrome-vulnerability</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://codekeeper.co/articles/third-party-dependency-escrow-for-business-continuity</loc><lastmod>2025-07-24</lastmod></url><url><loc>https://codekeeper.co/articles/the-roi-of-software-escrow</loc><lastmod>2025-10-01</lastmod></url><url><loc>https://codekeeper.co/ticker/mercor-supply-chain-attack-data-breach</loc><lastmod>2026-04-02</lastmod></url><url><loc>https://codekeeper.co/ticker/mongobleed-vulnerability-cve-2025-14847</loc><lastmod>2026-01-02</lastmod></url><url><loc>https://codekeeper.co/ticker/logitech-cyberattack-cl0p-ransomware-oracle-ebs</loc><lastmod>2025-12-11</lastmod></url><url><loc>https://codekeeper.co/ticker/kering-data-breach-gucci-balenciaga</loc><lastmod>2025-09-17</lastmod></url><url><loc>https://codekeeper.co/risk-assessment</loc><lastmod>2025-11-13</lastmod></url><url><loc>https://codekeeper.co/ticker/russian-cyber-attacks-on-nato-surge</loc><lastmod>2025-10-17</lastmod></url><url><loc>https://codekeeper.co/ticker/bitcoin-seizure-cybercrime-leader-chen-zhi</loc><lastmod>2025-10-14</lastmod></url><url><loc>https://codekeeper.co/ticker/jaguar-land-rover-cyber-attack-2025</loc><lastmod>2025-10-23</lastmod></url><url><loc>https://codekeeper.co/ticker/cybersecurity-alert-polyshell-skimmer-targets-magento</loc><lastmod>2026-03-26</lastmod></url><url><loc>https://codekeeper.co/ticker/storm-1175-medusa-ransomware-global-threat</loc><lastmod>2026-04-08</lastmod></url><url><loc>https://codekeeper.co/ticker/apache-streampipes-jwt-vulnerability</loc><lastmod>2025-12-31</lastmod></url><url><loc>https://codekeeper.co/ticker/malvertising-campaign-fake-github-downloads</loc><lastmod>2025-09-14</lastmod></url><url><loc>https://codekeeper.co/continuity-escrow</loc><lastmod>2026-03-25</lastmod></url><url><loc>https://codekeeper.co/ticker/new-chaos-ransomware-gang-targets-us-organizations-novel-extortion-tactics</loc><lastmod>2025-08-09</lastmod></url><url><loc>https://codekeeper.co/articles/benefits-of-investing-in-software-escrow</loc><lastmod>2025-07-24</lastmod></url><url><loc>https://codekeeper.co/articles/understanding-software-supply-chain-resilience</loc><lastmod>2025-10-07</lastmod></url><url><loc>https://codekeeper.co/articles/cloudflare-outage-2025</loc><lastmod>2026-03-31</lastmod></url><url><loc>https://codekeeper.co/ticker/st-anthony-hospital-data-breach-february-2023</loc><lastmod>2025-11-23</lastmod></url><url><loc>https://codekeeper.co/ticker/manufacturing-ransomware-threats-skills-shortage</loc><lastmod>2025-12-09</lastmod></url><url><loc>https://codekeeper.co/ticker/cbo-hack-exposes-sensitive-data-foreign-actors-suspected</loc><lastmod>2025-11-08</lastmod></url><url><loc>https://codekeeper.co/ticker/github-strengthens-npm-security-after-supply-chain-attacks</loc><lastmod>2025-09-24</lastmod></url><url><loc>https://codekeeper.co/ticker/industrial-cyberattacks-2025-vulnerabilities</loc><lastmod>2026-01-15</lastmod></url><url><loc>https://codekeeper.co/ticker/microsoft-patches-office-vulnerability-march-2026</loc><lastmod>2026-03-12</lastmod></url><url><loc>https://codekeeper.co/ticker/att-data-breach-settlement-claim</loc><lastmod>2025-10-21</lastmod></url><url><loc>https://codekeeper.co/ticker/molly-rose-foundation-warns-global-hacking-network</loc><lastmod>2026-02-07</lastmod></url><url><loc>https://codekeeper.co/ticker/human-error-industrial-accidents-cybersecurity-breaches</loc><lastmod>2025-11-23</lastmod></url><url><loc>https://codekeeper.co/articles/different-types-of-software-escrow-agreements</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://codekeeper.co/ticker/critical-infrastructure-cyberattacks-2023-2024</loc><lastmod>2025-09-02</lastmod></url><url><loc>https://codekeeper.co/integrations/github-enterprise</loc><lastmod>2025-04-17</lastmod></url><url><loc>https://codekeeper.co/ticker/europol-cybercrime-conference-encryption-technology</loc><lastmod>2025-10-08</lastmod></url><url><loc>https://codekeeper.co/articles/software-escrow-for-disaster-recovery</loc><lastmod>2025-07-24</lastmod></url><url><loc>https://codekeeper.co/fr/entiercement-de-code-source</loc><lastmod>2025-09-23</lastmod></url><url><loc>https://codekeeper.co/articles/saas-escrow-services-growth-opportunities-and-challenges</loc><lastmod>2025-07-24</lastmod></url><url><loc>https://codekeeper.co/ticker/att-data-breach-settlement-claims-1</loc><lastmod>2025-10-13</lastmod></url><url><loc>https://codekeeper.co/ticker/critical-net-snmp-vulnerability-cve-2025-68616</loc><lastmod>2025-12-26</lastmod></url><url><loc>https://codekeeper.co/ticker/columbia-university-data-breach-affects-870000-people</loc><lastmod>2025-08-09</lastmod></url><url><loc>https://codekeeper.co/ticker/nissan-ransomware-attack-november-2023</loc><lastmod>2025-12-15</lastmod></url><url><loc>https://codekeeper.co/integrations/helix-core</loc><lastmod>2025-04-17</lastmod></url><url><loc>https://codekeeper.co/ticker/chinese-hackers-ai-chatbot-cyberattack</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://codekeeper.co/ticker/leakyinjector-leakystealer-crypto-browser-malware</loc><lastmod>2025-11-07</lastmod></url><url><loc>https://codekeeper.co/ticker/chinese-hackers-brickstorm-malware-infiltration</loc><lastmod>2025-12-07</lastmod></url><url><loc>https://codekeeper.co/articles/how-to-implement-enterprise-risk-management</loc><lastmod>2025-07-24</lastmod></url><url><loc>https://codekeeper.co/ticker/ransomware-attacks-businesses-pay-ransom</loc><lastmod>2025-09-30</lastmod></url><url><loc>https://codekeeper.co/ticker/harvard-breach-oracle-vulnerability-clop-ransomware</loc><lastmod>2025-10-16</lastmod></url><url><loc>https://codekeeper.co/ticker/ransomware-attack-cripples-healthcare-billing</loc><lastmod>2026-03-06</lastmod></url><url><loc>https://codekeeper.co/ai-escrow</loc><lastmod>2026-03-25</lastmod></url><url><loc>https://codekeeper.co/fr/reserver-une-demo</loc><lastmod>2025-12-04</lastmod></url><url><loc>https://codekeeper.co/ticker/pypi-warns-of-active-phishing-campaign-using-fake-verification-emails</loc><lastmod>2025-08-09</lastmod></url><url><loc>https://codekeeper.co/ticker/salt-typhoon-cyberattack-citrix-vulnerability</loc><lastmod>2025-10-20</lastmod></url><url><loc>https://codekeeper.co/ticker/kaiser-settles-46m-patient-data-breach</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://codekeeper.co/articles/questions-to-ask-before-setting-up-escrow-agreements</loc><lastmod>2025-07-24</lastmod></url><url><loc>https://codekeeper.co/ticker/minnesota-national-guard-called-in-after-st-paul-cyberattack</loc><lastmod>2025-08-09</lastmod></url><url><loc>https://codekeeper.co/book-onboarding-call</loc><lastmod>2025-04-08</lastmod></url><url><loc>https://codekeeper.co/articles/software-escrow-for-financial-services</loc><lastmod>2026-02-11</lastmod></url><url><loc>https://codekeeper.co/articles/why-startups-and-early-stage-companies-should-invest-in-ip-escrow</loc><lastmod>2025-07-24</lastmod></url><url><loc>https://codekeeper.co/video-guides/what-is-continuity-escrow</loc><lastmod>2026-04-16</lastmod></url><url><loc>https://codekeeper.co/ticker/iran-muddywater-upgrades-cyber-capabilities</loc><lastmod>2025-12-03</lastmod></url><url><loc>https://codekeeper.co/ticker/lastpass-phishing-campaign-alert</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://codekeeper.co/software-backup</loc><lastmod>2026-03-25</lastmod></url><url><loc>https://codekeeper.co/articles/top-security-awareness-strategies-that-build-software-resilience</loc><lastmod>2025-10-22</lastmod></url><url><loc>https://codekeeper.co/code-of-conduct</loc><lastmod>2025-05-09</lastmod></url><url><loc>https://codekeeper.co/ticker/uk-probes-yutong-bus-remote-control-risk</loc><lastmod>2025-11-11</lastmod></url><url><loc>https://codekeeper.co/ticker/ai-safety-guidance-for-critical-infrastructure</loc><lastmod>2025-12-04</lastmod></url><url><loc>https://codekeeper.co/ticker/cox-enterprises-data-breach-cl0p-ransomware</loc><lastmod>2025-11-24</lastmod></url><url><loc>https://codekeeper.co/articles/factors-to-consider-before-entrusting-your-source-code-to-an-escrow-agent</loc><lastmod>2025-07-24</lastmod></url><url><loc>https://codekeeper.co/ticker/young-hackers-britains-cybercrime-challenge</loc><lastmod>2025-12-06</lastmod></url><url><loc>https://codekeeper.co/articles/iso-27001-vs-soc-2</loc><lastmod>2026-04-02</lastmod></url><url><loc>https://codekeeper.co/cyber-insurance</loc><lastmod>2026-02-24</lastmod></url><url><loc>https://codekeeper.co/ticker/npm-package-phishing-attack-impact</loc><lastmod>2025-09-16</lastmod></url><url><loc>https://codekeeper.co/switch-to-codekeeper</loc><lastmod>2025-11-13</lastmod></url><url><loc>https://codekeeper.co/ticker/harrods-data-breach-third-party-supply-chain</loc><lastmod>2025-09-29</lastmod></url><url><loc>https://codekeeper.co/articles/what-is-continuity-escrow</loc><lastmod>2026-02-24</lastmod></url><url><loc>https://codekeeper.co/articles/global-trends-shaping-the-ip-escrow-industry</loc><lastmod>2025-07-24</lastmod></url><url><loc>https://codekeeper.co/ticker/the-com-cybercrime-network-exposed</loc><lastmod>2025-12-21</lastmod></url><url><loc>https://codekeeper.co/ticker/sap-security-patches-january-2026</loc><lastmod>2026-01-13</lastmod></url><url><loc>https://codekeeper.co/ticker/beyondtrust-vulnerability-exploitation-cve-2026-1731</loc><lastmod>2026-02-13</lastmod></url><url><loc>https://codekeeper.co/integrations</loc><lastmod>2025-11-18</lastmod></url><url><loc>https://codekeeper.co/ticker/solarwinds-ciso-tim-brown-russian-hacker-breach</loc><lastmod>2025-10-19</lastmod></url><url><loc>https://codekeeper.co/ticker/cisco-patches-critical-email-security-flaw</loc><lastmod>2026-01-17</lastmod></url><url><loc>https://codekeeper.co/ticker/chinese-hackers-use-ai-for-cyber-attacks</loc><lastmod>2025-11-24</lastmod></url><url><loc>https://codekeeper.co/ticker/marks-spencer-cyber-attack-ransomware</loc><lastmod>2026-02-18</lastmod></url><url><loc>https://codekeeper.co/ticker/cisco-patches-critical-zero-day-flaw</loc><lastmod>2026-01-24</lastmod></url><url><loc>https://codekeeper.co/ticker/hackers-use-email-security-services-steal-microsoft-365-passwords</loc><lastmod>2025-08-09</lastmod></url><url><loc>https://codekeeper.co/ticker/teen-hacker-surrenders-amid-scattered-spider-shutdown</loc><lastmod>2025-09-25</lastmod></url><url><loc>https://codekeeper.co/ticker/sonicwall-zero-day-flaw-exploitation</loc><lastmod>2025-12-19</lastmod></url><url><loc>https://codekeeper.co/ticker/cisa-warns-critical-vulnerabilities-rockwell-abb-systems</loc><lastmod>2025-09-11</lastmod></url><url><loc>https://codekeeper.co/ticker/jlr-production-halt-cyber-attack</loc><lastmod>2025-09-10</lastmod></url><url><loc>https://codekeeper.co/ticker/sonicwall-cloud-breach-firewall-backup</loc><lastmod>2025-11-06</lastmod></url><url><loc>https://codekeeper.co/ticker/tfl-data-breach-2024-hackers-expose-10-million-customers</loc><lastmod>2026-03-11</lastmod></url><url><loc>https://codekeeper.co/ticker/carnival-corp-data-breach-march-2021</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://codekeeper.co/ticker/companies-house-security-flaw-exposes-confidential-info</loc><lastmod>2026-03-31</lastmod></url><url><loc>https://codekeeper.co/ticker/ransomware-attack-disrupts-european-airports</loc><lastmod>2025-09-23</lastmod></url><url><loc>https://codekeeper.co/ticker/massive-hack-exploits-react2shell-flaw</loc><lastmod>2026-04-03</lastmod></url><url><loc>https://codekeeper.co/ticker/interpol-operation-sentinel-cybercrime-bust</loc><lastmod>2025-12-25</lastmod></url><url><loc>https://codekeeper.co/book-a-demo</loc><lastmod>2026-03-25</lastmod></url><url><loc>https://codekeeper.co/ticker/bankbot-ynrk-android-trojan-targets-se-asia</loc><lastmod>2025-11-04</lastmod></url><url><loc>https://codekeeper.co/ticker/cybercriminals-salty2fa-phishing-kit-enterprise-threat</loc><lastmod>2025-09-10</lastmod></url><url><loc>https://codekeeper.co/ticker/apple-patches-zero-day-flaws-in-webkit</loc><lastmod>2025-12-16</lastmod></url><url><loc>https://codekeeper.co/ticker/under-armour-data-breach-72-million-customers</loc><lastmod>2026-01-23</lastmod></url><url><loc>https://codekeeper.co/request-enterprise-escrow-solution</loc><lastmod>2025-11-13</lastmod></url><url><loc>https://codekeeper.co/articles/silicon-valley-bank-collapse</loc><lastmod>2025-09-01</lastmod></url><url><loc>https://codekeeper.co/solutions/cps230</loc><lastmod>2025-11-19</lastmod></url><url><loc>https://codekeeper.co/ticker/uk-schools-cyber-security-crisis</loc><lastmod>2025-10-06</lastmod></url><url><loc>https://codekeeper.co/ticker/qualcomm-kernel-flaw-targeted-android-attacks</loc><lastmod>2026-03-04</lastmod></url><url><loc>https://codekeeper.co/ticker/salesforce-security-alert-shinyhunters-attack</loc><lastmod>2026-03-11</lastmod></url><url><loc>https://codekeeper.co/ticker/cyberattack-halts-jaguar-land-rover-production</loc><lastmod>2025-09-21</lastmod></url><url><loc>https://codekeeper.co/ticker/greynoise-uncovers-campaign-targeting-major-network-devices</loc><lastmod>2025-10-10</lastmod></url><url><loc>https://codekeeper.co/ticker/cyberattack-on-kido-nursery-data-breach</loc><lastmod>2025-09-26</lastmod></url><url><loc>https://codekeeper.co/articles/software-escrow-for-data-breaches</loc><lastmod>2025-07-24</lastmod></url><url><loc>https://codekeeper.co/ticker/hackers-exploit-microsoft-365-feature-to-send-fake-internal-emails</loc><lastmod>2025-08-09</lastmod></url><url><loc>https://codekeeper.co/ticker/london-councils-cyber-attack-data-breach</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://codekeeper.co/about-us/download-software-escrow-agreement</loc><lastmod>2025-07-10</lastmod></url><url><loc>https://codekeeper.co/ticker/post-office-horizon-scandal-data-breach</loc><lastmod>2025-12-04</lastmod></url><url><loc>https://codekeeper.co/about-us/codekeeper-v5-is-here</loc><lastmod>2025-07-11</lastmod></url><url><loc>https://codekeeper.co/ticker/ai-malware-threatens-global-sectors</loc><lastmod>2025-09-12</lastmod></url><url><loc>https://codekeeper.co/ticker/russian-cyberattacks-on-danish-infrastructure</loc><lastmod>2025-12-21</lastmod></url><url><loc>https://codekeeper.co/solutions</loc><lastmod>2025-12-16</lastmod></url><url><loc>https://codekeeper.co/ticker/russia-data-market-crackdown-backfires</loc><lastmod>2025-12-27</lastmod></url><url><loc>https://codekeeper.co/ticker/nevada-ransomware-attack-closes-offices</loc><lastmod>2025-08-28</lastmod></url><url><loc>https://codekeeper.co/ticker/harrods-data-breach-notification</loc><lastmod>2025-09-27</lastmod></url><url><loc>https://codekeeper.co/ticker/zipline-phishing-campaign-targets-industries</loc><lastmod>2025-08-28</lastmod></url><url><loc>https://codekeeper.co/ticker/mobile-phishing-attacks-smishing-vishing-quishing</loc><lastmod>2025-10-03</lastmod></url><url><loc>https://codekeeper.co/ticker/muddywater-cyberespionage-middle-east-north-africa</loc><lastmod>2025-10-23</lastmod></url><url><loc>https://codekeeper.co/ticker/healthdaq-data-breach-500000-files-stolen</loc><lastmod>2026-04-11</lastmod></url><url><loc>https://codekeeper.co/create-custom-software-escrow-agreement</loc><lastmod>2025-11-13</lastmod></url><url><loc>https://codekeeper.co/ticker/hackers-exploit-adobe-reader-flaw</loc><lastmod>2026-04-09</lastmod></url><url><loc>https://codekeeper.co/solutions/cbw</loc><lastmod>2025-11-19</lastmod></url><url><loc>https://codekeeper.co/ticker/cisa-warns-langflow-code-injection-flaw-cve-2026-33017</loc><lastmod>2026-03-28</lastmod></url><url><loc>https://codekeeper.co/ticker/shadowcaptcha-cyberattack-wordpress-sites</loc><lastmod>2025-08-26</lastmod></url><url><loc>https://codekeeper.co/ticker/higham-lane-school-hack-closure</loc><lastmod>2026-01-16</lastmod></url><url><loc>https://codekeeper.co/ticker/hackers-exploit-winrar-vulnerability-cve-2025-8088</loc><lastmod>2026-01-29</lastmod></url><url><loc>https://codekeeper.co/impact-analysis</loc><lastmod>2025-11-13</lastmod></url><url><loc>https://codekeeper.co/ticker/asahi-ransomware-attack-exposes-customer-data</loc><lastmod>2025-11-28</lastmod></url><url><loc>https://codekeeper.co/articles/software-escrow-vs-source-code-escrow</loc><lastmod>2025-07-24</lastmod></url><url><loc>https://codekeeper.co/ticker/chinese-hackers-peckbirdy-cyber-attacks</loc><lastmod>2026-01-30</lastmod></url><url><loc>https://codekeeper.co/ticker/cybersecurity-pros-blackcat-ransomware-guilty</loc><lastmod>2026-01-02</lastmod></url><url><loc>https://codekeeper.co/ticker/jaguar-land-rover-cyber-attack-shutdown-2</loc><lastmod>2025-09-16</lastmod></url><url><loc>https://codekeeper.co/ticker/spanish-man-hacks-hotel-site-for-1-cent-rooms</loc><lastmod>2026-02-20</lastmod></url><url><loc>https://codekeeper.co/ticker/cisa-warns-chrome-zero-day-vulnerability</loc><lastmod>2025-09-24</lastmod></url><url><loc>https://codekeeper.co/articles/software-escrow-agreement-guide</loc><lastmod>2025-07-24</lastmod></url><url><loc>https://codekeeper.co/ticker/fff-cyberattack-member-data-breach</loc><lastmod>2025-11-29</lastmod></url><url><loc>https://codekeeper.co/articles/how-to-prepare-source-code-for-software-escrow</loc><lastmod>2025-07-24</lastmod></url><url><loc>https://codekeeper.co/ticker/ios-26-2-security-update-zero-day-exploits</loc><lastmod>2025-12-13</lastmod></url><url><loc>https://codekeeper.co/ticker/cybersecurity-awareness-month-2025</loc><lastmod>2025-09-30</lastmod></url><url><loc>https://codekeeper.co/ticker/cisco-firewall-vulnerabilities-critical-flaws</loc><lastmod>2026-03-06</lastmod></url><url><loc>https://codekeeper.co/ticker/cisa-warns-asus-live-update-vulnerability</loc><lastmod>2025-12-18</lastmod></url><url><loc>https://codekeeper.co/ticker/zarah-sultana-unauthorized-membership-launch</loc><lastmod>2026-01-10</lastmod></url><url><loc>https://codekeeper.co/articles/enterprise-risk-management-benefits</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://codekeeper.co/ticker/cl0p-ransomware-attack-oracle-ebs-victims</loc><lastmod>2025-11-10</lastmod></url><url><loc>https://codekeeper.co/ticker/microsoft-patch-tuesday-february-2026-zero-days</loc><lastmod>2026-02-11</lastmod></url><url><loc>https://codekeeper.co/ticker/livechat-phishing-scam-exploits</loc><lastmod>2026-03-17</lastmod></url><url><loc>https://codekeeper.co/pricing/ai-escrow</loc><lastmod>2026-04-08</lastmod></url><url><loc>https://codekeeper.co/what-is-software-escrow</loc><lastmod>2026-03-26</lastmod></url><url><loc>https://codekeeper.co/ticker/hackers-use-fake-korean-apps-to-steal-data</loc><lastmod>2025-08-09</lastmod></url><url><loc>https://codekeeper.co/pricing/software-escrow</loc><lastmod>2026-04-08</lastmod></url><url><loc>https://codekeeper.co/integrations/perforce</loc><lastmod>2025-04-17</lastmod></url><url><loc>https://codekeeper.co/ticker/china-cyber-strategy-report</loc><lastmod>2025-10-06</lastmod></url><url><loc>https://codekeeper.co/ticker/beyondtrust-zero-day-vulnerability-cve-2026-1731</loc><lastmod>2026-02-08</lastmod></url><url><loc>https://codekeeper.co/ticker/shinyhunters-breach-pornhub-user-data</loc><lastmod>2025-12-18</lastmod></url><url><loc>https://codekeeper.co/ticker/fake-homebrew-sites-target-macos-users</loc><lastmod>2025-10-14</lastmod></url><url><loc>https://codekeeper.co/legal-team-briefing</loc><lastmod>2025-09-25</lastmod></url><url><loc>https://codekeeper.co/solutions/dora</loc><lastmod>2025-11-19</lastmod></url><url><loc>https://codekeeper.co/ticker/cisa-warns-critical-windows-zero-day-cve-2025-62221</loc><lastmod>2025-12-15</lastmod></url><url><loc>https://codekeeper.co/resources</loc><lastmod>2025-11-25</lastmod></url><url><loc>https://codekeeper.co/articles/software-resilience-is-cyber-resilience</loc><lastmod>2025-10-27</lastmod></url><url><loc>https://codekeeper.co/articles/alert-new-dangerous-ransomware-group</loc><lastmod>2025-07-24</lastmod></url><url><loc>https://codekeeper.co/ticker/notepad-plus-plus-patches-update-system-vulnerability</loc><lastmod>2025-12-12</lastmod></url><url><loc>https://codekeeper.co/articles/software-escrow-your-shield-in-the-global-tariffs-war</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://codekeeper.co/ticker/microsoft-november-2025-patch-tuesday-updates</loc><lastmod>2025-11-12</lastmod></url><url><loc>https://codekeeper.co/integrations/codebase</loc><lastmod>2025-04-17</lastmod></url><url><loc>https://codekeeper.co/ticker/us-meta-whatsapp-encryption-investigation</loc><lastmod>2026-02-01</lastmod></url><url><loc>https://codekeeper.co/solutions/iso-27001</loc><lastmod>2025-11-19</lastmod></url><url><loc>https://codekeeper.co/solutions/pra-ss221</loc><lastmod>2025-11-19</lastmod></url><url><loc>https://codekeeper.co/comparison/escode</loc><lastmod>2024-12-17</lastmod></url><url><loc>https://codekeeper.co/ticker/bk-technologies-data-breach-september</loc><lastmod>2025-10-07</lastmod></url><url><loc>https://codekeeper.co/ticker/crashfix-scam-malicious-chrome-extension</loc><lastmod>2026-01-21</lastmod></url><url><loc>https://codekeeper.co/ticker/hackers-hit-major-japanese-steel-company-through-zero-day-flaw</loc><lastmod>2025-08-09</lastmod></url><url><loc>https://codekeeper.co/ticker/cybercriminals-sell-discord-data</loc><lastmod>2025-08-26</lastmod></url><url><loc>https://codekeeper.co/ticker/outpost24-phishing-attack-zero-trust-security</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://codekeeper.co/ticker/hasbro-cyberattack-affects-brands-delays-deliveries</loc><lastmod>2026-04-04</lastmod></url><url><loc>https://codekeeper.co/how-to-deposit-your-assets-into-escrow</loc><lastmod>2025-03-21</lastmod></url><url><loc>https://codekeeper.co/ticker/dentsu-merkle-data-breach-impact</loc><lastmod>2025-10-29</lastmod></url><url><loc>https://codekeeper.co/ticker/uk-mps-russian-phishing-attacks-whatsapp</loc><lastmod>2025-12-13</lastmod></url><url><loc>https://codekeeper.co/ticker/cisa-flags-trueconf-vulnerability-cve-2026-3502</loc><lastmod>2026-04-06</lastmod></url><url><loc>https://codekeeper.co/ticker/salt-typhoon-hackers-target-200-us-entities</loc><lastmod>2025-08-28</lastmod></url><url><loc>https://codekeeper.co/ticker/madison-square-garden-data-breach-cl0p-ransomware</loc><lastmod>2026-03-03</lastmod></url><url><loc>https://codekeeper.co/articles/ffiec-software-escrow-requirements</loc><lastmod>2025-08-27</lastmod></url><url><loc>https://codekeeper.co/articles/which-businesses-need-software-escrow-services</loc><lastmod>2025-10-01</lastmod></url><url><loc>https://codekeeper.co/articles/insider-tips-for-managing-software-suppliers</loc><lastmod>2025-07-24</lastmod></url><url><loc>https://codekeeper.co/ticker/agenda-ransomware-infects-591-victims-globally</loc><lastmod>2025-10-26</lastmod></url><url><loc>https://codekeeper.co/ticker/healthcare-services-group-data-breach-2024</loc><lastmod>2025-08-28</lastmod></url><url><loc>https://codekeeper.co/an-introduction-to-codekeeper-software-escrow-solutions</loc><lastmod>2025-03-21</lastmod></url><url><loc>https://codekeeper.co/verification-questionnaire</loc><lastmod>2025-12-08</lastmod></url><url><loc>https://codekeeper.co/ticker/cisa-flags-chromium-zero-day-graphics-vulnerability</loc><lastmod>2025-12-14</lastmod></url><url><loc>https://codekeeper.co/pricing/software-backup</loc><lastmod>2026-04-08</lastmod></url><url><loc>https://codekeeper.co/ticker/uk-cyberattack-china-diplomatic-tensions</loc><lastmod>2025-12-20</lastmod></url><url><loc>https://codekeeper.co/ticker/cisa-emergency-directive-cisco-firewall-exploit</loc><lastmod>2025-09-26</lastmod></url><url><loc>https://codekeeper.co/how-it-works</loc><lastmod>2026-03-12</lastmod></url><url><loc>https://codekeeper.co/ticker/2024-polyfill-attack-north-korean-hackers</loc><lastmod>2026-03-15</lastmod></url><url><loc>https://codekeeper.co/ticker/radiant-hackers-delete-childrens-data-after-backlash</loc><lastmod>2025-10-03</lastmod></url><url><loc>https://codekeeper.co/de/quellcode-escrow</loc><lastmod>2025-09-23</lastmod></url><url><loc>https://codekeeper.co/ticker/zabbix-agent-vulnerability-cve-2025-27237-patch</loc><lastmod>2025-10-06</lastmod></url><url><loc>https://codekeeper.co/ticker/cyberattacks-target-gladinet-centrestack-vulnerability</loc><lastmod>2025-12-13</lastmod></url><url><loc>https://codekeeper.co/ticker/chrome-cve-2026-2441-exploit-emergency-patch</loc><lastmod>2026-03-03</lastmod></url><url><loc>https://codekeeper.co/articles/protecting-ai-with-software-escrow</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://codekeeper.co/ticker/biden-considers-ban-on-tp-link-routers</loc><lastmod>2025-11-09</lastmod></url><url><loc>https://codekeeper.co/ticker/texas-ag-lawsuit-powerschool-data-breach</loc><lastmod>2025-09-10</lastmod></url><url><loc>https://codekeeper.co/ticker/chrome-zero-day-cve-2025-2783-exploited-by-dante</loc><lastmod>2025-10-28</lastmod></url><url><loc>https://codekeeper.co/ticker/cybercriminals-exploit-sonicwall-firewalls-for-akira-ransomware</loc><lastmod>2025-09-28</lastmod></url><url><loc>https://codekeeper.co/articles/how-a-single-aws-bug-took-down-3500-companies-across-60-countries</loc><lastmod>2026-03-26</lastmod></url><url><loc>https://codekeeper.co/ticker/apple-patches-safari-flaw</loc><lastmod>2025-08-09</lastmod></url><url><loc>https://codekeeper.co/ticker/microsoft-disrupts-ransomware-operation</loc><lastmod>2025-10-18</lastmod></url><url><loc>https://codekeeper.co/ticker/odido-data-breach-impacts-6-million-customers</loc><lastmod>2026-02-16</lastmod></url><url><loc>https://codekeeper.co/ticker/beamglea-phishing-targets-industrial-electronics</loc><lastmod>2025-10-13</lastmod></url><url><loc>https://codekeeper.co/contact-support</loc><lastmod>2026-02-20</lastmod></url><url><loc>https://codekeeper.co/articles/a-guide-to-software-vendor-exit-planning</loc><lastmod>2026-03-25</lastmod></url><url><loc>https://codekeeper.co/articles/what-to-know-about-software-escrow</loc><lastmod>2025-11-17</lastmod></url><url><loc>https://codekeeper.co/ticker/ai-coding-tools-create-new-slopsquatting-security-threat</loc><lastmod>2025-08-26</lastmod></url><url><loc>https://codekeeper.co/ticker/trivy-github-action-malware-attack</loc><lastmod>2026-03-22</lastmod></url><url><loc>https://codekeeper.co/integrations/amazon-codecommit</loc><lastmod>2025-04-17</lastmod></url><url><loc>https://codekeeper.co/ticker/jaguar-land-rover-cyber-attack-shutdown-1</loc><lastmod>2025-09-11</lastmod></url><url><loc>https://codekeeper.co/ticker/dino-reborn-malicious-npm-packages-targets</loc><lastmod>2025-11-19</lastmod></url><url><loc>https://codekeeper.co/tech-team-briefing</loc><lastmod>2025-09-25</lastmod></url><url><loc>https://codekeeper.co/articles/kodi-data-breach-why-you-need-source-code-escrow</loc><lastmod>2025-07-24</lastmod></url><url><loc>https://codekeeper.co/contact</loc><lastmod>2026-03-25</lastmod></url><url><loc>https://codekeeper.co/ticker/lazarus-targets-crypto-with-three-stage-attack</loc><lastmod>2025-09-10</lastmod></url><url><loc>https://codekeeper.co/ticker/arrests-in-kido-nursery-cyber-attack</loc><lastmod>2025-10-08</lastmod></url><url><loc>https://codekeeper.co/ticker/image-scaling-attacks-threaten-ai-security</loc><lastmod>2025-08-26</lastmod></url><url><loc>https://codekeeper.co/ticker/shiny-hunters-breach-luxury-brands-data</loc><lastmod>2025-09-16</lastmod></url><url><loc>https://codekeeper.co/ticker/cyberattack-on-palo-alto-vpn-globalprotect</loc><lastmod>2025-12-07</lastmod></url><url><loc>https://codekeeper.co/ticker/north-korean-fake-recruitment-cyberattack</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://codekeeper.co/ticker/simcartel-cybercrime-operation-dismantled</loc><lastmod>2025-10-19</lastmod></url><url><loc>https://codekeeper.co/video-guides/what-is-software-escrow</loc><lastmod>2026-04-16</lastmod></url><url><loc>https://codekeeper.co/ticker/fortigate-firewall-vulnerabilities-breach-2026</loc><lastmod>2026-03-15</lastmod></url><url><loc>https://codekeeper.co/articles/iso-27001-certification</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://codekeeper.co/ticker/msg-fined-100k-for-security-breach</loc><lastmod>2025-10-26</lastmod></url><url><loc>https://codekeeper.co/ticker/cisa-warns-of-critical-security-flaws-in-major-industrial-and-medical-devices</loc><lastmod>2025-08-09</lastmod></url><url><loc>https://codekeeper.co/ticker/storm-2603-weaponizes-velociraptor-for-ransomware-attacks</loc><lastmod>2025-10-11</lastmod></url><url><loc>https://codekeeper.co/ticker/microsoft-emergency-patch-cve-2026-21509</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://codekeeper.co/ticker/supply-chain-breaches-risk-management</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://codekeeper.co/ticker/vs-code-malicious-extensions-exploit</loc><lastmod>2025-12-08</lastmod></url><url><loc>https://codekeeper.co/ticker/google-sues-chinese-phishing-network</loc><lastmod>2025-11-13</lastmod></url><url><loc>https://codekeeper.co/ticker/kensington-chelsea-council-cyber-attack</loc><lastmod>2025-12-01</lastmod></url><url><loc>https://codekeeper.co/ticker/adams-clerk-attorney-trial-illegal-voter-data-access</loc><lastmod>2025-12-03</lastmod></url><url><loc>https://codekeeper.co/articles/software-escrow-licensing-agreement-best-practices</loc><lastmod>2025-07-24</lastmod></url><url><loc>https://codekeeper.co/ticker/cyber-deterrence-response-act-2023</loc><lastmod>2025-12-02</lastmod></url><url><loc>https://codekeeper.co/ticker/cyber-fraud-tops-ceo-concerns-2026</loc><lastmod>2026-01-14</lastmod></url><url><loc>https://codekeeper.co/ticker/microsoft-word-zero-day-vulnerability-february-2026</loc><lastmod>2026-03-03</lastmod></url><url><loc>https://codekeeper.co/ticker/jaguar-land-rover-sales-crash-2024</loc><lastmod>2026-01-09</lastmod></url><url><loc>https://codekeeper.co/ticker/washington-post-data-breach-hackers</loc><lastmod>2025-11-15</lastmod></url><url><loc>https://codekeeper.co/ticker/cybercriminals-inject-malware-in-python-repos</loc><lastmod>2026-03-17</lastmod></url><url><loc>https://codekeeper.co/ticker/chanel-data-breach-luxury-brands-targeted</loc><lastmod>2025-08-09</lastmod></url><url><loc>https://codekeeper.co/ticker/fbi-warns-salesforce-users-threat-groups</loc><lastmod>2025-09-16</lastmod></url><url><loc>https://codekeeper.co/ticker/mongobleed-security-flaw-threatens-mongodb</loc><lastmod>2025-12-28</lastmod></url><url><loc>https://codekeeper.co/data-escrow</loc><lastmod>2025-12-04</lastmod></url><url><loc>https://codekeeper.co/solutions/ffiec</loc><lastmod>2025-11-19</lastmod></url><url><loc>https://codekeeper.co/ticker/kensington-chelsea-cyber-attack-data-breach</loc><lastmod>2025-11-29</lastmod></url><url><loc>https://codekeeper.co/about-us/press-release-codekeeper-achieves-iso-27001-2022-certification</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://codekeeper.co/ticker/github-codespaces-supply-chain-attack-risk</loc><lastmod>2026-02-05</lastmod></url><url><loc>https://codekeeper.co/disaster-recovery-plan</loc><lastmod>2025-11-18</lastmod></url><url><loc>https://codekeeper.co/ticker/sonicwall-data-breach-api-attack</loc><lastmod>2025-09-25</lastmod></url><url><loc>https://codekeeper.co/ticker/microsoft-cloudflare-dismantle-raccoon-phishing</loc><lastmod>2025-09-18</lastmod></url><url><loc>https://codekeeper.co/ticker/qantas-data-breach-5-million-customers</loc><lastmod>2025-10-12</lastmod></url><url><loc>https://codekeeper.co/ticker/cisco-zero-day-exploit-secure-email-gateway</loc><lastmod>2026-01-17</lastmod></url><url><loc>https://codekeeper.co/all-new-online-platform</loc><lastmod>2025-03-21</lastmod></url><url><loc>https://codekeeper.co/ticker/gnu-wget2-security-flaw-cve-2025-69194</loc><lastmod>2026-01-05</lastmod></url><url><loc>https://codekeeper.co/ticker/tenable-breach-salesforce-salesloft-exploit</loc><lastmod>2025-09-10</lastmod></url><url><loc>https://codekeeper.co/ticker/us-israel-cyber-operations-against-iran</loc><lastmod>2026-03-20</lastmod></url><url><loc>https://codekeeper.co/integrations/repositoryhosting</loc><lastmod>2025-04-17</lastmod></url><url><loc>https://codekeeper.co/ticker/kensington-chelsea-council-cyber-attack-data-breach</loc><lastmod>2026-01-15</lastmod></url><url><loc>https://codekeeper.co/ticker/cybercriminals-hijack-nx-tool-infect-ai-assistants</loc><lastmod>2025-09-02</lastmod></url><url><loc>https://codekeeper.co/ticker/notepad-plus-plus-supply-chain-attack-2025</loc><lastmod>2026-02-07</lastmod></url><url><loc>https://codekeeper.co/ticker/vertex-ai-vulnerabilities-service-agent-hijack</loc><lastmod>2026-01-18</lastmod></url><url><loc>https://codekeeper.co/ticker/fortinet-zero-day-vulnerability-fortiweb-disclosure</loc><lastmod>2025-11-21</lastmod></url><url><loc>https://codekeeper.co/video-guides/what-is-saas-escrow</loc><lastmod>2026-04-16</lastmod></url><url><loc>https://codekeeper.co/ticker/akira-ransomware-targets-sonicwall-vpns-zero-day</loc><lastmod>2025-08-09</lastmod></url><url><loc>https://codekeeper.co/ticker/watchguard-firebox-zero-day-vulnerability-exploit</loc><lastmod>2025-12-23</lastmod></url><url><loc>https://codekeeper.co/integrations/mercurial</loc><lastmod>2025-04-17</lastmod></url><url><loc>https://codekeeper.co/articles/why-you-need-to-run-source-code-verification</loc><lastmod>2025-07-24</lastmod></url><url><loc>https://codekeeper.co/ticker/london-councils-cyber-attack-disrupts-services</loc><lastmod>2025-11-27</lastmod></url><url><loc>https://codekeeper.co/ticker/shai-hulud-worm-npm-attack</loc><lastmod>2025-09-18</lastmod></url><url><loc>https://codekeeper.co/integrations/amazon-s3</loc><lastmod>2025-04-17</lastmod></url><url><loc>https://codekeeper.co/terms</loc><lastmod>2026-03-26</lastmod></url><url><loc>https://codekeeper.co/ticker/react2shell-vulnerability-global-cyberattacks</loc><lastmod>2025-12-14</lastmod></url><url><loc>https://codekeeper.co/ticker/kyle-svara-snapchat-hacking-case</loc><lastmod>2026-02-06</lastmod></url><url><loc>https://codekeeper.co/articles/why-you-need-software-escrow</loc><lastmod>2025-07-24</lastmod></url><url><loc>https://codekeeper.co/ticker/instagram-password-reset-security-concerns</loc><lastmod>2026-01-13</lastmod></url><url><loc>https://codekeeper.co/nl/boek-een-demo</loc><lastmod>2025-12-04</lastmod></url><url><loc>https://codekeeper.co/ticker/trivy-supply-chain-attack-docker-images-compromised</loc><lastmod>2026-03-23</lastmod></url><url><loc>https://codekeeper.co/ticker/hackers-use-anthropics-claude-for-cyberattacks</loc><lastmod>2025-09-02</lastmod></url><url><loc>https://codekeeper.co/solutions/opex</loc><lastmod>2026-03-04</lastmod></url><url><loc>https://codekeeper.co/ticker/pgadmin4-vulnerability-cve-2025-12762</loc><lastmod>2025-11-16</lastmod></url><url><loc>https://codekeeper.co/integrations/azure-devops</loc><lastmod>2025-04-17</lastmod></url><url><loc>https://codekeeper.co/ticker/windows-zero-click-vulnerability-cve-2024-38063</loc><lastmod>2025-09-25</lastmod></url><url><loc>https://codekeeper.co/articles/debunking-common-myths-about-software-escrow</loc><lastmod>2025-07-24</lastmod></url><url><loc>https://codekeeper.co/ticker/ai-powered-cybercrime-deepfakes-dark-llms</loc><lastmod>2026-01-20</lastmod></url><url><loc>https://codekeeper.co/ticker/react2shell-critical-vulnerability-patches</loc><lastmod>2025-12-05</lastmod></url><url><loc>https://codekeeper.co/ticker/windows-rdp-zero-day-exploit-sale</loc><lastmod>2026-03-09</lastmod></url><url><loc>https://codekeeper.co/comparison/l1escrow</loc><lastmod>2024-12-17</lastmod></url><url><loc>https://codekeeper.co/ticker/doordash-data-breach-november-2024</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://codekeeper.co/ticker/chinese-hackers-exploit-vmware-flaws</loc><lastmod>2025-08-09</lastmod></url><url><loc>https://codekeeper.co/ticker/conduent-data-breach-exposes-volvo-employees</loc><lastmod>2026-02-15</lastmod></url><url><loc>https://codekeeper.co/ticker/microsoft-december-2025-security-patches-zero-day</loc><lastmod>2025-12-10</lastmod></url><url><loc>https://codekeeper.co/ticker/iranian-hackers-target-us-think-tanks-2025</loc><lastmod>2025-11-05</lastmod></url><url><loc>https://codekeeper.co/ticker/hackers-steal-340gb-data-eu-commission</loc><lastmod>2026-04-05</lastmod></url><url><loc>https://codekeeper.co/ticker/tate-job-applicants-data-breach-exposes-details</loc><lastmod>2025-11-15</lastmod></url><url><loc>https://codekeeper.co/ticker/trizetto-cyberattack-compromises-patient-data</loc><lastmod>2026-03-11</lastmod></url><url><loc>https://codekeeper.co/ticker/cybercriminals-exploit-google-tasks-phishing-attack</loc><lastmod>2026-01-03</lastmod></url><url><loc>https://codekeeper.co/ticker/ransomware-surges-against-industrial-firms-2025</loc><lastmod>2026-02-18</lastmod></url><url><loc>https://codekeeper.co/articles/apple-watch-patent-war-why-you-need-ip-escrow</loc><lastmod>2025-07-24</lastmod></url><url><loc>https://codekeeper.co/ticker/orange-telecom-cyberattack-july-2025</loc><lastmod>2025-08-09</lastmod></url><url><loc>https://codekeeper.co/articles/how-to-prove-your-software-resilience</loc><lastmod>2025-10-23</lastmod></url><url><loc>https://codekeeper.co/ticker/ncsc-urgent-alert-on-cyber-attacks</loc><lastmod>2026-02-11</lastmod></url><url><loc>https://codekeeper.co/ticker/react-vulnerability-cve-2025-55182-threatens-apps</loc><lastmod>2025-12-04</lastmod></url><url><loc>https://codekeeper.co/ticker/generative-ai-and-the-rise-of-cyber-fraud</loc><lastmod>2026-01-23</lastmod></url><url><loc>https://codekeeper.co/ticker/cryptomixer-takedown-europol-operation</loc><lastmod>2025-12-01</lastmod></url><url><loc>https://codekeeper.co/ticker/att-settles-data-breaches-177m</loc><lastmod>2025-09-02</lastmod></url><url><loc>https://codekeeper.co/ticker/noisy-bear-targets-kazmunaygas-phishing-attack</loc><lastmod>2025-09-11</lastmod></url><url><loc>https://codekeeper.co/ticker/hightower-holding-cyberattack-personal-data-compromise</loc><lastmod>2026-03-27</lastmod></url><url><loc>https://codekeeper.co/ticker/google-sues-smishing-triad-phishing-scam</loc><lastmod>2025-11-12</lastmod></url><url><loc>https://codekeeper.co/ticker/ingram-micro-ransomware-attack-2025</loc><lastmod>2026-01-19</lastmod></url><url><loc>https://codekeeper.co/ticker/microsoft-patch-tuesday-october-2025</loc><lastmod>2025-10-15</lastmod></url><url><loc>https://codekeeper.co/ticker/pro-ukraine-hackers-disrupt-aeroflot-canceling-dozens-of-flights</loc><lastmod>2025-08-09</lastmod></url><url><loc>https://codekeeper.co/ticker/phantom-taurus-espionage-net-star-malware</loc><lastmod>2025-10-01</lastmod></url><url><loc>https://codekeeper.co/ticker/cybercriminal-zestix-global-data-breaches</loc><lastmod>2026-01-06</lastmod></url><url><loc>https://codekeeper.co/ticker/iranian-hackers-target-us-organizations</loc><lastmod>2026-03-06</lastmod></url><url><loc>https://codekeeper.co/ticker/ics-ot-exposure-rise-security-risk</loc><lastmod>2025-09-28</lastmod></url><url><loc>https://codekeeper.co/ticker/teampcp-hacks-major-open-source-platforms</loc><lastmod>2026-03-25</lastmod></url><url><loc>https://codekeeper.co/ticker/fake-claude-code-sites-spread-malware</loc><lastmod>2026-03-11</lastmod></url><url><loc>https://codekeeper.co/book-support-briefing-call</loc><lastmod>2026-02-24</lastmod></url><url><loc>https://codekeeper.co/articles/2022-fifa-world-cup-protecting-your-data-with-data-escrow</loc><lastmod>2025-09-02</lastmod></url><url><loc>https://codekeeper.co/articles/essential-assets-for-network-and-domain-protection</loc><lastmod>2025-07-24</lastmod></url><url><loc>https://codekeeper.co/ticker/hasbro-cyberattack-delays-shipments</loc><lastmod>2026-04-02</lastmod></url><url><loc>https://codekeeper.co/ticker/allianz-life-confirms-data-breach-affecting-majority-of-1.4-million-customers</loc><lastmod>2025-08-09</lastmod></url><url><loc>https://codekeeper.co/ticker/cybercriminals-exploit-screensaver-files</loc><lastmod>2026-02-05</lastmod></url><url><loc>https://codekeeper.co/ticker/albiriox-malware-threatens-banking-apps</loc><lastmod>2025-11-29</lastmod></url><url><loc>https://codekeeper.co/ticker/chinese-hackers-exploit-cisco-asa-zero-day</loc><lastmod>2025-09-29</lastmod></url></urlset>