<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://research.hisolutions.com/sitemap.xsl"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd">
<!-- Sitemap wurde am 2026-04-02 11:14:23 GMT erstellt -->
	<url>
		<loc>https://research.hisolutions.com/</loc>
		<lastmod>2026-03-25T11:06:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/hier-schreiben/</loc>
		<lastmod>2024-05-23T08:21:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/forschungsprojekte/rekom-s/</loc>
		<lastmod>2024-07-12T09:37:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/forschungsprojekte/its-overview/</loc>
		<lastmod>2018-10-31T11:06:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/forschungsprojekte/</loc>
		<lastmod>2018-10-31T11:04:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/forschungsprojekte/aqua-it-lab/</loc>
		<lastmod>2018-10-31T10:59:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/kontakt/</loc>
		<lastmod>2022-11-03T08:22:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/hisolutions-research/</loc>
		<lastmod>2021-01-20T17:03:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2026/03/grundschutz-mehr-resilienz-in-der-informationssicherheit/</loc>
		<lastmod>2026-03-27T07:55:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2026/03/vertrauen-im-digitalen-zeitalter/</loc>
		<lastmod>2026-03-11T22:26:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2026/02/owasp-top-102025-wenn-framework-komplexitaet-zum-geschaeftsrisiko-wird/</loc>
		<lastmod>2026-02-26T10:59:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2026/02/openclaw-die-real-world-bestaetigung-der-mcp-risikoachsen/</loc>
		<lastmod>2026-02-12T10:02:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2025/12/cybersicherheit-2026-ein-blick-in-die-glaskugel/</loc>
		<lastmod>2025-12-17T09:57:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2025/09/kennwortrichtlinien-im-active-directory-ein-missverstaendnis-mit-folgen/</loc>
		<lastmod>2025-09-19T06:06:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2025/09/serious-gaming-im-business-continuity-management/</loc>
		<lastmod>2025-09-16T06:58:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2025/09/ueber-zero-click-chains-und-das-security-modell-von-mobilgeraeten/</loc>
		<lastmod>2025-09-10T13:52:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2025/09/die-dunkle-seite-des-model-context-protocols/</loc>
		<lastmod>2025-09-15T07:40:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2025/09/klassische-phishing-simulationen-sind-tot-lang-lebe-der-phishing-drill/</loc>
		<lastmod>2025-09-08T08:03:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2025/08/erkenntnisse-aus-dem-stackoverflow-developer-survey-2025/</loc>
		<lastmod>2025-08-27T14:12:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2025/08/red-team-glossar/</loc>
		<lastmod>2026-03-27T10:05:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2025/07/a-tale-of-practical-keylogger-forensics/</loc>
		<lastmod>2025-12-09T10:48:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2025/07/security-first-sichere-softwareentwicklung/</loc>
		<lastmod>2025-12-16T12:54:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2025/07/staatlicher-zugriff-auf-verschluesselung-ein-zweischneidiges-schwert/</loc>
		<lastmod>2025-07-11T08:18:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2025/06/windows-angriffe-entgegen-der-vertrauensstellung/</loc>
		<lastmod>2025-08-06T13:08:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2025/06/high-street-retailer-im-ziel-von-ransomware-gruppen/</loc>
		<lastmod>2025-07-11T08:21:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2025/05/woher-kommen-eigentlich-zero-days/</loc>
		<lastmod>2025-05-16T09:42:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2025/05/drohende-abschaltung-der-cve-datenbank-und-moegliche-alternativen/</loc>
		<lastmod>2025-05-05T13:08:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2025/04/rolling-in-the-deepweb-lazarus-tsunami/</loc>
		<lastmod>2025-04-25T09:08:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2025/04/signalgate/</loc>
		<lastmod>2025-04-11T07:03:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2025/03/ki-agenten-anfaellig-fuer-einfache-gefaehrliche-angriffe/</loc>
		<lastmod>2025-03-13T09:20:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2025/02/higuide-eu-cer-richtlinie-eu-2022-2557/</loc>
		<lastmod>2025-02-27T07:06:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2025/02/bsi-zertifiziert-quantensichere-smartcard/</loc>
		<lastmod>2025-02-13T08:27:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2025/01/usb-schnittstellen-unter-windows-absichern/</loc>
		<lastmod>2025-01-23T11:24:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2025/01/freigiebiger-datenreichtum-bei-vw/</loc>
		<lastmod>2025-01-16T13:27:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2025/01/wie-funktioniert-eigentlich-malware-auf-handys/</loc>
		<lastmod>2025-01-16T13:28:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2024/12/lageberichte-und-erkenntnisse-aus-dem-jahr-2024/</loc>
		<lastmod>2024-12-12T13:01:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2024/11/bsi-grundschutz-krypto-kataster-ein-baustein-fuer-die-aufrechterhaltung-einer-sicheren-it-infrastruktur/</loc>
		<lastmod>2024-11-18T09:02:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2024/11/perimeter-defense/</loc>
		<lastmod>2024-11-14T13:37:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2024/10/wsus-mit-oder-ohne-ende/</loc>
		<lastmod>2024-10-17T11:54:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2024/10/sap-auf-allzeithoch-draengt-kunden-in-die-cloud/</loc>
		<lastmod>2024-10-16T18:26:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2024/09/sind-17-jahre-noch-echtzeit/</loc>
		<lastmod>2024-09-26T06:34:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2024/08/bewerbungsgespraech-mit-einem-angreifer/</loc>
		<lastmod>2024-08-08T07:02:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2024/07/schwachstelle-oeffnet-tueren-in-mehr-als-3-000-hotels/</loc>
		<lastmod>2024-07-26T07:58:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2024/07/wofuer-braucht-es-xlas-am-digital-workplace/</loc>
		<lastmod>2024-08-29T12:34:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2024/07/luecken-sichtbar-machen/</loc>
		<lastmod>2025-04-16T08:37:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2024/06/how-to-detect-the-modular-rat-csharp-streamer/</loc>
		<lastmod>2024-06-26T08:00:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2024/06/ai-security-und-ai-safety/</loc>
		<lastmod>2024-06-18T16:49:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2024/06/happy-birthday-syn-ack/</loc>
		<lastmod>2024-06-13T05:55:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2024/05/gps-jamming-in-europa/</loc>
		<lastmod>2024-05-16T07:43:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2024/04/wie-itsm-die-nis2-compliance-unterstuetzt/</loc>
		<lastmod>2024-08-29T12:34:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2024/04/die-backdoor-die-das-internet-bedrohte/</loc>
		<lastmod>2024-04-18T08:43:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2024/04/xz-backdoor-eine-aufarbeitung/</loc>
		<lastmod>2024-07-15T07:25:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2024/03/cve-2024-24272-dualsafe-password-manager-leaks-credentials/</loc>
		<lastmod>2024-03-19T20:01:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2024/03/lockbit-lebt-noch/</loc>
		<lastmod>2024-07-31T08:15:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2024/02/security-by-service-design/</loc>
		<lastmod>2024-04-02T11:32:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2024/02/warum-sind-workplace-projekte-so-komplex/</loc>
		<lastmod>2024-08-29T12:35:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2024/02/ivantis-vpn-software-von-neuen-schwachstellen-heimgesucht/</loc>
		<lastmod>2024-02-08T08:29:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2024/01/kurioses-um-nis2/</loc>
		<lastmod>2024-07-31T08:14:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2024/01/veroeffentlichen-aber-verantwortungsvoll-responsible-disclosure/</loc>
		<lastmod>2024-01-11T08:33:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2024/01/multiple-vulnerabilities-in-wordpress-plugin-wpvivid-backup-and-migration/</loc>
		<lastmod>2024-02-29T09:09:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2024/01/m365-nicht-der-richtige-deckel-fuer-jeden-topf/</loc>
		<lastmod>2024-08-29T12:35:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2024/01/smtp-smuggling-fallout-oder-wer-muss-jetzt-eigentlich-was-patchen/</loc>
		<lastmod>2024-01-04T14:29:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2024/01/smtp-smuggling-fallout-or-who-should-patch-now-what-and-how/</loc>
		<lastmod>2024-01-04T14:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2023/12/produktiver-durch-mehr-sicherheitsmassnahmen/</loc>
		<lastmod>2023-12-14T06:47:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2023/11/frohe-neue-100-000-000/</loc>
		<lastmod>2023-11-16T09:23:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2023/10/es-ist-nicht-immer-mfa-wenn-mfa-draufsteht/</loc>
		<lastmod>2023-10-19T11:04:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2023/09/was-haben-drei-toene-mit-informationssicherheit-zu-tun/</loc>
		<lastmod>2024-07-12T09:38:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2023/08/die-sommerluecken-kommen/</loc>
		<lastmod>2023-08-10T08:10:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2023/08/llms-sind-auch-nur-schuetzenswerte-informationen/</loc>
		<lastmod>2023-08-14T07:45:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2023/07/eine-10-von-10-ivanti-cve-2023%e2%80%9135078-hilfe-zur-selbsthilfe/</loc>
		<lastmod>2023-08-10T13:35:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2023/07/ki-betruegt-betrueger/</loc>
		<lastmod>2023-07-26T09:32:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2023/06/wenn-die-sicherheitsappliance-die-luecke-ist/</loc>
		<lastmod>2023-06-15T10:48:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2023/05/passt-das-passwort-noch/</loc>
		<lastmod>2023-05-17T18:41:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2023/04/xss-auf-abwegen/</loc>
		<lastmod>2023-04-27T07:44:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2023/04/wenn-der-patch-zum-trojaner-wird/</loc>
		<lastmod>2023-04-13T15:49:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2023/03/acropalypse-now/</loc>
		<lastmod>2023-03-27T20:32:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2023/03/keine-informationssicherheit-kein-job-mehr/</loc>
		<lastmod>2023-03-23T08:42:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2023/02/wenn-der-white-hat-hacker-anruft-aber-niemand-rangeht/</loc>
		<lastmod>2023-02-17T07:50:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2023/01/arbitrary-file-read-vulnerability-php-library-nuovo-spreadsheet-reader-0-5-11/</loc>
		<lastmod>2024-01-04T16:11:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2023/01/doch-lieber-zettel-unter-der-tastatur-sicherheitsluecken-in-passwortmanagern/</loc>
		<lastmod>2023-01-12T10:35:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2023/01/vom-berater-bis-zum-angreifer-computer-uebernehmen-die-jobs/</loc>
		<lastmod>2023-01-12T10:46:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2022/11/compliance-bingo-und-checklisten-fetisch-die-suche-nach-nachhaltiger-security/</loc>
		<lastmod>2022-11-25T10:23:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2022/10/caught-in-the-act-of-product-security-eu-cyber-resilience-act/</loc>
		<lastmod>2022-10-27T10:08:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2022/10/wann-lohnt-sich-der-quantensprung-post-quanten-kryptographie/</loc>
		<lastmod>2022-10-19T12:46:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2022/09/uberfaellig-gehackt-via-mfa-fatigue/</loc>
		<lastmod>2022-10-27T10:06:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2022/08/da-warens-nur-noch-sieben-naechster-quantensicherer-algorithmus-sike-gebrochen/</loc>
		<lastmod>2022-08-18T07:40:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2022/08/aepic-leak-schwachstelle-in-intel-cpu-mikroarchitektur-bedroht-sgx/</loc>
		<lastmod>2022-08-18T07:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2022/08/hafnium-ueberwachen-ihrer-systeme-mit-loki/</loc>
		<lastmod>2022-08-02T15:40:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2022/07/nist-post-quantum-cryptography-wettbewerb-geht-in-die-vierte-runde/</loc>
		<lastmod>2022-08-18T07:53:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2022/06/abfragwuerdig-queryable-encryption-wird-praktikabel/</loc>
		<lastmod>2022-06-30T08:32:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2022/05/der-wahre-hackback-ukrainische-it-armee-meldet-erfolge/</loc>
		<lastmod>2022-05-25T10:34:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2022/04/jirassic-park-das-zwischenzeitliche-aussterben-der-confluencer/</loc>
		<lastmod>2022-05-30T07:02:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2022/03/apres-kasper-ski-warnungen-vor-russischer-software/</loc>
		<lastmod>2024-07-12T10:01:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2022/02/hybrider-cyberkrieg-angriffe-auf-die-ukraine-und-westeuropa/</loc>
		<lastmod>2022-03-29T23:44:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2022/02/passwordle/</loc>
		<lastmod>2024-07-12T09:41:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2022/01/die-macht-der-osint-geheimdienste-enttarnen-leichtgemacht/</loc>
		<lastmod>2022-01-28T14:33:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2021/12/log4shell-hisolutions-self-help-guide-log4j/</loc>
		<lastmod>2022-01-04T22:57:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2021/12/log4shell-schwachstelle-in-log4j-ueberblick/</loc>
		<lastmod>2022-01-04T22:55:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2021/12/log4shell-massive-bedrohung-durch-schwachstelle-in-bibliothek-log4j/</loc>
		<lastmod>2021-12-13T13:44:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2021/11/ryuk-zuck-conti-nentaldrift-die-wandlung-der-ransomware/</loc>
		<lastmod>2021-11-25T13:12:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2021/10/gemeindeheit-kommunen-im-visier/</loc>
		<lastmod>2021-10-28T10:48:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2021/09/hisolutions-schwachstellenreport-2021/</loc>
		<lastmod>2022-08-11T10:39:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2021/08/keine-gaudi-fast-super-cloud-gau-bei-microsoft/</loc>
		<lastmod>2021-08-30T08:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2021/08/der-0-millionen-dollar-raub-mr-white-hat-gibts-zurueck/</loc>
		<lastmod>2021-08-27T11:03:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2021/07/6-jahre-branchenspezifische-sicherheitsstandards-b3s-eine-bestandsaufnahme-im-vergleich/</loc>
		<lastmod>2021-07-07T15:44:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2021/07/show-your-highnis-highlights-des-eu-nis-investment-reports/</loc>
		<lastmod>2021-07-07T15:25:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2021/04/verbaendeanhoerung-zur-neuen-kritis-verordnung/</loc>
		<lastmod>2021-04-30T07:59:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2021/04/it-sicherheitsgesetz-2-0-verabschiedet/</loc>
		<lastmod>2021-04-29T15:41:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2021/04/kein-ende-zu-ende-gut-alles-gut-bei-e-mail/</loc>
		<lastmod>2021-04-22T10:35:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2021/04/owasp-mehr-als-die-top-10-sicherheitsrisiken-fuer-webanwendungen/</loc>
		<lastmod>2024-07-12T10:05:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2021/04/hafnium-reloaded-wieder-kritische-schwachstelle-in-microsoft-exchange/</loc>
		<lastmod>2021-04-14T07:49:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2021/03/hafnium-proxylogon-self-help-guide-to-securing-microsoft-exchange/</loc>
		<lastmod>2021-03-25T22:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2021/03/hafnium-schwachstellen-office-365-microsoft-365-ad-fs-indirekt-auch-bedroht/</loc>
		<lastmod>2021-03-26T10:03:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2021/03/hafnium-exchange-schwachstellen-ueberblick/</loc>
		<lastmod>2022-08-11T10:46:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2021/03/hisolutions-discovers-new-hafnium-proxylogon-iocs/</loc>
		<lastmod>2021-03-23T13:41:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2021/03/schutz-gegen-ransomware-hisolutions-selbsthilfe-offline-backup/</loc>
		<lastmod>2021-03-19T09:52:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2021/03/hisolutions-entdeckt-neue-hafnium-proxylogon-iocs/</loc>
		<lastmod>2021-03-23T13:41:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2021/03/hafnium-eine-hilfestellung-zur-ueberwachung-ihrer-systeme/</loc>
		<lastmod>2022-08-02T15:35:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2021/03/hafnium-selbsthilfe-microsoft-exchange/</loc>
		<lastmod>2021-03-25T23:03:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2021/03/hafnium-akute-angriffswelle-auf-microsoft-exchange-owa/</loc>
		<lastmod>2021-03-23T13:41:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2021/02/hold-my-bia-vergiftet-oder-erfroren-welche-ist-die-kritischste-dienstleistung/</loc>
		<lastmod>2021-02-25T16:22:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2021/02/nicht-ueber-den-jordan-gehen-tiber-eu/</loc>
		<lastmod>2021-02-15T14:42:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2021/01/warum-der-mittelstand-besonders-auf-it-sicherheit-achten-sollte/</loc>
		<lastmod>2021-09-08T09:13:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2021/01/phishing-per-sms-smishing-angriffe-haeufen-sich/</loc>
		<lastmod>2021-01-22T13:44:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2021/01/von-decryption-und-signing-oracles-covert-content-angriffe-auf-e-mail/</loc>
		<lastmod>2021-01-20T10:33:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2021/01/umsetzung-des-%c2%a78a-bsig-in-der-praxis/</loc>
		<lastmod>2021-01-19T15:41:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2021/01/sassy-buzzword-erobert-sase-die-welt/</loc>
		<lastmod>2021-02-11T15:12:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2021/01/zdf-wiso-gestohlene-payback-punkte/</loc>
		<lastmod>2024-07-31T08:13:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2021/01/ich-wars-nicht-cyberwars-katastrophenarmee/</loc>
		<lastmod>2021-02-11T15:30:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2020/12/die-ikarussen-kommen-flaechensonnenbrand-in-it-land-solarwinds-sunburst-supply-chain-angriff/</loc>
		<lastmod>2021-01-06T12:21:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2020/12/solarwinds-sunburst-supply-chain-angriff/</loc>
		<lastmod>2021-01-06T12:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2020/12/zdf-doku-gestohlene-identitaeten/</loc>
		<lastmod>2024-07-31T08:20:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2020/11/gestorben-mit-nicht-an-cyber/</loc>
		<lastmod>2020-12-08T15:55:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2020/10/wo-bleibt-die-excel-ends-initiative-ms-excel-frisst-corona-daten/</loc>
		<lastmod>2020-10-29T16:48:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2020/09/totgecybert-kollateralschaeden-von-ransomware/</loc>
		<lastmod>2020-10-29T16:46:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2020/09/securing-dns-traffic-an-introduction-to-dot-doh/</loc>
		<lastmod>2020-09-15T12:56:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2020/09/warnung-aktuelle-ransomware-angriffe-als-folge-von-shitrix/</loc>
		<lastmod>2020-12-01T16:59:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2020/09/warning-current-ransomware-attacks-as-a-result-of-shitrix/</loc>
		<lastmod>2024-07-31T08:11:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2020/08/web-vulnerabilities-are-coming-to-the-desktop-again-rces-and-other-vulnerabilities-in-teamwire/</loc>
		<lastmod>2024-01-30T11:37:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2020/08/hier-bin-ich-mensch-hier-schreib-ichs-rein-ki-textet-taeuschend-echt/</loc>
		<lastmod>2020-10-29T16:40:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2020/08/oauth-phishing/</loc>
		<lastmod>2020-08-19T15:38:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2020/07/malen-ohne-war-einmal-malware-fuer-macs/</loc>
		<lastmod>2023-01-12T10:44:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2020/07/high-impact-vulnerabilites-in-multiple-usb-network-servers/</loc>
		<lastmod>2020-08-05T11:38:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2020/06/ruck-ohne-hau-corona-warn-app-kein-security-albtraum/</loc>
		<lastmod>2024-07-12T09:08:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2020/05/von-penetrationstests-bis-konfig-review/</loc>
		<lastmod>2021-09-10T09:48:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2020/05/hisolutions-schwachstellen-report-2020/</loc>
		<lastmod>2021-09-10T09:50:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2020/04/death-by-datenschutz-die-grenzen-der-anonymitat/</loc>
		<lastmod>2021-03-03T13:53:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2020/04/passwort-audits/</loc>
		<lastmod>2020-04-30T08:57:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2020/04/open-the-gates-insecurity-of-cloudless-smart-door-systems/</loc>
		<lastmod>2020-05-07T08:23:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2020/03/der-mensch-bleibt-dem-menschen-ein-wolf-cyber-in-zeiten-von-corona/</loc>
		<lastmod>2021-03-03T13:53:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2020/02/ich-weiss-wo-du-online-geld-verdienst-cyber-ok-lernt-dazu/</loc>
		<lastmod>2021-03-03T13:53:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2020/01/keynote-bei-den-machine-learning-essentials-heidelberg-17-19-2-2020/</loc>
		<lastmod>2020-01-29T13:03:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2020/01/when-shitrix-hits-the-fan/</loc>
		<lastmod>2020-01-29T14:03:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2019/12/shift-left-linksruck-im-neuland/</loc>
		<lastmod>2020-06-15T11:13:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2019/11/bluekeep-of-death-kommt-der-naechste-wurm/</loc>
		<lastmod>2020-06-15T11:17:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2019/10/sie-sind-unter-uns-cyber-einheiten-in-der-eu/</loc>
		<lastmod>2020-06-15T11:16:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2019/10/die-kehrseite-der-monokultur-zeroday-inflation-bei-ios/</loc>
		<lastmod>2020-06-15T11:14:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2019/08/proof-of-does-not-work-e-voting-unsicher-trotz-blockchain/</loc>
		<lastmod>2020-06-15T11:15:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2019/07/alles-ist-verbunden-multiple-single-points-of-failure/</loc>
		<lastmod>2019-08-14T11:39:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2019/06/paging-muenchhausen-cloud-braucht-cloud/</loc>
		<lastmod>2019-11-26T11:44:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2019/06/n1ql-injection-in-couchbase-sync-gateway-cve-2019-9039/</loc>
		<lastmod>2023-06-26T10:49:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2019/06/web-vulnerabilities-are-coming-to-the-desktop-template-injections-lead-to-rce-in-teamwire/</loc>
		<lastmod>2019-06-28T09:49:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2019/05/wild-thing-you-make-my-heart-sing-0days-in-the-wild/</loc>
		<lastmod>2020-06-15T09:20:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2019/02/sicher-in-die-wolken/</loc>
		<lastmod>2019-06-25T09:56:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2018/10/firmen-buhlen-um-it-sicherheitsfachkraefte/</loc>
		<lastmod>2018-11-01T06:41:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2018/10/race-against-the-machine-will-ml-help-or-kill-security/</loc>
		<lastmod>2018-10-29T00:38:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2018/02/konzernweite-steuerung-des-cyberrisikos-bei-innogy/</loc>
		<lastmod>2018-10-29T00:11:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://research.hisolutions.com/2017/01/start/</loc>
		<lastmod>2019-06-25T10:00:10+00:00</lastmod>
	</url>
</urlset>
<!-- Sitemap wird aus dem Cache geliefert -->
