<?xml version="1.0" encoding="utf-8" standalone="yes"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml"><url><loc>https://gridthegrey.com/categories/agentic-ai/</loc><lastmod>2026-04-11T09:21:26+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/agentic-ai/</loc><lastmod>2026-04-11T09:21:26+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/ai-security/</loc><lastmod>2026-04-11T09:21:26+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/anthropic/</loc><lastmod>2026-04-11T09:21:26+00:00</lastmod></url><url><loc>https://gridthegrey.com/posts/anthropic-claude-mythos-preview-the-more-capable-ai-becomes-the-more-security-it/</loc><lastmod>2026-04-11T09:21:26+00:00</lastmod></url><url><loc>https://gridthegrey.com/categories/</loc><lastmod>2026-04-11T09:21:26+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/claude/</loc><lastmod>2026-04-11T09:21:26+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/crowdstrike/</loc><lastmod>2026-04-11T09:21:26+00:00</lastmod></url><url><loc>https://gridthegrey.com/threat_actors/cybercriminal/</loc><lastmod>2026-04-11T09:21:26+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/executive-viewpoint/</loc><lastmod>2026-04-11T09:21:26+00:00</lastmod></url><url><loc>https://gridthegrey.com/frameworks/</loc><lastmod>2026-04-11T09:21:26+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/frontier-models/</loc><lastmod>2026-04-11T09:21:26+00:00</lastmod></url><url><loc>https://gridthegrey.com/</loc><lastmod>2026-04-11T09:21:26+00:00</lastmod></url><url><loc>https://gridthegrey.com/categories/industry-news/</loc><lastmod>2026-04-11T09:21:26+00:00</lastmod></url><url><loc>https://gridthegrey.com/posts/</loc><lastmod>2026-04-11T09:21:26+00:00</lastmod></url><url><loc>https://gridthegrey.com/categories/llm-security/</loc><lastmod>2026-04-11T09:21:26+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/llm-security/</loc><lastmod>2026-04-11T09:21:26+00:00</lastmod></url><url><loc>https://gridthegrey.com/frameworks/mitre-atlas/</loc><lastmod>2026-04-11T09:21:26+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/mythos/</loc><lastmod>2026-04-11T09:21:26+00:00</lastmod></url><url><loc>https://gridthegrey.com/frameworks/owasp-llm/</loc><lastmod>2026-04-11T09:21:26+00:00</lastmod></url><url><loc>https://gridthegrey.com/categories/regulatory/</loc><lastmod>2026-04-11T09:21:26+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/</loc><lastmod>2026-04-11T09:21:26+00:00</lastmod></url><url><loc>https://gridthegrey.com/threat_actors/</loc><lastmod>2026-04-11T09:21:26+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/vendor-partnership/</loc><lastmod>2026-04-11T09:21:26+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/ai-cybersecurity/</loc><lastmod>2026-04-10T13:47:17+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/claude-mythos/</loc><lastmod>2026-04-10T13:47:17+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/code-leak/</loc><lastmod>2026-04-10T13:47:17+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/critical-infrastructure/</loc><lastmod>2026-04-10T13:47:17+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/financial-sector/</loc><lastmod>2026-04-10T13:47:17+00:00</lastmod></url><url><loc>https://gridthegrey.com/threat_actors/nation-state/</loc><lastmod>2026-04-10T13:47:17+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/offensive-ai/</loc><lastmod>2026-04-10T13:47:17+00:00</lastmod></url><url><loc>https://gridthegrey.com/categories/research/</loc><lastmod>2026-04-10T13:47:17+00:00</lastmod></url><url><loc>https://gridthegrey.com/threat_actors/researcher/</loc><lastmod>2026-04-10T13:47:17+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/systemic-risk/</loc><lastmod>2026-04-10T13:47:17+00:00</lastmod></url><url><loc>https://gridthegrey.com/posts/us-summons-bank-bosses-over-cyber-risks-from-anthropic-s-latest-ai-model/</loc><lastmod>2026-04-10T13:47:17+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/us-treasury/</loc><lastmod>2026-04-10T13:47:17+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/vulnerability-discovery/</loc><lastmod>2026-04-10T13:47:17+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/access-controls/</loc><lastmod>2026-04-10T13:00:00+00:00</lastmod></url><url><loc>https://gridthegrey.com/posts/can-anthropic-keep-its-exploit-writing-ai-out-of-the-wrong-hands/</loc><lastmod>2026-04-10T13:00:00+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/dual-use/</loc><lastmod>2026-04-10T13:00:00+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/exploit-generation/</loc><lastmod>2026-04-10T13:00:00+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/llm-safety/</loc><lastmod>2026-04-10T13:00:00+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/zero-day/</loc><lastmod>2026-04-10T13:00:00+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/agentic-soc/</loc><lastmod>2026-04-06T16:52:49+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/ai-agents/</loc><lastmod>2026-04-06T16:52:49+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/ai-governance/</loc><lastmod>2026-04-06T16:52:49+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/ai-orchestration/</loc><lastmod>2026-04-06T16:52:49+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/autonomous-agents/</loc><lastmod>2026-04-06T16:52:49+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/charlotte-ai/</loc><lastmod>2026-04-06T16:52:49+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/cloud-security/</loc><lastmod>2026-04-06T16:52:49+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/endpoint-security/</loc><lastmod>2026-04-06T16:52:49+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/falcon-platform/</loc><lastmod>2026-04-06T16:52:49+00:00</lastmod></url><url><loc>https://gridthegrey.com/posts/how-charlotte-ai-agentworks-fuels-security-s-agentic-ecosystem/</loc><lastmod>2026-04-06T16:52:49+00:00</lastmod></url><url><loc>https://gridthegrey.com/threat_actors/insider/</loc><lastmod>2026-04-06T16:52:49+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/multi-agent-systems/</loc><lastmod>2026-04-06T16:52:49+00:00</lastmod></url><url><loc>https://gridthegrey.com/posts/new-crowdstrike-innovations-secure-ai-agents-and-govern-shadow-ai-across-saas/</loc><lastmod>2026-04-06T16:52:49+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/saas-security/</loc><lastmod>2026-04-06T16:52:49+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/security-operations/</loc><lastmod>2026-04-06T16:52:49+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/shadow-ai/</loc><lastmod>2026-04-06T16:52:49+00:00</lastmod></url><url><loc>https://gridthegrey.com/categories/adversarial-ml/</loc></url><url><loc>https://gridthegrey.com/categories/data-poisoning/</loc></url><url><loc>https://gridthegrey.com/categories/jailbreaks/</loc></url><url><loc>https://gridthegrey.com/categories/prompt-injection/</loc></url><url><loc>https://gridthegrey.com/categories/supply-chain/</loc></url></urlset>