<?xml version="1.0" encoding="utf-8" standalone="yes"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml"><url><loc>https://gridthegrey.com/categories/</loc><lastmod>2026-04-13T15:41:27+00:00</lastmod></url><url><loc>https://gridthegrey.com/threat_actors/cybercriminal/</loc><lastmod>2026-04-13T15:41:27+00:00</lastmod></url><url><loc>https://gridthegrey.com/frameworks/</loc><lastmod>2026-04-13T15:41:27+00:00</lastmod></url><url><loc>https://gridthegrey.com/</loc><lastmod>2026-04-13T15:41:27+00:00</lastmod></url><url><loc>https://gridthegrey.com/categories/industry-news/</loc><lastmod>2026-04-13T15:41:27+00:00</lastmod></url><url><loc>https://gridthegrey.com/posts/</loc><lastmod>2026-04-13T15:41:27+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/litellm/</loc><lastmod>2026-04-13T15:41:27+00:00</lastmod></url><url><loc>https://gridthegrey.com/categories/llm-security/</loc><lastmod>2026-04-13T15:41:27+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/llm-infrastructure/</loc><lastmod>2026-04-13T15:41:27+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/malicious-package/</loc><lastmod>2026-04-13T15:41:27+00:00</lastmod></url><url><loc>https://gridthegrey.com/frameworks/mitre-atlas/</loc><lastmod>2026-04-13T15:41:27+00:00</lastmod></url><url><loc>https://gridthegrey.com/frameworks/owasp-llm/</loc><lastmod>2026-04-13T15:41:27+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/pth-file-injection/</loc><lastmod>2026-04-13T15:41:27+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/pypi/</loc><lastmod>2026-04-13T15:41:27+00:00</lastmod></url><url><loc>https://gridthegrey.com/posts/python-supply-chain-compromise/</loc><lastmod>2026-04-13T15:41:27+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/python-security/</loc><lastmod>2026-04-13T15:41:27+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/sbom/</loc><lastmod>2026-04-13T15:41:27+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/sigstore/</loc><lastmod>2026-04-13T15:41:27+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/slsa/</loc><lastmod>2026-04-13T15:41:27+00:00</lastmod></url><url><loc>https://gridthegrey.com/categories/supply-chain/</loc><lastmod>2026-04-13T15:41:27+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/supply-chain-attack/</loc><lastmod>2026-04-13T15:41:27+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/</loc><lastmod>2026-04-13T15:41:27+00:00</lastmod></url><url><loc>https://gridthegrey.com/threat_actors/</loc><lastmod>2026-04-13T15:41:27+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/aeza-group/</loc><lastmod>2026-04-13T14:44:56+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/ai-infrastructure/</loc><lastmod>2026-04-13T14:44:56+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/botnet/</loc><lastmod>2026-04-13T14:44:56+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/comfyui/</loc><lastmod>2026-04-13T14:44:56+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/comfyui-manager/</loc><lastmod>2026-04-13T14:44:56+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/cryptomining/</loc><lastmod>2026-04-13T14:44:56+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/custom-nodes/</loc><lastmod>2026-04-13T14:44:56+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/flask-c2/</loc><lastmod>2026-04-13T14:44:56+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/lolminer/</loc><lastmod>2026-04-13T14:44:56+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/monero/</loc><lastmod>2026-04-13T14:44:56+00:00</lastmod></url><url><loc>https://gridthegrey.com/posts/over-1000-exposed-comfyui-instances-targeted-in-cryptomining-botnet-campaign/</loc><lastmod>2026-04-13T14:44:56+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/remote-code-execution/</loc><lastmod>2026-04-13T14:44:56+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/stable-diffusion/</loc><lastmod>2026-04-13T14:44:56+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/supply-chain/</loc><lastmod>2026-04-13T14:44:56+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/unauthenticated-access/</loc><lastmod>2026-04-13T14:44:56+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/xmrig/</loc><lastmod>2026-04-13T14:44:56+00:00</lastmod></url><url><loc>https://gridthegrey.com/categories/agentic-ai/</loc><lastmod>2026-04-13T14:39:34+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/agentic-ai/</loc><lastmod>2026-04-13T14:39:34+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/ai-agents/</loc><lastmod>2026-04-13T14:39:34+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/cloud-security/</loc><lastmod>2026-04-13T14:39:34+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/data-exfiltration/</loc><lastmod>2026-04-13T14:39:34+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/gcp/</loc><lastmod>2026-04-13T14:39:34+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/google-vertex-ai/</loc><lastmod>2026-04-13T14:39:34+00:00</lastmod></url><url><loc>https://gridthegrey.com/posts/google-s-vertex-ai-is-over-privileged-that-s-a-problem/</loc><lastmod>2026-04-13T14:39:34+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/infrastructure-access/</loc><lastmod>2026-04-13T14:39:34+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/least-privilege/</loc><lastmod>2026-04-13T14:39:34+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/over-privilege/</loc><lastmod>2026-04-13T14:39:34+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/palo-alto-networks/</loc><lastmod>2026-04-13T14:39:34+00:00</lastmod></url><url><loc>https://gridthegrey.com/categories/research/</loc><lastmod>2026-04-13T14:39:34+00:00</lastmod></url><url><loc>https://gridthegrey.com/threat_actors/researcher/</loc><lastmod>2026-04-13T14:39:34+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/active-exploitation/</loc><lastmod>2026-04-13T14:19:20+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/ai-agent-builder/</loc><lastmod>2026-04-13T14:19:20+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/code-injection/</loc><lastmod>2026-04-13T14:19:20+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/cve-2025-59528/</loc><lastmod>2026-04-13T14:19:20+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/cvss-10/</loc><lastmod>2026-04-13T14:19:20+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/flowise/</loc><lastmod>2026-04-13T14:19:20+00:00</lastmod></url><url><loc>https://gridthegrey.com/posts/flowise-ai-agent-builder-under-active-cvss-10-0-rce-exploitation-12000-instances/</loc><lastmod>2026-04-13T14:19:20+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/mcp/</loc><lastmod>2026-04-13T14:19:20+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/model-context-protocol/</loc><lastmod>2026-04-13T14:19:20+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/node-js/</loc><lastmod>2026-04-13T14:19:20+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/open-source-ai/</loc><lastmod>2026-04-13T14:19:20+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/rce/</loc><lastmod>2026-04-13T14:19:20+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/vulncheck/</loc><lastmod>2026-04-13T14:19:20+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/zero-day/</loc><lastmod>2026-04-13T14:19:20+00:00</lastmod></url><url><loc>https://gridthegrey.com/categories/adversarial-ml/</loc><lastmod>2026-04-11T19:15:56+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/ai-agent-security/</loc><lastmod>2026-04-11T19:15:56+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/benchmark-manipulation/</loc><lastmod>2026-04-11T19:15:56+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/capability-measurement/</loc><lastmod>2026-04-11T19:15:56+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/evaluation-harness/</loc><lastmod>2026-04-11T19:15:56+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/evaluation-integrity/</loc><lastmod>2026-04-11T19:15:56+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/exploit-agent/</loc><lastmod>2026-04-11T19:15:56+00:00</lastmod></url><url><loc>https://gridthegrey.com/posts/how-we-broke-top-ai-agent-benchmarks-and-what-comes-next/</loc><lastmod>2026-04-11T19:15:56+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/privilege-escalation/</loc><lastmod>2026-04-11T19:15:56+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/prompt-injection/</loc><lastmod>2026-04-11T19:15:56+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/reward-hacking/</loc><lastmod>2026-04-11T19:15:56+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/swe-bench/</loc><lastmod>2026-04-11T19:15:56+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/webarena/</loc><lastmod>2026-04-11T19:15:56+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/ai-security/</loc><lastmod>2026-04-11T09:21:26+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/anthropic/</loc><lastmod>2026-04-11T09:21:26+00:00</lastmod></url><url><loc>https://gridthegrey.com/posts/anthropic-claude-mythos-preview-the-more-capable-ai-becomes-the-more-security-it/</loc><lastmod>2026-04-11T09:21:26+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/claude/</loc><lastmod>2026-04-11T09:21:26+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/crowdstrike/</loc><lastmod>2026-04-11T09:21:26+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/executive-viewpoint/</loc><lastmod>2026-04-11T09:21:26+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/frontier-models/</loc><lastmod>2026-04-11T09:21:26+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/llm-security/</loc><lastmod>2026-04-11T09:21:26+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/mythos/</loc><lastmod>2026-04-11T09:21:26+00:00</lastmod></url><url><loc>https://gridthegrey.com/categories/regulatory/</loc><lastmod>2026-04-11T09:21:26+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/vendor-partnership/</loc><lastmod>2026-04-11T09:21:26+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/ai-cybersecurity/</loc><lastmod>2026-04-10T13:47:17+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/claude-mythos/</loc><lastmod>2026-04-10T13:47:17+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/code-leak/</loc><lastmod>2026-04-10T13:47:17+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/critical-infrastructure/</loc><lastmod>2026-04-10T13:47:17+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/financial-sector/</loc><lastmod>2026-04-10T13:47:17+00:00</lastmod></url><url><loc>https://gridthegrey.com/threat_actors/nation-state/</loc><lastmod>2026-04-10T13:47:17+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/offensive-ai/</loc><lastmod>2026-04-10T13:47:17+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/systemic-risk/</loc><lastmod>2026-04-10T13:47:17+00:00</lastmod></url><url><loc>https://gridthegrey.com/posts/us-summons-bank-bosses-over-cyber-risks-from-anthropic-s-latest-ai-model/</loc><lastmod>2026-04-10T13:47:17+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/us-treasury/</loc><lastmod>2026-04-10T13:47:17+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/vulnerability-discovery/</loc><lastmod>2026-04-10T13:47:17+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/access-controls/</loc><lastmod>2026-04-10T13:00:00+00:00</lastmod></url><url><loc>https://gridthegrey.com/posts/can-anthropic-keep-its-exploit-writing-ai-out-of-the-wrong-hands/</loc><lastmod>2026-04-10T13:00:00+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/dual-use/</loc><lastmod>2026-04-10T13:00:00+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/exploit-generation/</loc><lastmod>2026-04-10T13:00:00+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/llm-safety/</loc><lastmod>2026-04-10T13:00:00+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/ai-consumption/</loc><lastmod>2026-04-10T11:00:00+00:00</lastmod></url><url><loc>https://gridthegrey.com/posts/browser-extensions-are-the-new-ai-consumption-channel-that-no-one-is-talking/</loc><lastmod>2026-04-10T11:00:00+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/browser-extensions/</loc><lastmod>2026-04-10T11:00:00+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/browser-security/</loc><lastmod>2026-04-10T11:00:00+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/cookie-access/</loc><lastmod>2026-04-10T11:00:00+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/dlp-bypass/</loc><lastmod>2026-04-10T11:00:00+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/enterprise-security/</loc><lastmod>2026-04-10T11:00:00+00:00</lastmod></url><url><loc>https://gridthegrey.com/threat_actors/insider/</loc><lastmod>2026-04-10T11:00:00+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/llm-extensions/</loc><lastmod>2026-04-10T11:00:00+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/session-hijacking/</loc><lastmod>2026-04-10T11:00:00+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/shadow-ai/</loc><lastmod>2026-04-10T11:00:00+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/ungoverned-ai/</loc><lastmod>2026-04-10T11:00:00+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/autonomous-agents/</loc><lastmod>2026-04-09T06:00:55+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/excessive-agency/</loc><lastmod>2026-04-09T06:00:55+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/llm-tooling/</loc><lastmod>2026-04-09T06:00:55+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/persistent-bots/</loc><lastmod>2026-04-09T06:00:55+00:00</lastmod></url><url><loc>https://gridthegrey.com/posts/process-manager-for-autonomous-ai-agents/</loc><lastmod>2026-04-09T06:00:55+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/process-manager/</loc><lastmod>2026-04-09T06:00:55+00:00</lastmod></url><url><loc>https://gridthegrey.com/categories/prompt-injection/</loc><lastmod>2026-04-09T06:00:55+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/skill-modules/</loc><lastmod>2026-04-09T06:00:55+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/unattended-execution/</loc><lastmod>2026-04-09T06:00:55+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/web-dashboard/</loc><lastmod>2026-04-09T06:00:55+00:00</lastmod></url><url><loc>https://gridthegrey.com/posts/2026-04-13-ai-assisted-supply-chain-attack-targets-github/</loc><lastmod>2026-04-06T21:38:53+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/ai-assisted-attack/</loc><lastmod>2026-04-06T21:38:53+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/automated-targeting/</loc><lastmod>2026-04-06T21:38:53+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/github/</loc><lastmod>2026-04-06T21:38:53+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/llm-augmented-threat/</loc><lastmod>2026-04-06T21:38:53+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/misconfiguration-exploitation/</loc><lastmod>2026-04-06T21:38:53+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/prt-scan/</loc><lastmod>2026-04-06T21:38:53+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/repository-security/</loc><lastmod>2026-04-06T21:38:53+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/agentic-soc/</loc><lastmod>2026-04-06T16:52:49+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/ai-governance/</loc><lastmod>2026-04-06T16:52:49+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/ai-orchestration/</loc><lastmod>2026-04-06T16:52:49+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/charlotte-ai/</loc><lastmod>2026-04-06T16:52:49+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/endpoint-security/</loc><lastmod>2026-04-06T16:52:49+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/falcon-platform/</loc><lastmod>2026-04-06T16:52:49+00:00</lastmod></url><url><loc>https://gridthegrey.com/posts/how-charlotte-ai-agentworks-fuels-security-s-agentic-ecosystem/</loc><lastmod>2026-04-06T16:52:49+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/multi-agent-systems/</loc><lastmod>2026-04-06T16:52:49+00:00</lastmod></url><url><loc>https://gridthegrey.com/posts/new-crowdstrike-innovations-secure-ai-agents-and-govern-shadow-ai-across-saas/</loc><lastmod>2026-04-06T16:52:49+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/saas-security/</loc><lastmod>2026-04-06T16:52:49+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/security-operations/</loc><lastmod>2026-04-06T16:52:49+00:00</lastmod></url><url><loc>https://gridthegrey.com/posts/2026-04-13-claude-source-code-leak-highlights-big-supply-chain-missteps/</loc><lastmod>2026-04-03T13:00:00+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/code-exposure/</loc><lastmod>2026-04-03T13:00:00+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/insider-threat/</loc><lastmod>2026-04-03T13:00:00+00:00</lastmod></url><url><loc>https://gridthegrey.com/categories/model-theft/</loc><lastmod>2026-04-03T13:00:00+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/model-theft/</loc><lastmod>2026-04-03T13:00:00+00:00</lastmod></url><url><loc>https://gridthegrey.com/tags/source-code-leak/</loc><lastmod>2026-04-03T13:00:00+00:00</lastmod></url><url><loc>https://gridthegrey.com/categories/data-poisoning/</loc></url><url><loc>https://gridthegrey.com/categories/jailbreaks/</loc></url></urlset>