<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="https://www.crowdstrike.com/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-launch/</loc>
		<lastmod>2012-02-22T01:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/Blue.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-intelligence-adversary-based-approach/</loc>
		<lastmod>2012-06-12T01:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/Blue.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/unpacking-dynamically-allocated-code/</loc>
		<lastmod>2012-10-29T01:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/Blue.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/http-iframe-injecting-linux-rootkit/</loc>
		<lastmod>2012-11-19T01:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/Blue.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/free-community-tool-crowdinspect/</loc>
		<lastmod>2013-02-28T01:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/Blue.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/whois-anchor-panda/</loc>
		<lastmod>2013-03-22T17:50:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2013/03/AnchorPanda_0-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/whois-numbered-panda/</loc>
		<lastmod>2013-03-29T09:35:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/Blue.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/whois-clever-kitten/</loc>
		<lastmod>2013-04-04T21:29:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/Blue.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/whois-samurai-panda/</loc>
		<lastmod>2013-04-12T22:00:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/Blue.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/dns-lifeblood-your-domain/</loc>
		<lastmod>2013-08-30T07:23:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/Blue.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/viceroy-tiger-delivers-new-zero-day-exploit/</loc>
		<lastmod>2013-11-06T06:51:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/Blue.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/analysis-cve-2013-3906-exploit/</loc>
		<lastmod>2013-12-10T09:31:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/Blue.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/evolution-protected-processes-part-2-exploitjailbreak-mitigations-unkillable-processes-and/</loc>
		<lastmod>2013-12-11T12:36:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/Blue.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/protected-processes-part-3-windows-pki-internals-signing-levels-scenarios-signers-root-keys/</loc>
		<lastmod>2014-01-08T11:24:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/Blue.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/through-window-creative-code-invocation/</loc>
		<lastmod>2014-02-05T01:28:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/Blue.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/native-java-bytecode-debugging-without-source-code/</loc>
		<lastmod>2014-02-12T01:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/Blue.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2014/02/pngbase645d60aef8c7557e95-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2014/02/pngbase64d6ea17c17e000ade-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2014/02/pngbase64cccd2ddaba2f8ce5-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2014/02/pngbase6450de3b4d71d6cc5e-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/mo-shells-mo-problems-deep-panda-web-shells/</loc>
		<lastmod>2014-02-20T01:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/Blue.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/12/tech-partners-iMac.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/mo-shells-mo-problems-file-list-stacking/</loc>
		<lastmod>2014-03-07T01:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/Blue.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/new-community-tool-crowdresponse/</loc>
		<lastmod>2014-03-12T01:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/Blue.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/mo-shells-mo-problems-web-server-log-analysis/</loc>
		<lastmod>2014-03-19T01:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/Blue.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/mo-shells-mo-problems-network-detection/</loc>
		<lastmod>2014-03-28T13:03:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/Blue.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/11/March-Capital-logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/cat-scratch-fever-crowdstrike-tracks-newly-reported-iranian-actor-flying-kitten/</loc>
		<lastmod>2014-05-13T12:31:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/Blue.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/12/gcp-graphic-3.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/12/google-cloud.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/new-crowdresponse-modules/</loc>
		<lastmod>2014-05-20T09:55:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/Blue.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/gameover/</loc>
		<lastmod>2014-06-04T11:39:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/Blue.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/registry-analysis-with-crowdresponse/</loc>
		<lastmod>2014-08-28T19:28:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/Blue.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2014/09/Image1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2014/09/Image2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2014/09/Image3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2014/09/Image4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2014/09/Image5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/occupy-central-the-umbrella-revolution-and-chinese-intelligence/</loc>
		<lastmod>2014-10-02T22:47:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2014/10/OccupyCentralRally-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/mitigating-bash-shellshock/</loc>
		<lastmod>2014-10-08T14:22:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/Blue.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2014/10/Graphic1New.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2014/10/Graphic2New.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2014/10/Graphic3New.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2014/10/Graphic4New.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2014/10/Graphic5New.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2014/10/Graphic6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2014/10/1b.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2014/10/2a.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/adversary-manifesto-qa-crowdstrikes-adam-meyers/</loc>
		<lastmod>2014-10-15T13:25:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/Blue.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/cybercrime-cybersecurity-affects-nations-geopolitics/</loc>
		<lastmod>2014-10-20T16:00:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2014/10/shutterstock_169722995-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/peering-around-corner/</loc>
		<lastmod>2014-11-10T00:00:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/Blue.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/prevention-continuum-preventing-silent-failure/</loc>
		<lastmod>2014-11-20T17:28:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2014/11/blog-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2014/11/body-copy.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/ironman-deep-panda-uses-sakula-malware-target-organizations-multiple-sectors/</loc>
		<lastmod>2014-11-24T16:17:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/Blue.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2014/11/Maltego-Blog-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/sheep-year-kernel-heap-fengshui-spraying-big-kids-pool/</loc>
		<lastmod>2014-12-31T20:01:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/Blue.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/cyber-kung-fu-great-firewall-art-dns-poisoning/</loc>
		<lastmod>2015-02-23T14:57:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/Blue.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/sysmon-2/</loc>
		<lastmod>2015-02-24T00:30:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/Blue.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/surgeon-with-a-shotgun-memory-forensics/</loc>
		<lastmod>2015-03-23T11:25:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/Blue.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/chopping-packets-decoding-china-chopper-web-shell-traffic-over-ssl/</loc>
		<lastmod>2015-03-30T21:27:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/Blue.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/adversaries-set-their-sites-on-oil-and-gas-sector/</loc>
		<lastmod>2015-04-08T09:51:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2015/04/dreamstime_l_43107847-1-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/operational-threat-intelligence-with-maltego-transform-hub/</loc>
		<lastmod>2015-04-17T19:47:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/Blue.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdresponse-windows-sticky-keys/</loc>
		<lastmod>2015-04-21T18:36:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/Blue.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/3-tips-for-operationalizing-cyber-intelligence/</loc>
		<lastmod>2015-05-04T12:18:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/Blue.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/venom-vulnerability-community-patching-and-mitigation-update/</loc>
		<lastmod>2015-05-13T00:10:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/Blue.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/venom-vulnerability-details/</loc>
		<lastmod>2015-05-15T19:51:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/Blue.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/rhetoric-foreshadows-cyber-activity-in-the-south-china-sea/</loc>
		<lastmod>2015-06-01T15:36:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/Blue.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/cloud-based-security-future-of-the-industry/</loc>
		<lastmod>2015-07-02T22:51:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/Blue.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/google-capital-bets-big-on-crowdstrike/</loc>
		<lastmod>2015-07-13T00:30:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/Blue.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/falcon-zero-day-flash-detection/</loc>
		<lastmod>2015-07-27T14:19:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/Blue.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2015/07/image3-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2015/07/image4-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2015/07/image5-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/brian-kelly-cso-of-rackspace-shares-why-he-chose-crowdstrike/</loc>
		<lastmod>2015-08-14T18:51:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2015/08/rackspace-screenie-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/trust-but-verify/</loc>
		<lastmod>2015-09-25T17:17:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/Blue.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/blurring-of-commodity-and-targeted-attack-malware/</loc>
		<lastmod>2015-10-16T19:02:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2015/10/Malware-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/12/th-uncovering-unknown.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/sakula-reloaded/</loc>
		<lastmod>2015-11-18T13:58:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/Blue.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/nothing-else-is-working-why-not-memory-forensics/</loc>
		<lastmod>2015-11-18T18:31:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/Blue.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/top-5-cybersecurity-mistakes-companies-make-and-how-to-avoid-them/</loc>
		<lastmod>2015-11-24T18:16:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/Blue.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/you-want-me-to-do-what-a-guide-to-interpreting-cybersecurity-recommendations/</loc>
		<lastmod>2015-12-01T15:42:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/Blue.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/new-protection-capability-of-falcon-for-mac/</loc>
		<lastmod>2015-12-04T16:21:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/Blue.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/what-sets-crowdstrike-falcon-apart/</loc>
		<lastmod>2015-12-08T02:34:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/Blue.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/the-importance-of-logs/</loc>
		<lastmod>2015-12-16T06:00:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/Blue.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/more-than-just-your-esignature-the-analysis/</loc>
		<lastmod>2016-01-06T19:20:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/Blue.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/01/Figure1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/the-security-roadmap-planning-for-job-security/</loc>
		<lastmod>2016-01-08T14:26:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/Blue.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/4-0-another-brick-in-the-cryptowall/</loc>
		<lastmod>2016-01-19T13:24:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/Blue.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/01/Cryptowall_1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/01/Cryptowall_2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/investigating-powershell-command-and-script-logging/</loc>
		<lastmod>2016-02-18T14:56:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/02/Investigating-PowerShell.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/02/Event4688_Powershell_Encoded_Final.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/02/PowerShellLogging.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/are-you-more-interested-in-stopping-a-breach-or-stopping-malware/</loc>
		<lastmod>2016-02-24T01:59:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/02/Blog_George.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/using-os-x-fsevents-discover-deleted-malicious-artifact/</loc>
		<lastmod>2016-03-13T04:05:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/FS.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/dir.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/lib.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/open-source-active-reconnaissance-red-team/</loc>
		<lastmod>2016-03-29T03:21:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/team-red-crowdstrike.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/sqlmap.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/Sqlmap-results.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/nikto.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/nikto-results.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/reconnaissance-detection-blue-team/</loc>
		<lastmod>2016-03-29T03:31:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/team-blue-crowdstrike.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/detection.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/web-log.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/brosql.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/cyber-skirmish-russia-v-turkey/</loc>
		<lastmod>2016-04-13T20:59:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/04/Cyber-Skirmish-Russia-v.-Turkey.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/mergers-and-acquisitions-cybersecurity-due-diligence/</loc>
		<lastmod>2016-04-18T19:57:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/04/Mergers-and-Acquisitions-Cyber-Security-Due-Diligence.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/owning-image-object-file-format-compiler-toolchain-operating-system-solving-intractable-performance-problems-vertical-engineering/</loc>
		<lastmod>2016-05-06T12:51:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/05/Owning-the-Image-Object-File-Format.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/05/MmGetPhysicalAddress-.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/05/MiAddressTo-.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/05/IMAGE_DYNAMIC_RELOCATION_ENTRY.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/05/IMAGE_DYNAMIC_RELOCATION_TABLE-.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/05/DynamicValueRelocTable.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/state-criminal-address/</loc>
		<lastmod>2016-05-16T19:08:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/05/state-of-criminal.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/05/state-of-criminal-address.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/05/Tactics-Techniques-and-Procedures.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdresponse-release-new-tasks-modules/</loc>
		<lastmod>2016-05-16T19:59:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/05/crowdstrike-response.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/05/Task-Scheduler.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/05/xml-file-captures.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/gartners-comparison-of-endpoint-detection-and-response-technologies-and-solutions/</loc>
		<lastmod>2016-07-19T13:18:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/07/Gartner.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/ecrime-ecosystem/</loc>
		<lastmod>2016-08-01T13:02:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/08/eCrime-ecosystem.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/summer-2016-falcon-platform-release/</loc>
		<lastmod>2016-08-02T00:27:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/08/summer-release.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-machine-learning-virustotal/</loc>
		<lastmod>2016-08-25T14:49:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/08/machine-learning.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/08/falcon-host.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/08/different-shading.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/08/two-measure.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/08/contained-code.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/08/moving-apart.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/08/more-attempts.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/bear-hunting-tracking-cozybear-backdoors/</loc>
		<lastmod>2016-09-27T21:20:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/09/cozy-bear-.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/09/bear-hunting-image002.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/09/bear-hunting-image003.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/09/bear-hunting-image005.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/09/original-function.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/09/EncodedCommand-.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/three-steps-proactive-threat-hunting/</loc>
		<lastmod>2016-10-27T15:05:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/10/proactive-hunting.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-nist-800-53-now-thats-call-twofer/</loc>
		<lastmod>2016-11-08T14:27:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/11/NIS.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-falcon-certified-as-legacy-av-replacement/</loc>
		<lastmod>2016-11-09T18:26:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/11/AV-matters.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/critical-infrastructure-one-thing-give-thanks-protect/</loc>
		<lastmod>2016-11-22T15:10:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/11/Critical-Infrastructure.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/multi-layered-prevention-endpoint/</loc>
		<lastmod>2016-12-06T17:44:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/12/Multi-Layered-Prevention-for-the-Endpoint.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-releases-new-update-to-falcon-orchestrator/</loc>
		<lastmod>2016-12-12T15:38:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/12/falcon-orchestrator.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/12/memory-dump-falcon.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/12/data-recovery-falcon.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/12/file-deletion-falcon.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/danger-close-fancy-bear-tracking-ukrainian-field-artillery-units/</loc>
		<lastmod>2016-12-22T00:01:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/12/fancybear.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/12/Ukraine-application.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/12/d-30.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-named-visionary-in-gartner-magic-quadrant/</loc>
		<lastmod>2017-01-31T18:48:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/01/magic-quadrant-visionary.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/blocking-malicious-powershell-downloads/</loc>
		<lastmod>2017-02-06T14:54:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/02/process-tree.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/02/office.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/02/processtree.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/virustotal-lookups-are-back-in-crowdinspect-crowdstrikes-popular-free-tool/</loc>
		<lastmod>2017-02-15T18:00:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/02/inspect.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/02/CrowdInspect.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/understanding-indicators-attack-ioas-power-event-stream-processing-crowdstrike-falcon/</loc>
		<lastmod>2017-03-14T15:19:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/03/IOAs.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/03/Falcon-UI.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/idc-names-crowdstrike-falcon-leader-in-2017-marketscape-report-for-endpoint/</loc>
		<lastmod>2017-04-06T02:46:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/04/IDC-Blog-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/w-2-phishing-scam-adds-new-twist-wire-transfer-fraud/</loc>
		<lastmod>2017-04-07T06:51:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/04/Blog_Image-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/securing-the-mac-based-organization/</loc>
		<lastmod>2017-04-11T15:25:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/04/Mac-Blog_Image-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/inside-the-takedown-of-zombie-spider-and-the-kelihos-botnet/</loc>
		<lastmod>2017-04-13T21:43:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/04/intelmap.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/falcon-endpoint-protection-blocks-the-ransomware-that-attacked-the-nhs/</loc>
		<lastmod>2017-05-12T22:49:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/05/ransomeware-prevent.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/falcon-intelligence-report-wanna-ransomware-spreads-rapidly-continually-encrypts-victim-files/</loc>
		<lastmod>2017-05-12T23:22:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/05/ransomeware.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-investors-double-down-and-lead-100-million-series-d-round-to-support-the-companys-global-growth/</loc>
		<lastmod>2017-05-16T23:50:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/05/Falcon-Cloud.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/approaching-zero-dwell-time-strategy-finding-stopping-attackers-damage/</loc>
		<lastmod>2017-05-23T16:18:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/05/Dwell-time-reduce-Blog_Image-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/sans-institute-reviews-crowdstrike-falcon-endpoint-protection/</loc>
		<lastmod>2017-05-25T01:47:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/05/SANS-Blog_Images-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/key-characteristics-of-modern-fileless-attacks/</loc>
		<lastmod>2017-06-05T16:21:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/06/FilelessImage-blog-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/why-it-hygiene-is-critical-to-your-cybersecurity-readiness/</loc>
		<lastmod>2017-06-14T14:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/06/Falcon-Discover-blog-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/defining-the-value-of-machine-learning-for-endpoint-protection/</loc>
		<lastmod>2017-06-20T09:00:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/06/Sven-Krasser-ML-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/fast-spreading-petrwrap-ransomware-attack-combines-eternalblue-exploit-credential-stealing/</loc>
		<lastmod>2017-06-28T02:38:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/06/petrwrap-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/06/petrwrap-reboot-screen.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/06/petrwrap-protection-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/06/RUNDLL32-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/06/RUNDLL32-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/06/petrwrap-policy-recommendation.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-ceo-and-co-founder-george-kurtz-wins-ernst-young-entrepreneur-of-the-year-for-security/</loc>
		<lastmod>2017-06-28T15:43:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/06/Blog_Image2-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/petrwrap-ransomware-technical-analysis-triple-threat-file-encryption-mft-encryption-credential-theft/</loc>
		<lastmod>2017-06-29T12:06:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/06/PetrWrap.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/06/Credential-Theft-.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/06/MFT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/06/Display.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/06/display2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/06/comand.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/petrwrap-technical-analysis-part-2-further-findings-and-potential-for-mbr-recovery/</loc>
		<lastmod>2017-07-03T22:24:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/07/pertrwrap.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/07/pertrwrap-tech-blog-II-image-1a.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/07/pertrwrap-tech-blog-II-image-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/07/pertrwrap-tech-blog-II-image-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/07/pertrwrap-tech-blog-II-image-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/07/pertrwrap-tech-blog-II-image-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/07/pertrwrap-tech-blog-II-image-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/07/pertrwrap-tech-blog-II-image-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/07/pertrwrap-tech-blog-II-image-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/07/pertrwrap-tech-blog-II-image-9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/07/pertrwrap-tech-blog-II-image-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/07/pertrwrap-tech-blog-II-image-11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/07/pertrwrap-tech-blog-II-image-12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/07/pertrwrap-tech-blog-II-image-13.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/07/pertrwrap-tech-blog-II-image-14.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/07/pertrwrap-tech-blog-II-image-15.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/07/pertrwrap-tech-blog-II-image-16.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/07/pertrwrap-tech-blog-II-image-17.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/07/pertrwrap-tech-blog-II-image-18.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/achieving-cybersecurity-effectiveness-in-a-world-of-advanced-threats/</loc>
		<lastmod>2017-07-11T16:39:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/07/Blog-Forbes-Kurtz-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/decrypting-notpetya-tools-for-recovering-your-mft-after-an-attack/</loc>
		<lastmod>2017-08-23T15:48:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/08/Blog_Image-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/new-york-state-cybersecurity-regulations-for-financial-institutions-are-tough-critical-reach-beyond-state-borders/</loc>
		<lastmod>2017-08-29T12:00:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/08/NewqYorkCity-2-e1727195070729.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/address-zero-day-threats-long-attack-occurs/</loc>
		<lastmod>2017-09-07T16:53:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/09/zer-days-blog-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/hipaa-phi-getting-tougher-to-safeguard-but-compliance-is-still-critical/</loc>
		<lastmod>2017-09-29T15:22:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/09/HIPAA-image-blog-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/protecting-software-supply-chain-deep-insights-ccleaner-backdoor/</loc>
		<lastmod>2017-10-04T16:26:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/10/CCleaner-blog-image-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/10/dataStructureMem2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/10/data-structure.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/10/c2-ip.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/10/new-c2-ip.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/10/c2-ip-save-location.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/software-supply-chain-attacks-rise-undermining-customer-trust/</loc>
		<lastmod>2017-10-11T18:25:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/10/Backdoor-image-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/full-decryption-systems-encrypted-petya-notpetya/</loc>
		<lastmod>2017-10-17T16:17:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/10/notpetya.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/10/notpetya-decryption/figure1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/10/notpetya-decryption/figure2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/10/notpetya-decryption/figure3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/10/notpetya-decryption/figure4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-artificial-intelligence-is-becoming-a-key-weapon-in-the-cybersecurity-war/</loc>
		<lastmod>2017-10-24T16:27:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/10/Sentonas-AI-blog-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/5-steps-endpoint-security-buyers-are-taking-to-improve-protection/</loc>
		<lastmod>2017-10-26T15:26:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/10/5-things-Crotty-blog-2-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/introducing-crowdstrike-falcon-spotlight/</loc>
		<lastmod>2017-11-06T21:54:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/11/Falcon-Spotlight.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/in-depth-analysis-of-the-ccleaner-backdoor-stage-2-dropper-and-its-payload/</loc>
		<lastmod>2017-11-10T17:28:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/10/CCleaner-blog-image-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/11/ccleaner-pt2/img-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/11/ccleaner-pt2/img-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/11/ccleaner-pt2/img-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/11/ccleaner-pt2/img-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/11/ccleaner-pt2/img-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/11/ccleaner-pt2/img-6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/badrabbit-ms17-010-exploitation-part-one-leak-and-control/</loc>
		<lastmod>2017-11-17T10:36:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/11/Bad-Rabbit-Blog-Image-v2-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/11/badrabbit-pt1/img1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/11/badrabbit-pt1/img2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/11/badrabbit-pt1/img3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/11/badrabbit-pt1/img4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/11/badrabbit-pt1/img5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/badrabbit-ms17-010-exploitation-part-two-elevate-privileges/</loc>
		<lastmod>2017-11-21T12:00:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/11/BadRabbit-Part2-Image-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/img/badrabbit-pt2/img1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/the-6-requirements-of-true-next-gen-endpoint-protection/</loc>
		<lastmod>2017-12-12T16:27:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/12/blog-image-EPP-six-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/new-gartner-report-redefines-endpoint-protection-for-2018/</loc>
		<lastmod>2018-01-09T16:01:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/01/Gartner-EPP-Report-image-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/chip-flaws-spectre-and-meltdown-are-actually-three-vulnerabilities-and-proving-hard-to-mitigate/</loc>
		<lastmod>2018-01-11T21:14:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/01/Spectr-Meltdown-blog-image-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-provides-spectre-meltdown-dashboard-to-help-customers-mitigate-cpu-flaws/</loc>
		<lastmod>2018-01-17T19:54:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/01/meltdown-spectre-sm-1-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/cryptomining-harmless-nuisance-disruptive-threat/</loc>
		<lastmod>2018-01-25T09:00:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/01/cryptomining-blog-pic-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/01/cryptomining/image1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/01/cryptomining/image2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/01/cryptomining/image3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-ceo-george-kurtz-in-forbes-creating-a-balanced-cybersecurity-portfolio/</loc>
		<lastmod>2018-02-01T00:46:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/01/George-Kurtz-Forbes_Image-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-falcon-offers-plug-and-play-integration-with-servicenow/</loc>
		<lastmod>2018-02-14T01:00:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/02/ServiceNow_Blog_Image-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/02/screenshot-win-1024x566.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/02/screenshot-mng-1024x433.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-2018-global-threat-report-reveals-the-trends-insights-and-threat-actors-you-need-to-know/</loc>
		<lastmod>2018-02-26T00:15:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/02/GTR_Blog_Image-1-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/the-hole-in-the-donut-franchise-relationships-create-unique-cybersecurity-risks/</loc>
		<lastmod>2018-03-14T14:46:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/03/Franchise-blog-image-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/why-north-korean-cyberwarfare-is-likely-to-intensify/</loc>
		<lastmod>2018-03-28T15:04:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/03/38North-blog-image-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/a-hunters-perspective-detecting-formbook-3-8-activity-in-your-environment/</loc>
		<lastmod>2018-04-11T16:00:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/04/Formbook-blog-image-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/operators-of-samsam-continue-to-receive-significant-ransom-payments/</loc>
		<lastmod>2018-04-11T18:56:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/04/SamSam-Blog-Image-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/04/SamSam-screenshot-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/hidden-administrative-accounts-bloodhound-to-the-rescue/</loc>
		<lastmod>2018-04-24T15:42:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/04/BloodHound-Image-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/04/Bloodhound-logo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/04/figure-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/04/figure-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/04/figure-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/04/figure-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/04/Figure5_Hidden_Admin_Blog-1024x474.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/04/Figure6_Hidden_Admin_Blog-1024x476.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-ceo-george-kurtz-in-entrepreneur-magazine-what-it-takes-to-lead/</loc>
		<lastmod>2018-04-27T17:59:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/04/George-Entrepreneur-Art-2-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/building-cybersecurity-from-the-ground-up-part-1-the-business-perspective/</loc>
		<lastmod>2018-05-07T15:52:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/05/Cyber-Maturity-blog-image-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-discusses-breakout-time-in-an-article-on-dark-reading/</loc>
		<lastmod>2018-05-09T18:55:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/05/Dark-Reading-Logo-blog-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/building-cybersecurity-from-the-ground-up-part-2-the-technology-basics/</loc>
		<lastmod>2018-05-14T15:29:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/05/Cyber-Maturity-Pt-2-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/falcon-prevent-free-trial-because-evaluating-next-gen-av-solutions-should-be-fast-and-easy/</loc>
		<lastmod>2018-05-16T15:34:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/05/Free-trial-blog-image-1-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/an-in-depth-analysis-of-samsam-ransomware-and-boss-spider/</loc>
		<lastmod>2018-05-21T15:17:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/05/Samsam-blog-image-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/05/figure1-1024x325.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/05/Figure2-1024x694.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/05/Figure3-1024x832.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/05/Figure4-1024x328.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/09/Intsights_logo_black.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/taking-security-to-the-next-level-crowdstrike-now-analyzes-over-100-billion-events-per-day/</loc>
		<lastmod>2018-05-23T15:40:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/05/100B-events-blog-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/05/100B-chart-1024x497.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/dont-even-think-of-complying-with-the-new-nist-cybersecurity-framework/</loc>
		<lastmod>2018-05-30T15:53:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/05/NIST-Framework-blog-2-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-scores-highest-overall-for-use-case-type-a-or-forward-leaning-organizations-in-gartners-critical-capabilities-for-endpoint-protection-platforms/</loc>
		<lastmod>2018-06-01T00:01:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/05/Gartner-EPP-Blog_Image-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/06/figure1CCEPP-981x1024.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/taking-protection-to-a-new-level-crowdstrike-announces-its-1-million-breach-prevention-warranty/</loc>
		<lastmod>2018-06-05T01:00:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/06/EPP-Warranty-Blog-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/meet-crowdstrikes-adversary-of-the-month-for-june-mustang-panda/</loc>
		<lastmod>2018-06-15T14:21:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/06/Mustan-Panda-Blog-Image-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/hiding-in-plain-sight-using-the-office-365-activities-api-to-investigate-business-email-compromises/</loc>
		<lastmod>2018-06-18T20:34:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/06/Hiding-plain-sight-blog-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/06/Figure-1-Geolocation.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-closes-200-million-series-e-financing-round-with-new-and-existing-investors/</loc>
		<lastmod>2018-06-19T01:01:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/06/series-e.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/dont-take-the-vendors-word-for-it-the-importance-of-third-party-testing/</loc>
		<lastmod>2018-06-26T22:58:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/06/iStock-530502390-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/spark-hot-potato-passing-dataframes-between-scala-spark-and-pyspark/</loc>
		<lastmod>2018-07-13T17:15:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/07/Python-blog-image-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/07/output-transformed_df.show.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/07/output-scala_added_df.show.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/global-survey-reveals-supply-chain-as-a-rising-and-critical-new-threat-vector/</loc>
		<lastmod>2018-07-23T01:17:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/07/supplychainimage5-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/i-know-what-you-did-last-month-a-new-artifact-of-execution-on-macos-10-13/</loc>
		<lastmod>2018-07-24T21:38:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/07/macOS-artifact-blog-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/why-cybersecurity-should-be-a-board-level-discussion/</loc>
		<lastmod>2018-07-25T01:15:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/07/Shawn-Henry-Photo-blog2-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/meet-crowdstrikes-adversary-of-the-month-for-july-wicked-spider/</loc>
		<lastmod>2018-07-26T15:06:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/07/WICKED-SPIDER-July-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-foundation-supports-next-generation-of-talent-in-cybersecurity/</loc>
		<lastmod>2018-07-31T19:48:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/07/foundation-blog-image-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/qatars-commercial-bank-chooses-crowdstrike-falcon-a-partnership-based-on-trust/</loc>
		<lastmod>2018-08-20T16:43:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/08/Edward-Gonam-Qatar-Blog2-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/uncovering-the-unknown-unknowns-why-threat-hunting-is-a-security-must-have/</loc>
		<lastmod>2018-08-23T15:10:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/08/Threat-hunting-blog-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-expands-its-horizons-in-india-with-new-innovation-and-development-center-in-pune/</loc>
		<lastmod>2018-08-28T00:01:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/08/Pune-City-Image-blog-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/meet-crowdstrikes-adversary-of-the-month-for-august-goblin-panda/</loc>
		<lastmod>2018-08-29T19:40:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/08/Goblin-Panda-for_blog-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/two-birds-one-stone-panda/</loc>
		<lastmod>2018-08-30T18:46:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/08/Stone-panda-blog-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/08/Stone-Panda-fig-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/09/obsidian-partner-solution-brief.pdf</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/09/obsidian-partner-solution-brief-feature.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/08/Stone-Panda-fig-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/08/Stone-Panda-fig-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/08/Stone-Panda-fig-7-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/08/Stone-Panda-fig-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/08/Stone-Panda-fig-9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/08/Stone-Panda-fig-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/09/threatq-logo-white.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/podcast-features-george-kurtz-on-what-it-takes-to-build-a-unicorn/</loc>
		<lastmod>2018-09-17T15:36:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/09/Podcast-Unicorn-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/leading-global-brands-secure-themselves-with-crowdstrike/</loc>
		<lastmod>2018-09-25T16:00:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/09/CrowdStrike-logo-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/09/Line-4.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/09/The-Australian-outline-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/09/Line-4.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/is-there-such-a-thing-as-a-malicious-powershell-command/</loc>
		<lastmod>2018-09-27T15:29:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/09/PowerShell-blog-image-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/evaluating-your-organizations-security-approach-tips-for-bod-and-c-level-execs/</loc>
		<lastmod>2018-10-02T15:28:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/10/BOD-Security-Assess-Blog-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/should-you-worry-about-software-supply-chain-attacks/</loc>
		<lastmod>2018-10-04T19:10:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/10/Supply-Chain-blog-worry-image-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/10/Supply-chain-blog-10-4-fig-1b.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/10/Supply-chain-blog-10-4-fig-3a.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-named-a-leader-in-the-idc-marketscape-u-s-incident-readiness-response-and-resiliency-services-2018-vendor-assessment/</loc>
		<lastmod>2018-10-11T15:08:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/10/IDC-Blog_Image-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/leveraging-falcon-sandbox-to-detect-and-analyze-malicious-pdfs-containing-zero-day-exploits/</loc>
		<lastmod>2018-10-16T00:01:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/10/Sandbox-blog-diagram3-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/10/Diagram-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/10/Figure-1a-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/10/Figure-2-1024x275.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/10/Figure-3-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/10/Figure-4-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/your-jenkins-belongs-to-us-now-abusing-continuous-integration-systems/</loc>
		<lastmod>2018-10-23T00:30:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/10/Jenkins-blog-image-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/10/JenkinsDefault-Fig-1-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/10/Linux-Fig-2-copy-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/10/Windows-Fig-3-copy-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/10/execute-Fig-4-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/10/Code-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/10/Oneliner-Fig-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/10/Code-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/10/decrypt-Fig-6-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/10/badperms-Fig-7-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/10/freestyle1-Fig-8-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/10/freestyle2-Fig-9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/10/freestyle3-Fig-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/10/freestyle4-Fig-11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/10/freestyle5-Fig-12-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/10/freestyle6-Fig-13-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/10/freestyle8-Fig-14.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/10/freestyle9-Fig-15.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/cutwail-spam-campaign-uses-steganography-to-distribute-urlzone/</loc>
		<lastmod>2018-10-25T22:17:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/10/ADVERSARY-SPIDER-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/10/Table-1-copy.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/10/Figure-one-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/10/Figure-2-copy-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/10/green-blue-red.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/10/Figure-3-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/meet-crowdstrikes-adversary-of-the-month-for-october-dungeon-spider/</loc>
		<lastmod>2018-10-26T16:03:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/10/DungeionSpider-blog-image-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/overwatch-insights-reviewing-a-new-intrusion-targeting-mac-systems/</loc>
		<lastmod>2018-11-01T00:00:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/10/macblogfeature-full-1-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/10/macblogfig1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/10/macblogfig2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/10/macblogfig3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/10/macblogfig4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/10/macblogfig5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/managed-threat-hunting-meets-the-challenge-of-the-tenacious-adversary/</loc>
		<lastmod>2018-11-07T16:22:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/11/Tencacious-adversaries-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-provides-free-dashboard-to-identify-vulnerable-macs/</loc>
		<lastmod>2018-11-09T16:28:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/11/MacS-vul-blog-3-copy-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/09/sega-logo-black.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/managed-threat-hunting-bridges-the-talent-gap/</loc>
		<lastmod>2018-11-16T16:01:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/11/theSecurityLedger-blog-copy-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-receives-highest-overall-score-in-the-2018-gartner-peer-insights-customers-choice-for-epp/</loc>
		<lastmod>2018-11-19T17:13:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/11/Gartner-Peer-2018-rev3a-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-demystifies-threats-with-mitre-attck/</loc>
		<lastmod>2018-11-26T20:33:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/11/MITRE-Blog-Scott-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/meet-crowdstrikes-adversary-of-the-month-for-november-helix-kitten/</loc>
		<lastmod>2018-11-27T18:37:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/11/HELIX-KITTEN-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/farewell-to-kelihos-and-zombie-spider/</loc>
		<lastmod>2018-12-05T00:17:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/12/Kelihos-Zombie-blogV2-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/12/Figure-One-Screenshot-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/10/falcon-horizon-cspm-data-sheet-feature.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/10/falcon-horizon-cspm-data-sheet-cover.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/mitre-attck-why-detections-and-tainted-telemetry-are-required-for-an-effective-edr-solution/</loc>
		<lastmod>2018-12-13T22:11:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/12/MITRE-telemetry-blogV2-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/12/MITRE-blog-Image-telemetry.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/12/MITRE-blog-screenshot.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/09/cloud-security-graphic.svg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/big-data-graph-and-the-cloud-three-keys-to-stopping-todays-threats/</loc>
		<lastmod>2018-12-18T15:34:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/12/threat-graph-combo-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/confessions-of-a-responder-the-hardest-part-of-incident-response-investigations/</loc>
		<lastmod>2018-12-20T16:47:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/12/IR-Blog-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/10/opswat-logo-white.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/12/Asset-inventory-screen-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/12/IR-blog-Fig-3-copy.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/12/IR-blog-pushd-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/12/IR-blog-pushd-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/adversary-extends-persistence-by-modifying-system-binaries/</loc>
		<lastmod>2018-12-27T02:17:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/12/modifiedbinarysystemsblog-1-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/digging-into-bokbots-core-module/</loc>
		<lastmod>2019-01-03T18:18:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/01/bokbot_intro_graphic_final-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/01/Figure-1-Bok-Bot-j.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/01/ZwallocateVM-1024x157.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/01/Figure-2-Bok-Bot-rev.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/01/SilenceErrors-1024x180.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/01/ID_Hash-1024x220.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/01/installation3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/01/C2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/01/Table-1-Bok-Bot.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/01/Table-2-Bok-Bot.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/01/c2-addition.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/01/url-reg.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/01/Table-3-Bok-Bot.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/01/URL-parameters.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/01/C2-format.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/01/commands2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/01/C2-url-hostname.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/01/Figure-3-Bok-Bot.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/01/Table-4-Bok-Bot.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/01/module-ID.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/01/sig-verification.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/10/attackiq-logo-white.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/01/shared-module.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/01/Figure-4-Bok-Bot.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/01/Table-5-Bok-Bot.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/10/guidepoint-logo-white-new.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/10/guidepoint-logo-black-new.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/01/string-structure.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/08/vectra-integration-solution-brief.pdf</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/08/vectra-integration-solution-brief-feature.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/08/vectra-integration-solution-brief-cover.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/01/Bok-bot-hashes.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/01/MITRE.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/visibility-and-granular-control-the-secret-to-securing-usb-devices-in-the-workplace/</loc>
		<lastmod>2019-01-10T17:39:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/01/USBBlog-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/analyzing-targeted-intrusions-through-the-attck-framework-lens-video/</loc>
		<lastmod>2019-01-23T00:59:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/01/video-ATTCK2-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/widespread-dns-hijacking-activity-targets-multiple-sectors/</loc>
		<lastmod>2019-01-25T21:04:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/01/threat-intel4-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/new-tiered-program-for-crowdstrike-partners-accelerates-resale-opportunities/</loc>
		<lastmod>2019-01-28T04:37:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/01/Partner-Elevate-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/launching-the-crowdstrike-store-to-bring-trusted-third-party-apps-to-the-falcon-platform/</loc>
		<lastmod>2019-02-05T00:14:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/02/Blog_Image-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/02/Falcon-platform-final-smv2-1024x558.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/threat-actor-magecart-coming-to-an-ecommerce-store-near-you/</loc>
		<lastmod>2019-02-06T17:53:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/02/shopping-code4-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/02/Figure-1-Magecart.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/02/Figure-2-Magecart.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/02/Figure-3-Magecart.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/02/Figure-4-Magecart.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/02/Figure-5-Magecart.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/02/Figure-6-Magecart.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/02/Figure-7-Magecart.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/02/Figure-8-Magecart.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/02/Figure-9-Magecart.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/02/Figure-10A-Magecart.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/02/Figure-11A-Magecart.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/02/Figure-12A-Magecart.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/02/Figure-13A-Magecart.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/02/Figure-14-Magecart.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/whats-in-your-wallet-resource-draining-cryptojacking-attacks-are-on-the-rise-2/</loc>
		<lastmod>2019-02-08T16:56:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/02/Cryptojacking-blog-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/02/Figure1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/02/Figure2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/02/Figure3-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/enhancing-secure-boot-chain-on-fedora-29/</loc>
		<lastmod>2019-02-11T21:42:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/02/ART-5-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/why-the-crowdstrike-partnership-with-mercedes-amg-petronas-motorsport-is-passionately-driven/</loc>
		<lastmod>2019-02-13T16:18:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/02/Mercedes-blog-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/02/Figure-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/sin-ful-spiders-wizard-spider-and-lunar-spider-sharing-the-same-web/</loc>
		<lastmod>2019-02-15T00:01:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/02/Wizard-code6-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/02/Fig-1-THOa.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/02/Fig-2-THOR-b.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/02/Feg-3-Presentation1-a.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/11/intsights-partner-solution-brief-cover.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/first-ever-adversary-ranking-in-2019-global-threat-report-highlights-the-importance-of-speed/</loc>
		<lastmod>2019-02-19T00:01:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/02/Breakout_timeLegacy_Replace_530x349_blog_v02-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/02/Adversary-breakout-times-1024x476.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/02/breakout-tiime.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/2019-global-threat-report-shows-it-takes-innovation-and-speed-to-win-against-adversaries/</loc>
		<lastmod>2019-02-19T00:01:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/02/Banners2109GTR_blog_image-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/helping-non-security-stakeholders-understand-attck-in-10-minutes-or-less/</loc>
		<lastmod>2019-02-21T17:59:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/01/video-ATTCK2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/02/AttCK-table.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/automating-mac-forensic-triage/</loc>
		<lastmod>2019-03-07T00:09:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/03/AutoMacTC-blog2-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/similarities-between-endpoint-protection-f1-racing/</loc>
		<lastmod>2019-03-15T00:26:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/03/Formula-1-blog-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-named-leader-forrester-wave-report-incident-response-services-2019/</loc>
		<lastmod>2019-03-19T00:11:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/03/CS_Forrester_Blog-Image-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/wizard-spider-lunar-spider-shared-proxy-module/</loc>
		<lastmod>2019-03-20T16:17:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/03/Lunar-Wizard-blog-image-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/bokbots-man-in-the-browser-overview/</loc>
		<lastmod>2019-03-21T18:04:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/03/BokBot-blog-image-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/03/code-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/03/code-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/03/Figure-1-ProxyConnectionState.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/03/Table-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/03/Figure2-proxied-browser-process-list.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/03/Table-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/03/code-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/03/code-3b.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/03/code-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/03/Table-3a.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/03/code-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/03/code-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/03/code-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/03/Figrure3-WebfakeProcess.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/03/code-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/03/code-9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/03/Figure-4-WebFake-Example.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/03/code-10-type50.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/03/code-11-type51.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/03/code-13.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/03/Table-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/03/code-18-type96.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/03/code-19-victims.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/03/code-19b.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/03/code-20-type-19.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/03/code-21.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/03/Table-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/03/Table-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/03/Figure-5-Post-login-wait.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/03/code-22.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/03/Table-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/03/code-23.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/03/Table-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/03/Figure-6-Proxy-Stie-Down.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/03/code-24.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/03/code-25.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/03/code-26.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/03/Figure-7-cashanalyzer-fake-login-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/03/code-27.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/03/code-28.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/03/code-29.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/03/code-30.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/03/code-31.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/03/Figure-8-Process-tree-without-blocking.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/03/Figure-9-Process-Tree-enabled.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/03/Figure-10-Process-block-message.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/adp-trusts-crowdstrike-falcon-platform/</loc>
		<lastmod>2019-03-26T17:19:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/09/CrowdStrike-logo-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/2019-global-threat-report-key-trends/</loc>
		<lastmod>2019-03-28T15:19:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/03/GTR-Banner-Trends-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/credential-theft-mimikatz-techniques/</loc>
		<lastmod>2019-04-04T00:01:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/03/MimiKatz-blog-image-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/making-60-minute-remediation-a-reality-webcast/</loc>
		<lastmod>2019-04-16T00:18:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/04/60-MIN-Remediation-blog3-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/when-tabletop-exercises-become-real-world-events/</loc>
		<lastmod>2019-04-25T15:03:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/04/Table-top-blog-image2-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/mike-sentonas-cyber-espionage-insights/</loc>
		<lastmod>2019-05-09T20:43:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/05/CSO-Cyber-Espionage-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/gartner-report-prepare-for-endpoint-protection-shifting-to-the-cloud/</loc>
		<lastmod>2019-05-15T15:09:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/05/CS_Gartner_Blog_530x349_V1-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/make-ugly-babies-cute-again-an-ma-crisis-aversion-story/</loc>
		<lastmod>2019-05-23T16:42:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/05/merger-acquisition-image-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/timelining-grim-spiders-big-game-hunting-tactics/</loc>
		<lastmod>2019-05-30T21:05:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/05/SPIDER-timeline-blog-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-celebrates-ipo/</loc>
		<lastmod>2019-06-12T00:01:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/06/IPO-Image2-copy-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/dark-reading-adam-meyers-ecrime-actors-pivot-to-ransomware/</loc>
		<lastmod>2019-06-18T14:55:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/06/eCrime-pivot-Dark-reading-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-to-fill-the-cybersecurity-skills-gap-with-homegrown-talent/</loc>
		<lastmod>2019-06-23T19:19:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/06/CrowdStrike-U-Blog-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/where-ciso-belongs-in-it-org-chart/</loc>
		<lastmod>2019-07-02T15:58:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/07/CIO-Org-Blog-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/doppelpaymer-ransomware-and-dridex-2/</loc>
		<lastmod>2019-07-12T21:06:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/07/Bitpaymer-blog2-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/07/Figure-1-B-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/07/Figure-2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/07/Figure-3-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/07/Figure-4-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/07/Figure-5-B-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/07/Figure-6-B-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/5-tips-for-building-cooperation-between-it-cybersecurity-and-operational-technology-teams/</loc>
		<lastmod>2019-07-15T15:27:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/07/CS-Dragos-Blog-image-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/mobile-threat-report-2019-trends-and-recommendations/</loc>
		<lastmod>2019-07-30T00:57:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/07/Mobile-threat-report.Blog_530x349-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-named-a-leader-in-gartner-magic-quadrant-epp-2019/</loc>
		<lastmod>2019-08-23T00:01:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/08/CS_GartnerMQ_530x349_Blog_R3-EDIT-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/08/figure-1-gartner-magic-quadrant-for-endpoint-protection-platforms-935x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/07/divide-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-nation-state-cyber-wars-increase-business-risk/</loc>
		<lastmod>2019-09-04T20:58:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/09/CSO-Aus-Henry-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/using-docker-to-do-machine-learning-at-scale/</loc>
		<lastmod>2019-09-13T17:43:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/09/Docker-container-blogV3-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/09/diagram-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/ransomware-attacks-increase-during-back-to-school/</loc>
		<lastmod>2019-09-17T00:01:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/09/Back-to-school3-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/09/US-map-ransomware-attacks-schools-copy-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/01/endpoint-section-icon-white.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/09/eCrime-Types-Chart-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/falcon-overwatch-report-finds-increase-in-ecrime/</loc>
		<lastmod>2019-10-01T00:07:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/09/OW_Blog_530x349-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/reconstructing-command-line-activity-on-macos/</loc>
		<lastmod>2019-10-01T15:39:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/09/MacOs-shell-blog-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/12/Sunburst@2x.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/09/Figure-3a-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/09/Figure-4a-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/09/Figure-5a-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/09/Figure-6-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/09/Figure-8-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/09/Figure-9a-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/09/Figure-10a-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/09/Figure-11-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/09/Figure-12-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/09/Figure-13-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/09/Figure-14-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-crowdstrike-enhances-machine-learning-with-shap/</loc>
		<lastmod>2019-10-03T18:14:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/10/SHAP-ML-Blog-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/10/Figure-1-sm-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/10/Figure2-combined-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/marsh-risk-evaluation-names-crowdstrike-cyber-catalyst/</loc>
		<lastmod>2019-10-17T00:01:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/10/Marsh-Cyber-Cat5-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/hardening-neural-networks-against-adversarial-attack/</loc>
		<lastmod>2019-10-18T19:32:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/10/ML-Data-Science-Blog-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/10/Figure-1-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/10/symbol1-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/10/symbol2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/10/symbol2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/10/Figure-2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/10/Figure-3-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/10/symbol2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/10/symbol2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/01/jared-nussbaum-headshot.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/10/symbol2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/10/Figure-5-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/07/divide-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-scores-highest-overall-gartner-critical-capabilities-epp-2019/</loc>
		<lastmod>2019-10-24T00:01:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/10/Blog_530x349_R2-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/10/figure1-vendor-CC-chart-copy-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/10/Line-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/is-measurable-security-possible/</loc>
		<lastmod>2019-10-28T00:54:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/10/Security-Measure-Blog-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/10/Gain-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/10/BasicDetection-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/10/falcon-horizon-cspm-data-sheet.pdf</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/10/SOCCapacity-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/10/SeveritySorting-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/10/CrowdScore-chart-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-delivers-300-percent-roi-forrester-total-economic-impact-study/</loc>
		<lastmod>2019-10-31T00:01:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/10/Blog_530x349-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/10/Forrester-TEI-Chart-rev-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/wizard-spider-adds-new-feature-to-ryuk-ransomware/</loc>
		<lastmod>2019-11-01T01:00:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/10/Wizard-spider-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/10/Figure-1-2-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-fall-release-2019/</loc>
		<lastmod>2019-11-05T00:01:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/08/AK-Blog_Image-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/weeding-out-wannamine-v4-0-analyzing-and-remediating-this-mineware-nightmare/</loc>
		<lastmod>2019-11-12T18:08:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/11/Wannamine-blog-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/11/Figure-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/11/Figure-1B-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/11/Figure-3A-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/11/Figure-4A-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/11/Figure-5-edited-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/11/Figure-6-edited-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/11/Figure-5-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/11/Figure-6-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/11/Figure-7-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/11/Figure-8-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/11/Figure-9-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/11/Figure-10-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/11/Figure-12-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/11/Figure-16-edited-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/11/Figure-15-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/11/Figure-18-edited-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/11/Figure-19-edited-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/11/Figure-20-edited-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/11/Figure-19-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/11/Figure-22-edited-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/11/Figure-21-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/11/Figure-22-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/11/Figure-25-edited-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/11/Figure-24-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/11/Figure-25-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/11/Figure-26-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/11/Figure-27-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/11/Figure-28-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/11/Figure-29-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/01/frost-sullivan-roi-zero-trust-cover-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/01/frost-sullivan-roi-zero-trust-feature-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/11/Figure-32-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/11/Figure-33-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/global-security-attitude-survey-takeaways-2019/</loc>
		<lastmod>2019-11-19T00:01:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/11/Blog_530x349-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-receives-highest-overall-score-again-gartner-peer-insights-2019/</loc>
		<lastmod>2019-11-26T00:01:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/11/Gartner_PeerInsights_blog_530x349_V4_04-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdscore-dramatically-reduces-alert-fatigue/</loc>
		<lastmod>2019-12-05T16:59:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/12/CrowdScore-results-image-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/12/Figure-1A-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/12/Figure-2b-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/12/timeline2-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/12/Figure-4-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/who-is-refined-kitten/</loc>
		<lastmod>2019-12-12T17:48:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/12/RefinedKitten-blog-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/webcast-highlights-need-for-speed-in-cybersecurity/</loc>
		<lastmod>2019-12-19T18:29:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/12/Mercedes-Webcast-Blog-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/best-practices-to-prevent-and-respond-to-breaches/</loc>
		<lastmod>2019-12-26T00:01:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/12/Lawyers-Weekly-Article-Clog-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/4-cyber-threat-predictions-for-2020/</loc>
		<lastmod>2020-01-06T20:32:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/01/2020-predictionsV2-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/roadmap-to-cybersecurity-maturity-part-1/</loc>
		<lastmod>2020-01-09T16:40:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/01/CyberMaturityBlog-breached-2-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-services-report-threat-outlook-for-2020/</loc>
		<lastmod>2020-01-14T00:01:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/01/CFLR_Blog_530x349-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-we-use-apache-airflow-part-1/</loc>
		<lastmod>2020-01-16T19:05:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/01/Apache-Airflow-blog-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/01/Figure-1-Airflow-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/01/Figure-2b-Airflow-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/01/Figure-3b-Airflow-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/01/Figure-4b-Airflow-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/01/Figure-5c-Airflow-1-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/01/Figure-6b-Airflow-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/a-roadmap-to-cybersecurity-maturity-part-2-am-i-mature/</loc>
		<lastmod>2020-01-21T16:55:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/01/Am-I-mature-blog-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/mold-modeling-label-dissonance-remediation/</loc>
		<lastmod>2020-01-23T17:28:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/01/MOLD-DS-Blog-Image-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/01/Figure-1-MOLD-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/01/Figure-2-MOLD-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/01/Figure-3-MOLD-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/01/Figure-4b-MOLD-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/01/Figure-5b-MOLD-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/01/Figure-6b-MOLD-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-protects-against-cve-2020-0601/</loc>
		<lastmod>2020-01-24T15:54:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/01/MS-Vulnerability-blog-image-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/01/Falcon-MS-Dash-Combo-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/2019-services-report-key-findings-part-1/</loc>
		<lastmod>2020-01-29T16:59:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/01/CFLR_Blog_530x349-1-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/2019-services-report-key-findings-part-2/</loc>
		<lastmod>2020-01-31T17:28:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/01/CS-Services-Blog-Part2-a-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-at-rsa-2020/</loc>
		<lastmod>2020-02-04T17:18:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/02/RSA-2020-blog2-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-shellter-is-used-to-bypass-antivirus-products/</loc>
		<lastmod>2020-02-06T01:00:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/02/Shellter-blog-image-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/02/Shellter-Figure-1a-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/02/Shellter-Figure-2a-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/02/Shellter-Figure-3a-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/02/Shellter-Figure-4a-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/02/Shellter-Figure-5a-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/detect-malicious-activity-with-string-based-machine-learning-model/</loc>
		<lastmod>2020-02-11T20:33:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/02/String-match-blog-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/02/Picture1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/02/Picture2-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/convolutional-neural-networks-are-male-models-for-pe-malware/</loc>
		<lastmod>2020-02-20T16:33:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/02/Neural-networks-blog-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/02/Figure-1a-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/02/Figure-2a-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/02/Figure-3-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/02/Figure-4a-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/02/Figure-5a-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-unveils-exciting-new-capabilities-at-rsa-2020/</loc>
		<lastmod>2020-02-25T00:01:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/02/Mike-Sentonas-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/highlights-from-rsa-2020/</loc>
		<lastmod>2020-02-28T18:28:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/02/SC-Award-RSA-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/global-threat-report-foreword-2020/</loc>
		<lastmod>2020-03-03T00:01:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/03/CFLR_Blog_530x349-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-strenghtens-cybersecurity-alliance-ecosystem/</loc>
		<lastmod>2020-03-10T00:01:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/03/Crowdstrike-store-mssp6-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/03/Dev-portal-screen-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/03/CrowdStrike-Store-SS-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/targeted-dharma-ransomware-intrusions-exhibit-consistent-techniques/</loc>
		<lastmod>2020-04-16T14:36:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/04/dharma-ransomeware-laptop-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/exploiting-escalation-of-privileges-via-globalprotect-part-1/</loc>
		<lastmod>2020-04-21T18:10:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/04/GP-vuln-blog-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/04/Figure-1-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/04/Figure-2-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/04/Figure-4-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/exploiting-globalprotect-for-privilege-escalation-part-two-linux-and-macos/</loc>
		<lastmod>2020-04-23T16:25:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/04/GP-vuln-blog-pt2-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/04/Figure-1-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/04/Figure-1B-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/04/Figure-1C-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/04/Figure-1E-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/04/Figure-1F-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/04/Figure-1G-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/04/Figure-1H-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/04/Figure-1I-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/04/Figure-1J-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/04/Figure-2-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/04/Figure-1K-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/04/Figure-1L-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/04/Figure-1M-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/04/Figure-1N-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/04/Figure-3A-copy-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/malware-detection-with-charcnns-and-powershell-scripts/</loc>
		<lastmod>2020-04-29T17:45:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/04/CharCNN-Scripting-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/04/Figure-1-2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/04/equation-1b-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/04/equation-2b-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/04/equation3c-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-receives-highest-overall-score-gartner-peer-insights-for-edr-2020/</loc>
		<lastmod>2020-05-07T00:05:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/05/Gartner_Update_05.20_Blog_530x349-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/global-survey-the-cybersecurity-reality-of-the-covid-19-remote-workforce/</loc>
		<lastmod>2020-05-11T18:50:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/05/Blog_0520_01-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/bears-midst-intrusion-democratic-national-committee/</loc>
		<lastmod>2020-06-05T00:55:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/06/Blog-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/adversaries-targeting-the-manufacturing-industry/</loc>
		<lastmod>2020-07-14T14:59:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/07/Blog-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/newest-crowdstrike-store-apps-use-cases/</loc>
		<lastmod>2020-08-18T00:19:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/08/Blog_1060x698-7-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/08/Figure-1a-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/08/Figure-2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/08/Figure-3-1-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/why-cybercrime-remains-a-worrying-business-challenge-in-a-covid-lockdown-world/</loc>
		<lastmod>2020-09-02T14:47:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/09/Blog_1060x698-9-5.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/pandemic-response-good-timing-for-security-review/</loc>
		<lastmod>2020-09-08T18:10:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/09/Blog-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/threat-hunting-report-highlights-2020/</loc>
		<lastmod>2020-09-15T00:06:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/09/Blog_1060x698_V1-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/09/SEARCH4-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/09/Figure2b.-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/09/Figure3b.-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/go-beyond-todays-cybersecurity-at-fal-con-2020/</loc>
		<lastmod>2020-09-17T00:26:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/09/Blog_1060x698-9-1-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/09/Franco-Jarvis-Schauble-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/09/CEO-panel-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/09/Mercedes-Team-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/09/logosB-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/transform-to-survive/</loc>
		<lastmod>2020-09-30T14:34:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/09/Blog_1060x698-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-named-best-edr-by-se-labs/</loc>
		<lastmod>2020-10-08T21:28:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/10/Blog_1060x698_v2-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/10/SE-Labs-logos-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/key-highlights-from-fal-con-2020/</loc>
		<lastmod>2020-10-15T15:58:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/10/Blog_1060x698-18-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/birds-eye-view-of-fal-con-2020/</loc>
		<lastmod>2020-10-16T15:48:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/10/Blog_1060x698-19-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/adam-meyers-podcast-on-importance-of-threat-intelligence-in-cybersecurity/</loc>
		<lastmod>2020-10-29T00:01:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/07/Blog_1060x698-3-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/global-security-attitude-survey-takeaways-2020/</loc>
		<lastmod>2020-11-17T00:01:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/11/BlobalSecurity_Attitude_Blog-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/cyber-front-lines-shawn-henry-foreword/</loc>
		<lastmod>2020-12-08T00:01:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/12/Blog-Services-Forward-2021-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/holiday-cyber-warnings-will-echo-across-2021/</loc>
		<lastmod>2021-01-05T16:40:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/01/Blog_1060x698-21-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/01/Figure-1-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/global-threat-report-foreword-2021/</loc>
		<lastmod>2021-02-22T01:49:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/02/GTR2021_blog_1060x698-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-signature-chaining-can-pinpoint-malware-behaviors/</loc>
		<lastmod>2021-03-01T00:57:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/02/signature-chaining-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/02/Sig-chaining-Figure1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/02/beefing-up-the-sandbox-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/02/Sig-chaining-Figure3-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-small-details-build-up-big-success/</loc>
		<lastmod>2021-03-02T03:04:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/W12-Front-scaled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/W12-Side-scaled-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/falcon-complete-stops-microsoft-exchange-server-zero-day-exploits/</loc>
		<lastmod>2021-03-04T12:03:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/Falcon-Complete-blog-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/Falcon-Complete-Figure1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/Falcon-Complete-Figure2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/Falcon-Complete-Figure3-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/Falcon-Complete-Figure4-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/Falcon-Complete-Figure5-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/Falcon-Complete-Figure6-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/Falcon-Complete-Figure7-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/Falcon-Complete-Figure8b-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/Falcon-Complete-Figure9b-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/Falcon-Complete-Figure10-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/Falcon-Complete-Figure11-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/Falcon-Complete-Figure12-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/Falcon-Complete-Figure13-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/Falcon-Complete-Figure14-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/Falcon-Complete-Figure15-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/Falcon-Complete-Figure16-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/Falcon-Complete-Figure17-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/Falcon-Complete-Figure18-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/Falcon-Complete-Figure19-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/Falcon-Complete-Figure20-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-to-shrink-your-socs-response-time-with-workflows/</loc>
		<lastmod>2021-03-05T07:36:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/Transform-Your-SOC-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-protects-on-and-off-track/</loc>
		<lastmod>2021-03-08T08:05:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/F1-Safety-Car-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/the-falcon-complete-solution-to-4-common-security-challenges/</loc>
		<lastmod>2021-03-15T12:59:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/02/Forrester-TEI-1-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/4-cybersecurity-necessities-in-the-work-from-anywhere-landscape/</loc>
		<lastmod>2021-03-16T18:07:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/Security-in-sweatpants-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/hades-ransomware-successor-to-indrik-spiders-wastedlocker/</loc>
		<lastmod>2021-03-17T22:31:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/Blog_1060x698-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/Picture1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/Picture2-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-crowdstrike-automated-remediation-extends-flexible-response-capabilities/</loc>
		<lastmod>2021-03-22T17:12:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/One-Size-Does-Not-Fit-All-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/forrester-wave-names-crowdstrike-leader-in-external-threat-intelligence-2021/</loc>
		<lastmod>2021-03-23T13:13:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/ForresterWaveIntel.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/2021Q1_External-Threat-Intelligence-Services_161622-11-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-crowdstrike-threat-graph-leverages-dsl-to-improve-data-ingestion-part-1/</loc>
		<lastmod>2021-03-24T07:04:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/threatgraphblog-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/Screen-Shot-2021-03-23-at-1.13.04-PM-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/making-threat-graph-extensible-part-2/</loc>
		<lastmod>2021-03-31T05:05:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/Making-Threat-Graph-Extensible-part-2-of-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/Screen-Shot-2021-03-30-at-11.14.44-AM-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/dragos-enhanced-industrial-threat-detection-for-enterprise-networks/</loc>
		<lastmod>2021-04-06T09:23:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/04/Blog_1060x698.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/why-culture-cant-be-copied/</loc>
		<lastmod>2021-04-15T09:58:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/04/replacement-image-for-blog.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/the-pernicious-effects-of-ransomware/</loc>
		<lastmod>2021-04-21T07:08:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/04/Blog_1060x698-1-1-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-falcon-mitre-attack-evaluation-results-third-iteration/</loc>
		<lastmod>2021-04-21T08:09:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/04/Blog-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/04/MITRE2021_Figure1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/04/MITRE2021_Figure-2-Part-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/04/MITRE2021_Figure-2-Part-2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/04/MITRE2021_Figure-3-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/04/MITRE2021_Figure-4-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/04/MITRE2021_Figure-5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-at-rsa-2021/</loc>
		<lastmod>2021-04-21T08:38:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/04/race-to-anywhere-RSA-blog.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-crowdstrike-combines-tensorflow-and-rust-for-performance/</loc>
		<lastmod>2021-04-22T08:10:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/04/shoulders_of_giants-main-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/04/shoulders_of_giants-table-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/04/shoulders_of_giants-figure-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/04/shoulders_of_giants-figure-2-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/increasing-relevance-of-access-broker-market-shown-in-improved-ecx-model/</loc>
		<lastmod>2021-04-22T08:35:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/04/Blog_1060x698-2-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/04/Screen-Shot-2021-04-22-at-3.24.40-PM-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/04/ECX-figure-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/unified-endpoint-and-network-detection-and-response-for-defense-in-depth/</loc>
		<lastmod>2021-04-23T13:15:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/04/Blog_1060x698-4-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/04/Logos-1-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/04/high-res-real-time-response-flow-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/04/Real-Time-Response-Integration.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/blocking-fileless-script-based-attacks-using-falcon-script-control-feature/</loc>
		<lastmod>2021-04-29T10:46:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/04/Falcon-Script-Control-Blog-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/04/Figure1_bokbot_doc_file-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/04/Figure2_bokbot_vba_macro-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/04/Figure3_bokbot_xsl_filecode.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/04/Figure4_hybrid_bokbot-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/04/Figure5_cs_script_monitoring-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/04/Figure6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/overwatch-threat-hunters-win-the-race-against-carbanak-in-mitre-attck-evaluation/</loc>
		<lastmod>2021-05-06T09:06:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/Blog_1060x698_.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/OWMITRE2021-Fig1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/OWMITRE2021-Fig2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/OWMITRE2021-Fig3-redo-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/OWMITRE2021-Fig4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/OWMITRE2021-Fig5-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/OWMITRE2021-Fig6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-named-a-leader-in-gartner-magic-quadrant-epp-2021/</loc>
		<lastmod>2021-05-10T10:29:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/1060x698web_blog_1-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/register-for-rsa-conference-2021/</loc>
		<lastmod>2021-05-11T10:39:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/Blog_1060x698_V2-2.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/Picture1-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-virgin-hyperloop-leverages-falcon-complete-and-overwatch/</loc>
		<lastmod>2021-05-14T09:50:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/Virgin-Hyperloop-Blog_1060x698-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-falcon-extends-protection-for-macos/</loc>
		<lastmod>2021-05-14T10:08:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/Blog_1060x698-4-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-falcon-highest-aaa-rating-in-se-labs-enterprise-endpoint-protection-report/</loc>
		<lastmod>2021-05-18T07:39:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/Blog_1060x698_v2-1-1.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/Picture1-1-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-falcon-complete-thwarted-a-revil-ransomware-attack/</loc>
		<lastmod>2021-05-20T10:24:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/Blog_1060x698-5-1.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/WhenMinMatterBlog-Picture1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/WhenMinMatterBlog-Picture2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/WhenMinMatterBlog-Picture3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/WhenMinMatterBlog-Picture4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/WhenMinMatterBlog-Picture5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/WhenMinMatterBlog-Picture6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/WhenMinMatterBlog-Picture7.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-greenhill-uses-falcon-complete-to-protect-client-data/</loc>
		<lastmod>2021-05-25T09:09:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/Blog_1060x698-6-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/kill-complexity-in-your-security-stack/</loc>
		<lastmod>2021-05-26T08:00:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/Vanson-Bourne-Blog-Image-1060x698-1-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/executive-order-forces-federal-agencies-to-rethink-log-management/</loc>
		<lastmod>2021-05-26T08:00:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/humio-executive-order-quiz-blog-post-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/cve-2021-21551-learning-through-exploitation/</loc>
		<lastmod>2021-05-26T08:38:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/Dell-BIOS-Blog_1060x698-1.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/13.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/14.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/15.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/16.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/17.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/18.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/19.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/20.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/21.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/22.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/23.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/24.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/25.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/26.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/27.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/28.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/29.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/30.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/31.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/32.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/33.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/34.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/35.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/36.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/37.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/38.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/39.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/40.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/41.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/42.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/43.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/44.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/45.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/46.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/47.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/48.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/49.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/50.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/51.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/52.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/53.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/54.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/55.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/falcon-complete-disrupts-malvertising-campaign-targeting-anydesk/</loc>
		<lastmod>2021-05-26T09:19:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/Blog_530x349-1.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/Fig-1-DetectionFalconUI.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/Fig-2-DomainRegistrantInfo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/Fig-3-vps1PowershellScriptSnippet.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/Fig-4-Urldownloadtofile_function.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/Fig-5-Google-Chrome-History.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/Fig-6-AnydeskFoWindows.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/Fig-7-GooglSearchAnydesk.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/Fig-8-GoogleadInformation.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/Fig-9-KeywordSearchAdComparison.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/Fig-10-GoogleAdKeywordCost.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/Fig-11-GoogleAdForecast.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-ransomware-adversaries-reacted-to-the-darkside-pipeline-attack/</loc>
		<lastmod>2021-05-28T09:28:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/Blog_1060x698-10-1.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/Picture1-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/Picture2-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-humios-index-free-architecture-reduces-log-management-costs/</loc>
		<lastmod>2021-06-01T10:04:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/humio-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Screen-Shot-2021-06-01-at-9.01.48-AM-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/humio-at-decisiv-an-industrial-internet-of-things-company-reduces-log-management-costs-by-37/</loc>
		<lastmod>2021-06-02T08:24:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/decisiv-humio-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-to-defend-against-conti-darkside-revil-and-other-ransomware/</loc>
		<lastmod>2021-06-02T15:53:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Blog_1060x698-1-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/streaming-live-data-is-the-heart-of-observability/</loc>
		<lastmod>2021-06-03T08:40:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Screen-Shot-2021-06-01-at-2.45.41-PM-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/humio-dashboard-latency-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/humio-dashboard-healing-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/humio-dashboard-queue-length-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/humio-dashboard-event-latency-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/introducing-crowdstrike-message-center/</loc>
		<lastmod>2021-06-07T13:04:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/message-center-Blog_1060x698-1.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Picture1-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Picture2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Picture3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-scores-100-percent-protection-in-av-comparatives-real-world-protection-test/</loc>
		<lastmod>2021-06-07T13:26:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Blog_1060x698_v2-2.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/grafana-alerting-in-a-multi-cloud-world/</loc>
		<lastmod>2021-06-16T08:45:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Blog_530x349-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/ransomware-actors-evolved-operations-in-2020/</loc>
		<lastmod>2021-06-18T08:22:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/Blog_1060x698-7-1.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/Picture1-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/Picture2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-to-prevent-zip-file-exploitation/</loc>
		<lastmod>2021-06-22T08:47:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Blog_1060x698-11-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Picture1-7.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/importance-of-an-integrated-endpoint-and-workload-protection/</loc>
		<lastmod>2021-06-23T08:44:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Blog_1060x698-12-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Picture1-14-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Picture1-15.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Picture1-16.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Picture1-17.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Picture1-18.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Picture1-19.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Picture1-20.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Picture1-21.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/the-myth-of-part-time-threat-hunting-part-1/</loc>
		<lastmod>2021-06-25T08:04:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/04/Blog_1060x698-4-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Picture1-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Screen-Shot-2021-06-17-at-8.00.05-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/new-ransomware-variant-uses-golang-packer/</loc>
		<lastmod>2021-06-28T14:19:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Blog_1060x698-8-1.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/image2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/image1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/image3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/image5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/image6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/image4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/partners-help-crowdstrike-win-recognition-awards-and-races/</loc>
		<lastmod>2021-06-30T08:25:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Blog_1060x698-10-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-services-releases-automactc-v1-2/</loc>
		<lastmod>2021-06-30T08:50:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Blog_1060x698b-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-to-test-data-flows-using-python-and-remote-functions/</loc>
		<lastmod>2021-07-01T13:22:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/07/Blog_1060x698-3.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/07/image2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/07/image1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/rare-glimpse-real-life-command-and-control-server/</loc>
		<lastmod>2021-07-12T19:06:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/Blue.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/12/careers-banner-bg.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/12/cloud-platform-banner-bg.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/12/cs-events-banner-bg.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/12/google-cloud-banner-bg.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/12/investors-banner-bg.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/state-of-exploit-development-part-1/</loc>
		<lastmod>2021-07-13T15:35:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/08/Blog_1060x698-5-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/08/Blog-1-Figure-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/08/Blog-1-Figure-2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/08/Blog-1-Figure-3-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/08/Blog-1-Figure-4-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/08/Blog-1-Figure-5-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/08/Blog-1-Figure-6-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/08/Blog-1-Figure-7-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/08/Blog-1-Figure-8-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/08/Blog-1-Figure-9-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/08/Blog-1-Figure-10-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/08/Blog-1-Figure-11-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/08/Blog-1-Figure-12-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-we-trained-overfit-models-to-identify-malicious-activity/</loc>
		<lastmod>2021-07-13T15:35:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/07/Blog_1060x698-2-2-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/07/Figure1_Overfitting-a-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/07/Figure2_bias-variance-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/07/Figure3-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/07/Figure4_LoglossFig-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/07/Figure5_TPRvsNumTreesHigh-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/07/Figure6_TPRvsNumTreesLow-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/07/Figure7_twoface_unregularizedRoc_shorter_compressed-1.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/state-of-exploit-development-part-2/</loc>
		<lastmod>2021-07-13T15:36:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/08/Blog_1060x698-hands-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/08/Blog-2-Figure-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/08/Blog-2-Figure-2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/08/Blog-2-Figure-3-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/08/Blog-2-Figure-4-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/08/Figure-5a-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/08/Figure-6-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/08/Blog-2-Figure-6a-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/08/Blog-2-Figure-7b-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/08/Blog-2-Figure-8-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/08/Blog-2-Figure-9a-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/08/Blog-2-Figure-10-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/08/Blog-2-Figure-11-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/08/Figure-13-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/08/Blog-2-Figure-13-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/tips-to-protect-your-mac-os-environments/</loc>
		<lastmod>2021-07-13T15:39:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/07/Blog_1060x698-1-1-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/forrester-tei-study-reveals-roi-of-falcon-complete/</loc>
		<lastmod>2021-07-13T15:41:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/02/Forrester-TEI-1-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/02/pie-chart-for-Forrester-TEI-blog-v2-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/analyzing-the-security-of-ebpf-maps/</loc>
		<lastmod>2021-07-13T15:42:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/02/mapping-it-out-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/solarmarker-backdoor-technical-analysis/</loc>
		<lastmod>2021-07-13T16:02:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/02/SolarMarker-blog-featured-image-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/02/SolarMarker-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/02/SolarMarker-2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/02/SolarMarker-3-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/02/SolarMarker-4-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/02/SolarMarker-5-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/02/SolarMarker-6-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/02/SolarMarker-7-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/02/SolarMarker-8-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/02/SolarMarker-9-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/02/SolarMarker-10-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-falcon-spotlight-helps-detect-cve-2021-3156-vulnerabilities/</loc>
		<lastmod>2021-07-13T16:02:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/09/Blog_1060x698-9-3-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/02/CVE-2021-3156-screenshot-blog-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/dealing-with-out-of-memory-conditions-in-rust/</loc>
		<lastmod>2021-07-13T16:05:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/01/Blog_1060x698-2-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/pwn2own-tale-of-a-bug-found-and-lost-again/</loc>
		<lastmod>2021-07-13T16:06:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/01/P2own-Blog_1060x698-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/01/Figure-1-P2-blog-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-to-detect-and-prevent-kernel-attacks-with-crowdstrike/</loc>
		<lastmod>2021-07-13T16:07:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/01/Kernel-attack-Blog_1060x698-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/01/Kernalblog1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/01/kernalblog2-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/herpaderping-security-risk-or-unintended-behavior/</loc>
		<lastmod>2021-07-13T16:09:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/01/Blog_1060x698-38-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/01/mimikatz-for-windows-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/01/Herpaderping-Figure-1-rev-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/01/Herpaderping-Figure-2b-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/01/Herpaderp-Figure-3-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/01/Herpaderp-Figure-4-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/01/Herpaderp-Figure-5-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/stellar-performances-how-crowdstrike-machine-learning-handles-the-sunspot-malware/</loc>
		<lastmod>2021-07-13T16:09:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/01/Blog_1060x698-33-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-sets-highest-standard-in-se-labs-breach-response-test/</loc>
		<lastmod>2021-07-13T16:10:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/01/Blog_1060x698_v2-1-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/sunspot-malware-technical-analysis/</loc>
		<lastmod>2021-07-13T16:13:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/01/Blog_1060x698-33-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/retrieve-session-key-authentication/</loc>
		<lastmod>2021-07-13T16:14:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/12/Blog_1060x698-5-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/12/Figure-1A-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/12/Figure-2-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/12/Figure-3-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/12/Figure-4-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/bypass-epa-ntlm-attacks-wia/</loc>
		<lastmod>2021-07-13T16:14:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/12/Blog_1060x698-5-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/12/Figure-1-2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/12/Figure-2-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/12/Figure-3-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/getting-back-to-business-with-intelligence-led-approach/</loc>
		<lastmod>2021-07-13T16:16:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/12/Blog_1060x698-17-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/key-themes-findings-from-cyber-front-lines-report/</loc>
		<lastmod>2021-07-13T16:16:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/12/Blog-Services-Forward-2021-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/ntlm-remote-code-execution-security-advisory/</loc>
		<lastmod>2021-07-13T16:17:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/12/Blog_1060x698-8-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/12/Figure-1-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-falcon-forensics-streamlines-forensic-cybersecurity-and-incident-response/</loc>
		<lastmod>2021-07-13T16:18:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/12/Blog_1060x698-11-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/12/Host-Timeline-1_rev2-1-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/service-accounts-performing-interactive-logins/</loc>
		<lastmod>2021-07-13T16:20:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/12/Blog_1060x698-5-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/catch-bloodhound-before-it-bites/</loc>
		<lastmod>2021-07-13T16:22:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/12/Blog_1060x698-5-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/12/Preempt-bloodhound-Figure-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/04/crowdstrike-heidelberger-case-study-tile.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/12/Preempt-BloodHound-blog-Figure-3-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-offers-cybersecurity-services-in-aws-marketplace/</loc>
		<lastmod>2021-07-13T16:24:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/12/Blog_1060x698-3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-supports-new-macos-big-sur/</loc>
		<lastmod>2021-07-13T16:26:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/11/Blog_1060x698-27-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/testing-the-untestable-in-java/</loc>
		<lastmod>2021-07-13T16:26:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/11/Blog_1060x698-30-2-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/11/Blackbox-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/11/AUT-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/11/Whitebox-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/04/rsac2021-social-share-image.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/11/Test-logic-AUT-1-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-threat-hunting-uncovered-attacks-in-the-agriculture-industry/</loc>
		<lastmod>2021-07-13T16:27:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/11/Blog_1060x698-30-1-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/04/crowdstrike-bt-case-study-cover.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/11/PANDA-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/11/JACKLE-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/11/Ag-Diagram-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/new-integration-between-crowdstrike-and-aws-network-firewall/</loc>
		<lastmod>2021-07-13T16:27:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/11/Blog_1060x698-30-3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/role-of-cybersecurity-in-mergers-and-acquisitions-part-3/</loc>
		<lastmod>2021-07-13T16:28:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/11/Blog_1060x698-29-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/the-critical-role-of-cybersecurity-in-ma-part-2-pre-close/</loc>
		<lastmod>2021-07-13T16:30:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/11/Blog_1060x698-26-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/leading-executives-share-best-practices-on-work-from-home-transition/</loc>
		<lastmod>2021-07-13T16:32:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/10/Blog_1060x698-24-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/role-of-cybersecurity-in-mergers-and-acquisitions-part-1/</loc>
		<lastmod>2021-07-13T16:35:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/10/Blog_1060x698-20-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/duck-hunting-with-falcon-complete-qakbot-countermeasures/</loc>
		<lastmod>2021-07-13T16:35:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/10/Blog_1060x698-17-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/10/Figure-1-Qakbot3-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/10/Figure-2-Part-3-QakBot-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/10/detect-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/10/contain-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/10/easy-hard-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/10/part3_figure5-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/10/part3_figure6-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/10/part3_figure7-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/10/part3_figure8-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/10/part3_figure9-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/10/part3_figure10-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/start-your-fal-con-2020-experience/</loc>
		<lastmod>2021-07-13T16:35:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/09/Blog_1060x698-9-1-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/10/Fal.Con-2020-blog-3-Falcon-Encounter-main-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/10/Fal.Con-2020-blog-3-Falcon-Encounter-detail-1-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/duck-hunting-with-falcon-complete-qakbot-zip-based-campaign/</loc>
		<lastmod>2021-07-13T16:37:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/10/Blog_1060x698-12-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/10/QakBot-Timeline-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/10/Fig-2-QakBot-Part2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/10/Fig-3-QuakBot-Part2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/10/Fig-4-QakBot-combo-Part2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/10/Fig-5-QakBot-Part2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/10/Figure6FirstHalf-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/10/Figure6SecondHalf-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/10/Figure7-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/10/Figure8-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/10/Figure9-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/10/Figure10-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/10/Figure11-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/double-trouble-ransomware-data-leak-extortion-part-2/</loc>
		<lastmod>2021-07-13T16:38:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/10/Blog_1060x698-11-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/10/Figure1_MedusaLocker_PaymentPortal-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/10/Figure2_DetailedLeakAuctionPage-copy-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/10/Figure3_RegisteredUserLeakAuctionPage-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/10/Figure4_MazeCartelDLSPost-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/who-is-pioneer-kitten/</loc>
		<lastmod>2021-07-13T16:41:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/08/Blog_1060x698-PIONEER-KITTEN-9-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/falcon-complete-uncovers-a-global-attack-campaign/</loc>
		<lastmod>2021-07-13T16:41:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/08/Blog_1060x698-8-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/08/Figure1-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/08/Figure2-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/08/Figure3-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/08/Figure4-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/08/Blog_0820_08-Graph-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-to-leverage-apple-unified-log-for-incident-response/</loc>
		<lastmod>2021-07-13T16:42:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/08/Blog_1060x698-7-1-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/08/Figure1-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/08/Figure2-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/08/Figure3-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/08/Figure4-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/08/Figure5-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/08/Figure6-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/08/Figure7-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/08/Figure8-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/join-us-for-fal-con-2020/</loc>
		<lastmod>2021-07-13T18:27:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/08/Blog_1060x698-4-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/join-crowdstrike-at-black-hat-2020/</loc>
		<lastmod>2021-07-13T18:27:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/07/Blog_1060x698_V2-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/key-takeaways-from-asia-pacific-state-of-cybersecurity-report/</loc>
		<lastmod>2021-07-13T18:28:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/07/Blog_1060x698-2-1-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-crowdstrike-upgraded-from-python-2-to-3/</loc>
		<lastmod>2021-07-13T18:29:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/07/Blog_1060x698-5.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-observes-increase-in-iaas-api-key-theft/</loc>
		<lastmod>2021-07-13T18:33:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/06/Blog_08-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/3-best-practices-for-building-high-performance-graph-database/</loc>
		<lastmod>2021-07-13T18:35:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/06/Blog_0620_01-1-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/06/Chart-rev-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/06/yellow-rows-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/06/Cyan-rows-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/06/red-rows-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/the-wand-is-only-as-good-as-the-magician-getting-the-most-from-prevention-tools/</loc>
		<lastmod>2021-07-13T18:36:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/05/Blog_0520_07-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/weaponizing-disk-image-files-analysis/</loc>
		<lastmod>2021-07-13T18:36:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/05/Blog_0520_05-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/05/Figure-1-rev2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/05/Figure-2-2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/05/Figure-3-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/05/Figure-4-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/05/Figure-5-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/05/Figure-6-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/05/Figure-7-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/05/Figure-8-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/05/Figure-9-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/05/Figure-10-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/05/Figure-11-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/05/Figure-12-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/05/Figure-13-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/05/Figure-14-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/05/Figure-15-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/05/Figure-16-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/05/Figure-17-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/05/Figure-18-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/05/Figure-18b-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/05/Figure-19-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/05/Figure-20-2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/05/Figure-21-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/05/Figure-22-2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/05/Figure-23-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/05/Figure-24-2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/05/Figure-25-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/05/Figure-26-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/05/Figure-27b-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/05/Figure-28b-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/05/Figure-29b-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/the-human-element-of-detection-and-response/</loc>
		<lastmod>2021-07-13T18:36:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/05/Blog_0520_03-1-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/05/Figure-1-3-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/improving-fault-tolerance-in-apache-kafka-best-practices/</loc>
		<lastmod>2021-07-13T18:37:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/05/Kafka-blog-image-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/05/Trigger-count-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-to-employ-featureusage-for-windows-10-taskbar-forensics/</loc>
		<lastmod>2021-07-13T18:37:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/05/Windows10Exploit-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/05/Figure-1-2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/05/Figure-2-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/05/Figure-3-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/05/Figure-4-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/05/Figure-5-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/05/Figure-6-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/05/Figure-7-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/05/Figure-8-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/data-science-test-drive-of-rust-programming-language/</loc>
		<lastmod>2021-07-13T18:38:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/05/Blog_0520_04-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-crowdstrike-speeds-up-lateral-movement-investigations/</loc>
		<lastmod>2021-07-13T18:38:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/05/lateral-movement-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/05/Figure-1-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/05/Figure-2-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/05/Picture3-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/visibility-in-incident-response-dont-chase-ghosts/</loc>
		<lastmod>2021-07-16T08:48:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/07/Blog_1060x698-6-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-we-improved-scale-and-reliability-by-sharding-kafka/</loc>
		<lastmod>2021-07-19T08:13:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/07/Blog_1060x698-9.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/shlayer-malvertising-campaigns-still-using-flash-update-disguise/</loc>
		<lastmod>2021-07-22T19:22:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/07/Blog_1060x698-10.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/07/image3-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/07/image2-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/07/image1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/07/Screen-Shot-2021-07-19-at-9.15.03-AM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/07/Screen-Shot-2021-07-19-at-9.16.32-AM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/07/Screen-Shot-2021-07-19-at-9.17.25-AM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/07/Screen-Shot-2021-07-19-at-9.21.04-AM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/07/Screen-Shot-2021-07-19-at-9.22.35-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-crowdstrike-addressed-uneven-partition-lag-in-kafka/</loc>
		<lastmod>2021-07-26T14:46:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Blog_1060x698-6-1.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Picture1-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Picture2-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/image2.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/falcon-pro-wins-approved-business-security-product-award/</loc>
		<lastmod>2021-07-26T20:53:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/07/Blog_1060x698-12.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-falcon-complete-disrupts-ecrime-operators-wizard-spider/</loc>
		<lastmod>2021-07-28T15:02:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Blog_1060x698-10-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Figure-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Screen-Shot-2021-06-17-at-1.27.07-PM-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Figure-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Figure-4-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Figure-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Figure-6b.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Figure-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Screen-Shot-2021-06-17-at-1.36.06-PM-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Figure-9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Picture1-13.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Timeline-Graphic-Response-When-Minutes-Matter-01-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/join-crowdstrike-at-black-hat-2021/</loc>
		<lastmod>2021-07-28T18:14:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/07/G6-Blog.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/07/Picture1-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/deep-thought-chinese-targeting-national-security-think-tanks/</loc>
		<lastmod>2021-07-29T16:09:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/Blue.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/what-the-new-cybersecurity-executive-order-means-for-public-sector/</loc>
		<lastmod>2021-07-29T16:15:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/Blog_1060x698-10-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/detecting-and-responding-to-ransomware-how-logging-everything-helps-mitigate-ransomware-risks/</loc>
		<lastmod>2021-07-29T17:54:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/07/Untitled-1-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-is-the-first-to-bring-endpoint-detection-and-response-edr-to-mobile-devices/</loc>
		<lastmod>2021-08-04T13:34:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/03/Falcon_for_Mobile-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/moving-beyond-indicators-compromise/</loc>
		<lastmod>2021-08-05T14:07:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/Blue.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/unprecedented-announcement-fbi-implicates-north-korea-destructive-attacks/</loc>
		<lastmod>2021-08-05T14:18:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2014/12/NK.pdf-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/adversary-tricks-crowdstrike-treats/</loc>
		<lastmod>2021-08-05T14:20:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2014/10/HalloweenPost-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2014/10/Screen-Shot-2014-10-31-at-4.58.11-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2014/10/Screen-Shot-2014-10-31-at-4.56.29-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2014/10/Halloween3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2014/10/Halloween4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2014/10/Halloween5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2014/10/WallPaper1-150x150.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2014/10/WallPaper2-150x150.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/prophet-spider-exploits-oracle-weblogic-to-facilitate-ransomware-activity/</loc>
		<lastmod>2021-08-05T16:35:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/07/Blog_1060x698-11.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/07/Screen-Shot-2021-07-07-at-12.47.19-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-falcon-complete-prevented-a-remote-code-execution-attack/</loc>
		<lastmod>2021-08-11T16:19:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/08/Blog_1060x698-1.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/08/image4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/08/image3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/08/image2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/08/image5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/08/Screen-Shot-2021-08-03-at-9.25.45-AM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/08/image1-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/spectra-alliances-strategic-approach-to-zero-trust-adoption/</loc>
		<lastmod>2021-08-16T16:43:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/06/Blog_0620_09-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/08/Picture1-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/user-access-logging-ual-overview/</loc>
		<lastmod>2021-08-18T14:10:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Blog_1060x698-3-1.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Picture1-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Picture2-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Picture3-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Picture4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/re-searching-hyperparameters-for-training-boosted-tree-models/</loc>
		<lastmod>2021-08-18T17:18:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/08/Blog_1060x698-3.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/08/Picture1-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/ntlm-keeps-haunting-microsoft/</loc>
		<lastmod>2021-08-26T17:20:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/08/Blog_1060x698-6.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/08/Picture1-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/08/Screen-Shot-2021-08-26-at-9.22.51-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/vendor-hype-gives-new-meaning-to-zero-trust-security/</loc>
		<lastmod>2021-08-31T20:13:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/08/Blog_1060x698-12.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/08/Picture1-9.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/hat-tribution-pla-unit-61486/</loc>
		<lastmod>2021-09-02T20:26:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/Blue.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/2021-threat-hunting-report-preview/</loc>
		<lastmod>2021-09-08T09:51:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/09/OW2021_Blog.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/darkoxide-technical-analysis/</loc>
		<lastmod>2021-09-15T16:30:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/09/Blog_1060x698-6.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/09/Picture1-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/09/Picture2-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/humio-recognized-as-top-3-observability-award-winner-by-ema/</loc>
		<lastmod>2021-09-15T17:10:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/09/EMA-Top-3-Award_BLOG.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-shellshock-scanner/</loc>
		<lastmod>2021-09-17T11:54:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2014/09/Shellshock-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2014/09/ShellShock-screenshot.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/four-popular-defensive-evasion-techniques-in-2021/</loc>
		<lastmod>2021-09-17T20:41:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/09/Blog_1060x698-4.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/09/Picture1-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/09/Picture2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/09/Picture3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-and-verizon-form-partnership/</loc>
		<lastmod>2021-09-17T22:06:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/09/Blog_1060x698-14.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/introducing-supermem-free-incident-response-tool/</loc>
		<lastmod>2021-09-24T13:08:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/09/Blog_1060x698.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/the-myth-of-part-time-threat-hunting-part-2/</loc>
		<lastmod>2021-09-29T13:08:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/09/Blog_1060x698-3.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-crowdstrike-threat-hunters-identified-a-confluence-exploit/</loc>
		<lastmod>2021-10-01T17:32:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/09/Blog_1060x698-5.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/Confluence-Blog_Exploitation-Image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/why-extend-endpoint-protection-to-robotic-process-automation/</loc>
		<lastmod>2021-10-05T19:51:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/Blog_1060x698.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-advances-zero-trust-capabilities-with-preempt-acquisition/</loc>
		<lastmod>2021-10-08T15:40:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/09/zero-trust-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/introducing-falcon-filevantage/</loc>
		<lastmod>2021-10-12T18:58:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/Blog_1060x698-8.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/Picture1-5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/improving-performance-and-reliability-of-microservices-communication-with-grpc/</loc>
		<lastmod>2021-10-18T19:05:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/Blog_1060x698-9.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/overwatch-elite-call-escalation-vital-to-containing-attack/</loc>
		<lastmod>2021-10-25T18:55:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/Blog_1060x698-4.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/fig1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/fig2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/fig3-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/fig4-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/ecriminals-increasingly-use-webassembly-to-hide-malware/</loc>
		<lastmod>2021-10-25T18:59:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/Blog_1060x698-3.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/fig1-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/fig2-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/fig3-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/fig4-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/why-phishing-still-works-and-what-to-look-for/</loc>
		<lastmod>2021-10-27T13:23:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/Blog_1060x698-3.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/forging-a-career-in-cybersecurity/</loc>
		<lastmod>2021-10-27T13:27:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/Blog_1060x698-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/why-businesses-must-put-cybersecurity-first/</loc>
		<lastmod>2021-10-27T13:30:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/Blog_1060x698-5.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/2021-cryptojacking-trends-and-investigation-recommendations/</loc>
		<lastmod>2021-10-27T21:22:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/Blog_1060x698-12.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/Picture1-18.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/Picture1-19.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/data-science-machine-learning-101-hunting-unknown/</loc>
		<lastmod>2021-10-28T13:32:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/Blue.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-customers-protected-from-compromised-npm-package-in-supply-chain-attack/</loc>
		<lastmod>2021-10-28T20:32:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/Blog_1060x698-11.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/NPM-RR-fig3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/NPM-RR-fig1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/NPM-RR-fig2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/microsoft-ad-supply-chain-compromise-emphasizes-need-for-zero-trust/</loc>
		<lastmod>2021-11-01T16:36:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/Blog_1060x698.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-falcon-demonstrates-continued-excellence-in-av-comparatives-evaluation/</loc>
		<lastmod>2021-11-02T13:18:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/Blog_1060x698_v2.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/webnavigationbrowser-adware-analysis-and-recommendations/</loc>
		<lastmod>2021-11-03T16:25:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/WebNavigatorBrowser-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/WebNavBrow-Picture1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/WebNavBrow-Picture2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/WebNavBrow-Picture3-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/WebNavBrow-Picture4-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/WebNavBrow-Picture5-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/WebNavBrow-Picture6-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/WebNavBrow-Picture7-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/gartner-report-rates-crowdstrike-top-epp-vendor/</loc>
		<lastmod>2021-11-08T21:12:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/03/CS_Gartner_Blog_V1-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/why-the-detection-funnel-hits-diminishing-returns/</loc>
		<lastmod>2021-11-12T17:52:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/Blog_1060x698-5.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/image1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-crowdstrike-supports-ics-ot-landscape-with-rockwell-automation/</loc>
		<lastmod>2021-11-12T21:08:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/Blog_1060x698-6.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/financial-motivation-drives-golang-malware-adoption/</loc>
		<lastmod>2021-11-12T22:39:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Blog_1060x698-8-1.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/fig1-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/fig2a.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/fig2b.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/fig2c.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/fig3-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/fig4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/fig5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/fig6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/fig7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/fig8.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-crowdstrike-intelligence-uses-fuzzing-to-hunt-for-bugs/</loc>
		<lastmod>2021-11-16T21:49:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/Blog_1060x698-8.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/Picture1-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/Screen-Shot-2021-11-16-at-3.27.14-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/Screen-Shot-2021-11-16-at-3.30.51-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-to-monitor-streaming-data-infrastructure-at-scale/</loc>
		<lastmod>2021-11-17T17:17:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/Blog_1060x698-9.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/fig1-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/fig2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/fig3-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/fig4-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/fig5-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/fig6-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/fig7-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/fig8-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/unexpected-adventures-in-json-marshaling/</loc>
		<lastmod>2021-11-17T20:07:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/Blog_1060x698-11.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/Screen-Shot-2021-11-17-at-2.38.18-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/Screen-Shot-2021-11-17-at-2.42.59-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/Screen-Shot-2021-11-17-at-2.47.15-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/Screen-Shot-2021-11-17-at-2.48.41-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/Screen-Shot-2021-11-17-at-2.51.22-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-falcon-platform-wins-best-edr-and-aaa-rating-from-se-labs/</loc>
		<lastmod>2021-11-22T16:27:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/Blog_1060x698_v2-2.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/blogimage.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/falcon-overwatch-case-study-telecommunications/</loc>
		<lastmod>2021-11-23T14:19:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/09/OW2021_Blog.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/OverWatch-report-2021-V4-37.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/three-best-practices-to-effectively-manage-failed-messages/</loc>
		<lastmod>2021-11-24T13:15:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/Blog_1060x698-13.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-falcon-overwatch-detected-silent-chollima-custom-tooling/</loc>
		<lastmod>2021-11-29T15:35:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/09/OW2021_Blog.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/Picture1-11.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-a-modular-testing-model-increases-efficiency-and-scalability/</loc>
		<lastmod>2021-12-03T14:04:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/12/Blog_1060x698.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/12/Picture1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/12/Picture1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/12/Picture1-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/2021-crowdstrike-global-security-attitude-survey/</loc>
		<lastmod>2021-12-07T07:57:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/12/VB_Blog_1060x698.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-doppelpaymer-hunts-and-kills-windows-processes/</loc>
		<lastmod>2021-12-07T13:58:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/12/Blog_1060x698-2.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/12/Picture1-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/12/Picture1-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-a-generalized-validation-testing-approach-improves-efficiency/</loc>
		<lastmod>2021-12-09T20:05:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/12/Blog_1060x698-4.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-detects-all-attacks-in-new-se-labs-edr-test/</loc>
		<lastmod>2021-12-14T12:29:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/12/Blog_1060x698_v2.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-falcon-receives-second-approved-business-security-product-from-av-comparatives-in-2021/</loc>
		<lastmod>2021-12-15T12:22:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/12/Blog_1060x698_v2-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdxdr-alliance-expands-to-help-security-teams-identify-and-hunt-threats-faster/</loc>
		<lastmod>2021-12-20T13:21:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/12/Blog_1060x698-7.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-crowdstrike-prevents-volume-shadow-tampering-by-lockbit-ransomware/</loc>
		<lastmod>2021-12-21T01:46:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/Blog_1060x698-10.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/fig1-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/fig2-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/fig3-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/fig4-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/fig5-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/vss_no_protections2.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/falcon_vss_protection.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-services-launches-log4j-quick-reference-guide/</loc>
		<lastmod>2021-12-21T20:12:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/12/Blog_1060x698-8.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/free-targeted-log4j-search-tool/</loc>
		<lastmod>2021-12-22T22:25:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/12/Blog_1060x698-9.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/12/Picture1-5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-to-baseline-and-hunt-log4shell-with-the-crowdstrike-falcon-platform/</loc>
		<lastmod>2021-12-23T16:49:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/12/Blog-1.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/12/Picture1-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/12/Picture1-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/12/Picture1-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/12/Picture1-9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/12/Picture1-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/12/Picture1-11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/12/Picture1-12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/12/Picture1-13.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/12/Picture1-14.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/12/Picture1-15.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/introducing-falcon-hardware-enhanced-exploit-detection/</loc>
		<lastmod>2021-12-28T14:11:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/Blog_1060x698-2.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/fig1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/fig2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/12/Picture1-16.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-crowdstrike-protects-customers-from-log4shell-threats/</loc>
		<lastmod>2022-01-06T20:29:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/12/Blog_1060x698-5.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/12/Figure1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/12/Figure2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/12/Figure3-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/automating-remote-remediation-of-trickbot-part-1/</loc>
		<lastmod>2022-01-07T19:15:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/07/Blog_1060x698-1-3.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/07/Figure1_process-tree-copy-SM-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/07/Figure2_UI-detection-SM-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/07/Figure3_-svchost-quertasklist-SM-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/07/Figure4_pids-query-SM-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/07/Figure5_parent-pids-SM-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/07/Figure6_killPIDs-SM-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/07/Figure7_schtask-SM-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/07/Figure8_schtask2-SM-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/07/Figure9_schtask3-SM-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/07/Figure10_service-SM-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/07/Figure11_service2-SM-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/07/Figure12_service3-SM-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/07/Figure13_files-SM-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/07/Figure14_files2-SM-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/07/Figure15_files3-SM-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/wizard-spider-adversary-update/</loc>
		<lastmod>2022-01-07T19:17:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/10/Blog_1060x698-19-1-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/10/WIZARD-blog-Figure-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/10/WIZARD-blog-Figure-2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/10/WIZARD-blog-Figure-3-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/10/Figure-4-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/automating-remote-remediation-of-trickbot-part-2/</loc>
		<lastmod>2022-01-07T19:21:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/07/Blog_1060x698-2-3.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/07/Part2Figure1-SM-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/07/Part2Figure2-SM-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/07/Part2Figure3-SM-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/07/Part2Figure4-SM-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/07/Part2Figure5-SM-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/07/Part2Figure6-SM-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/07/Part2Figure7-SM-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/07/Part2Figure8-SM-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/07/Part2Figure9-SM-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/07/Part2Figure10-SM-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/07/Part2Figure11-SM-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/07/Part2Figure12-SM-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/07/Part2Figure13-SM-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-falcon-complete-stopped-a-solarwinds-serv-u-exploit-campaign/</loc>
		<lastmod>2022-01-10T18:52:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/Blog_1060x698-10.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/fig1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/fig2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/fig3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/fig4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/fig5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/fig6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/fig7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/fig8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/fig9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/fig10.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/tellyouthepass-ransomware-analysis-reveals-modern-reinterpretation-using-golang/</loc>
		<lastmod>2022-01-11T19:01:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Blog_1060x698-4.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Picture1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Untitled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Screen-Shot-2022-01-10-at-11.33.00-AM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Picture1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Picture1-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Untitled-1-1-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Screen-Shot-2022-01-10-at-11.44.38-AM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Picture1-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Picture1-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Picture1-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Picture1-6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-adds-zero-trust-partner-integrations/</loc>
		<lastmod>2022-01-13T12:38:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Blog_1060x698-5.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-releases-digital-forensics-and-incident-response-tracker/</loc>
		<lastmod>2022-01-13T15:58:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Blog_1060x698-3.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Picture1-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Picture1-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Picture1-9.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/linux-targeted-malware-increased-by-35-percent-in-2021/</loc>
		<lastmod>2022-01-13T18:17:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Blog_1060x698-6.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Fig1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Fig2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Fig3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Fig4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Fig5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-to-use-microsoft-protection-logging-for-forensic-investigations/</loc>
		<lastmod>2022-01-20T15:57:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Blog_1060x698-8.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Picture1-12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Screen-Shot-2022-01-20-at-7.28.37-AM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Screen-Shot-2022-01-20-at-7.34.31-AM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Screen-Shot-2022-01-20-at-10.56.01-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-launches-falcon-fund/</loc>
		<lastmod>2022-01-25T22:25:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/08/FalconFund-Blog-Imagev2-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/sidoh-wizard-spiders-mysterious-exfiltration-tool/</loc>
		<lastmod>2022-01-31T15:18:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/08/Blog_1060x698.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-crowdstrike-protects-against-data-wiping-malware/</loc>
		<lastmod>2022-01-31T17:47:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Blog_1060x698-14.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Picture1-34.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Picture1-35.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Picture1-36.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/logging-with-go/</loc>
		<lastmod>2022-02-08T21:23:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/02/Blog_1060x698-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/identity-security-lesson-from-recent-high-profile-breaches/</loc>
		<lastmod>2022-02-15T18:10:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/12/Blog_1060x698-36-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-to-test-endpoint-security-with-red-teaming/</loc>
		<lastmod>2022-02-15T18:12:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/who-needs-another-alert-1.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/Picture1-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/Picture1-11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/Picture1-12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/Picture1-13.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/Picture1-14.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/Picture1-15.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/Picture1-16.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/Picture1-17.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/new-mercedes-amg-f1-w13-e/</loc>
		<lastmod>2022-02-18T17:26:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/02/M298865_blog.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/02/M298865_blog-2-1-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/technical-analysis-of-whispergate-malware/</loc>
		<lastmod>2022-02-25T18:44:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/0122_11_WhisperGate_Blog_1060x698-1.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Screen-Shot-2022-01-19-at-12.19.18-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Screen-Shot-2022-01-19-at-1.36.57-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/the-role-of-malware-analysis-in-the-modern-security-operations-center/</loc>
		<lastmod>2022-02-25T20:26:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/08/Blog_1060x698-7.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/08/Virustotal.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/08/XML.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/08/VAlloc.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/08/b64.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/08/Gunzip.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/08/ssdeep.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/08/Cobalt.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-identity-threat-protection-is-reinventing-mdr/</loc>
		<lastmod>2022-03-02T13:08:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/03/0322_02_Reinventing_MDRIDP_Blog_1060x698.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/falcon-enhances-fileless-attack-detection-with-accelerated-memory-scanning/</loc>
		<lastmod>2022-03-04T20:01:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/03/Blog_1060x698-2-1-1.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/03/Picture1-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/03/Picture1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/03/Picture1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/03/Picture1-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-netskope-okta-proofpoint-join-forces/</loc>
		<lastmod>2022-03-08T16:25:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/06/Blog_0620_09-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/five-steps-to-kick-start-your-move-to-xdr/</loc>
		<lastmod>2022-03-09T19:37:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/03/Blog_1060x698-1.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/03/Picture1-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/why-the-most-effective-xdr-is-rooted-in-edr/</loc>
		<lastmod>2022-03-10T16:30:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/02/Blog_1060x698-8.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/lessons-from-past-cyber-operations-against-ukraine/</loc>
		<lastmod>2022-03-11T16:38:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Blog-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-to-extract-memory-information-to-spot-linux-malware/</loc>
		<lastmod>2022-03-11T16:48:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Blog_1060x698-12.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Picture1-31.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Picture1-32.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Picture1-1-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Picture1-33.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Screen-Shot-2022-01-27-at-11.01.20-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/a-year-of-adaptability-and-perseverance-global-threat-report-2022/</loc>
		<lastmod>2022-03-11T17:10:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/02/GTR-2022-Blog-image-1060x698-v2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/falcon-overwatch-uncovers-ongoing-night-spider-zloader-campaign/</loc>
		<lastmod>2022-03-14T20:40:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/03/0322_04_Overwatch_NIGHT-SPIDER_Blog_1060x698.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/03/Picture1-1-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-to-decrypt-the-partyticket-ransomware-targeting-ukraine/</loc>
		<lastmod>2022-03-15T15:16:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/03/Blog_1060x698.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/03/Screen-Shot-2022-03-01-at-2.57.11-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/michael-rogers-shares-how-crowdstrike-is-driving-growth-for-partners/</loc>
		<lastmod>2022-03-15T21:59:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/03/0322_05_MeetTheChief_MichaelRogers_Blog_1060x698.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/big-game-hunting-on-the-rise-again-according-to-ecrime-index/</loc>
		<lastmod>2022-03-18T20:05:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/Blog_1060x698-5.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/Picture1-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/Picture2-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/big-game-hunting-the-evolution-of-indrik-spider-from-dridex-wire-fraud-to-bitpaymer-targeted-ransomware/</loc>
		<lastmod>2022-03-18T20:07:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/11/INDRIK-SPIDER2-copy-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/10/cardinal-innovations-healthcare-logo-black.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/11/figure_2_powershell_as_service-copy-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/11/figure_3_ransom_note.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/11/Table-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/11/Figure5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/11/figure_6_process_tree.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/11/figure_7_falcon_prevent4-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/11/figure_8_machine_learning2-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/carbon-spider-embraces-big-game-hunting-part-1/</loc>
		<lastmod>2022-03-18T20:08:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/08/Blog_1060x698-11.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/08/Picture1-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/08/Picture2-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/carbon-spider-embraces-big-game-hunting-part-2/</loc>
		<lastmod>2022-03-18T20:08:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/Blog_1060x698-10.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/Picture1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-big-game-hunting-ttps-shifted-after-darkside-pipeline-attack/</loc>
		<lastmod>2022-03-18T20:10:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/09/Blog_1060x698-3.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/09/Picture1-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/big-game-hunting-with-ryuk-another-lucrative-targeted-ransomware/</loc>
		<lastmod>2022-03-18T20:12:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/01/Wizard-spider-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/02/GTR-cover-2021.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/01/RansomeNote-fig4-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/01/Prevention-image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/the-evolution-of-revil-ransomware-and-pinchy-spider/</loc>
		<lastmod>2022-03-18T20:17:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/07/Blog_1060x698-1-1.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/07/Picture1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/eliminate-endpoint-security-blind-spots/</loc>
		<lastmod>2022-03-21T12:41:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/03/Blog_1060x698-28-1.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/03/Picture1-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/03/Picture1-11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/03/Picture1-12.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/access-brokers-targets-and-worth/</loc>
		<lastmod>2022-03-23T15:40:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/02/Blog_1060x698-9.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/02/Picture1-15.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/02/Picture2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/02/Picture1-16.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/02/Picture1-17.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-crowdstrike-stopped-an-sql-injection-campaign/</loc>
		<lastmod>2022-03-23T18:10:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/08/Blog_1060x698.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/08/Figure-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/08/Figure-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/08/Falcon-Complete-Timeline-Graphic.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-ecrime-groups-leverage-sonicwall-vulnerability-cve-2019-7481/</loc>
		<lastmod>2022-03-23T18:14:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Blog_0520_08-1.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/ExploitPy.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Picture1-5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-falcon-complete-team-stopped-an-rdp-attack-part-1/</loc>
		<lastmod>2022-03-24T23:17:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/08/Blog_1060x698-5-1-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/08/View-blog2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/08/Figure-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/08/Figure-3-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-falcon-complete-team-stopped-an-rdp-attack-part-2/</loc>
		<lastmod>2022-03-24T23:19:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/08/Blog_1060x698-6-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/08/View-blog3-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/08/Blog_0820_05-Graph-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/ms-rdp-credssp-servers-vulnerability-security-advisory/</loc>
		<lastmod>2022-03-24T23:19:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/12/Blog_1060x698-8-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/12/Figure-1-1-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/forrester-names-crowdstrike-a-leader-in-incident-response-services/</loc>
		<lastmod>2022-03-28T16:25:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/03/0322_07_ForresterWave_EDR_Blog_1060x698.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/03/2022Q1_Cybersecurity-Incident-Response-Services_176321-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/new-apps-on-crowdstrike-store-to-empower-your-soc/</loc>
		<lastmod>2022-03-30T17:16:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/03/Blog_1060x698-3.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/bert-embeddings-new-approach-for-command-line-anomaly-detection-part-2/</loc>
		<lastmod>2022-04-01T13:00:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/04/Blog_1060x698-10.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/03/BERT_fig1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/03/BERT_fig2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/03/BERT_fig3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/03/BERT_fig4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/03/BERT_fig5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/03/BERT_fig6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-to-pwn2own-the-cisco-rv340-router/</loc>
		<lastmod>2022-04-01T14:10:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/03/0322_09_Tale-2-Cookies_Pwn2Own_Cisco_RV340_Router_Blog_1060x698.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-dominates-in-forrester-wave-edr-report/</loc>
		<lastmod>2022-04-06T13:52:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/04/0322_07_ForresterWave_Blog_1060x698_ed.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/the-true-goal-of-xdr-is-to-address-semantic-gaps/</loc>
		<lastmod>2022-04-13T18:14:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/02/Blog_1060x698-8.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/04/22-GC-081_XDR_Blog_Graphic_R2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/meet-crowdstrikes-adversary-of-the-month-for-february-mummy-spider/</loc>
		<lastmod>2022-04-20T19:16:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/02/Mummy-spider-Blog-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/meet-crowdstrikes-adversary-of-the-month-for-january-voodoo-bear/</loc>
		<lastmod>2022-04-20T19:19:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/01/VOODOO-Bear-blog-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/who-is-salty-spider/</loc>
		<lastmod>2022-04-20T19:21:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/09/SALTY-SPIDER-Blog-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/staying-off-the-land-methodology/</loc>
		<lastmod>2022-04-20T19:23:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/04/staying-off-the-land-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/04/SOTL-Figure-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/04/SOTL-Figure-2-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/overwatch-exposes-aquatic-panda-in-possession-of-log-4-shell-exploit-tools/</loc>
		<lastmod>2022-04-20T19:24:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/12/Blog_1060x698-10.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/12/Fig1-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-28-at-4.30.42-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/12/Fig3-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/12/Fig4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/12/Fig5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/12/Fig6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/meet-crowdstrikes-adversary-of-the-month-for-april-stardust-chollima/</loc>
		<lastmod>2022-04-20T19:28:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/04/April-Adversary-Stardust-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/navigating-five-stages-of-breach-grief/</loc>
		<lastmod>2022-04-22T13:01:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/04/0422_01_5-Phases-Grief_Blog_1060x698.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/advanced-falconry-seeking-prey-machine-learning/</loc>
		<lastmod>2022-05-03T18:38:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/Blue.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2014/12/Image-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2014/12/Image-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2014/12/Image-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2014/12/Image-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-partners-with-center-for-threat-defense-to-prioritize-adversary-techniques/</loc>
		<lastmod>2022-05-10T14:50:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/05/Blog_1060x698-7.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/05/Picture1-8.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-crowdstrike-analyzes-macos-malware-to-optimize-automated-detection-capabilities/</loc>
		<lastmod>2022-05-10T19:07:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/05/Blog_1060x698-4-1.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/05/image4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/05/image3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/05/image1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/05/image2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/falcon-overwatch-detects-iceapple-framework/</loc>
		<lastmod>2022-05-11T16:04:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/05/0522_03_ICE-APPLE_R2_Blog_1060x698.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-ecriminals-monetize-ransomware/</loc>
		<lastmod>2022-05-13T20:30:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/05/Blog_1060x698.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-named-an-overall-leader-in-kuppinger-cole-leadership-compass-for-epdr-market-2022/</loc>
		<lastmod>2022-05-16T15:05:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/05/0522_05_KuppingerCole_Analyst-Report_Blog_1060x698.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-crowdstrike-supercharges-incident-response-with-identity-threat-detection/</loc>
		<lastmod>2022-05-18T18:10:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/Blog_1060x698-7.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/fig1-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/fig2-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/fig3-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/six-tips-for-securing-privileged-enterprise-accounts/</loc>
		<lastmod>2022-05-18T18:11:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/12/Blog_1060x698-5-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/analysis-of-ecrime-menu-style-toolkits/</loc>
		<lastmod>2022-05-18T18:13:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/02/press-1-to-play-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/02/Press-1-to-Play-Figure-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/02/Press-1-to-Play-Figure-2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/02/Press-1-to-Play-Figure-3-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/02/Press-1-to-Play-Figure-4-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/02/Press-1-to-Play-Figure-5-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/02/Press-1-to-Play-Figure-6-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/one-click-attack-surface-in-linux-desktop-environments/</loc>
		<lastmod>2022-05-26T21:38:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/Blog_1060x698-3.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/Picture1-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/linux-mirai-malware-double-on-stronger-chips/</loc>
		<lastmod>2022-05-26T21:40:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/05/0522_02_Mirai-Malware_Linux_Blog_1060x698.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/05/Picture1-12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/05/Picture1-13.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/05/Picture1-16.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/05/Picture1-15.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/the-easy-solution-for-stopping-modern-attacks/</loc>
		<lastmod>2022-05-26T21:40:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/03/0322_03_EasySolution_StoppingModernAttacks_EPP_Blog_1060x698.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/better-together-global-attitude-survey-takeaways-2021/</loc>
		<lastmod>2022-05-26T21:42:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/Blog_1060x698-4.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Picture1-13.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-to-hunt-for-decisivearchitect-and-justforfun-implant/</loc>
		<lastmod>2022-05-26T23:29:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/05/0522_10_Hunting-Global-Telecomms-Threat_DecisiveArchitect_JustForFun_Blog_1060x698.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/05/Picture1-14.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/05/Picture1-17.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/hunting-for-malicious-jscript-with-overwatch-elite/</loc>
		<lastmod>2022-05-27T16:04:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/05/0522_08_Hunt-Malicious-Jscript_OverwatchBlog_1060x698.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/05/Picture1-19.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/05/Picture1-20.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/05/Picture1-21.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-discovers-use-64-bit-zero-day-privilege-escalation-exploit-cve-2014-4113-hurricane-panda/</loc>
		<lastmod>2022-06-03T17:18:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2014/10/HurricanePanda6-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2014/10/HurricanePanda11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2014/10/HurricanePanda2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2014/10/HurricanePanda5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-announces-innovations-that-prioritize-data-rsac-2022/</loc>
		<lastmod>2022-06-06T11:36:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/06/0622_02_RSA-Day3_MikeS_Blog_1060x698.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-delivers-protection-that-powers-productivity-rsac-2022/</loc>
		<lastmod>2022-06-06T17:58:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/06/0622_02_RSA-Day1_George_Blog_1060x698.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/introducing-crowdstrike-asset-graph/</loc>
		<lastmod>2022-06-06T21:43:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/06/0622_02_RSA-Day2_AMOL_Blog_1060x698.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/06/AG-Screenshot-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-to-compromise-a-printer-in-3-simple-steps/</loc>
		<lastmod>2022-06-07T18:15:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/06/Blog_1060x698.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-overwatch-hunts-for-vulnerabilities-like-follina/</loc>
		<lastmod>2022-06-08T10:00:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/06/0221_05_BackDoor.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/06/Picture1-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/06/Picture1-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/06/Picture1-5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/7-key-ingredients-of-incident-response/</loc>
		<lastmod>2022-06-08T19:18:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/06/22-GC-027-IR-eBook_Social_Blog_7-Key-Ingredients.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-identity-protection-shuts-down-mitre-attack-adversaries/</loc>
		<lastmod>2022-06-13T15:13:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/04/0322_14_MITRE_ATTCK_02_Blog_1060x698.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/04/MITRE_Attack-Evals_Wizard-Participant.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/04/MITRE2_fig1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/04/MITRE2_fig2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/04/MITRE2_fig3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-to-block-bloodhound-attacks/</loc>
		<lastmod>2022-06-13T15:23:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/02/Bloodhound-theme-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/02/bloodhound-icon-small-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/02/Bloodhound-map-sm-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/trying-to-dance-the-samba-an-exercise-in-weaponizing-vulnerabilities/</loc>
		<lastmod>2022-06-14T19:18:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/04/Samba-blog-1-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/join-crowdstrike-intelligence-adversary-quest/</loc>
		<lastmod>2022-06-15T15:44:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/01/CSAdversaryQuest_1060x698-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/adversary-quest-walkthrough-four-catapult-spider-ecrime-challenges/</loc>
		<lastmod>2022-06-15T15:49:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/AdversaryQuest-1-featured-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/AdversaryQuest-1-Picture1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/AdversaryQuest1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/AdversaryQuest2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/AdversaryQuest3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/AdversaryQuest5-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/AdversaryQuest6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/AdversaryQuest7-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/AdversaryQuest8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/AdversaryQuest9-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/AdversaryQuest10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/AdversaryQuest-1-Picture3-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/AdversaryQuest-1-Picture4-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/AdversaryQuest-1-Picture5-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/AdversaryQuest-1-Picture6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/AdversaryQuest-1-Picture7-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/AdversaryQuest-1-Picture8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/AdversaryQuest-1-Picture9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/Screen-Shot-2022-02-24-at-8.29.27-AM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/AdversaryQuest-1-Picture11-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/AdversaryQuest11-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/Screen-Shot-2021-03-23-at-4.07.05-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/AdversaryQuest-1-Picture12-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/adversary-quest-walkthrough-four-space-jackal-hacktivist-challenges/</loc>
		<lastmod>2022-06-15T15:55:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/adversary-quest-part-2-featured.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/04/Quest2Challenge1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/04/Quest2Challenge1-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/04/Quest2Challenge1-3-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/04/Quest2Challenge1-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/04/Quest2Challenge1-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/04/Quest2Challenge1-6-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/04/adversary-quest-part-2-image-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/04/Quest2Challenge2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/04/Quest2Challenge3-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/04/Quest2Challenge3-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/04/Quest2Challenge3-3-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/04/Quest2Challenge3-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/04/Quest2Challenge3-5-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/04/Quest2Challenge3-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/04/Quest2Challenge3-7-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/04/Quest2Challenge4-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/04/Quest2Challenge4-2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/04/Quest2Challenge4-3-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/adversary-quest-walkthrough-four-protective-penguin-targeted-intrusion-challenges/</loc>
		<lastmod>2022-06-15T15:59:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Picture1-3.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Picture2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/output.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Picture1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Picture1-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-the-falcon-platform-modernizes-your-security-stack/</loc>
		<lastmod>2022-06-15T19:26:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/02/0222_03_Falcon_Platform_Blog_1060x698.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/02/FalconPlatformSecurityCloud_MainGraphic_220222_forBlog.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-launches-free-tool-to-identify-and-help-mitigate-risks-in-azure-active-directory/</loc>
		<lastmod>2022-06-22T19:01:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/12/Blog_1060x698-35-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/12/Blog-image-1-1-e1608753048916.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/12/Blog-image-2-e1608753140792.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/observations-from-the-stellarparticle-campaign/</loc>
		<lastmod>2022-06-22T19:02:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Blog_1060x698-7.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Picture1-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Screen-Shot-2022-01-18-at-11.05.12-AM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Screen-Shot-2022-01-18-at-11.06.44-AM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Picture1-11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Screen-Shot-2022-01-18-at-11.22.46-AM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Screen-Shot-2022-01-18-at-11.32.30-AM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Screen-Shot-2022-01-18-at-11.33.35-AM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Screen-Shot-2022-01-18-at-11.33.58-AM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Screen-Shot-2022-01-18-at-11.40.45-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-crowdstrike-stops-modern-identity-based-attacks-in-chrome/</loc>
		<lastmod>2022-06-22T19:03:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/06/0522_09_CyberArk_Falcon-Coverage_Chrome_Blog_1060x698.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/06/Picture1-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/06/Picture1-10.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-services-identifies-logging-inconsistencies-in-microsoft-365/</loc>
		<lastmod>2022-06-22T19:04:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/03/Blog_1060x698-9.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/03/cloudy_fig1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/03/cloudy_fig2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/04/Cloudy_fig3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/03/cloudy_fig4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/04/Cloudy_fig5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/03/cloudy_fig6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/novel-exploit-detected-in-mitel-voip-appliance/</loc>
		<lastmod>2022-06-23T17:36:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/06/0622_06_Call_In-Side_House_Blog_1060x698.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-tops-idc-worldwide-corporate-endpoint-security-market-shares-2021/</loc>
		<lastmod>2022-06-23T21:42:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/06/0622_07_IDC_Corporate-Endpoint-Security_Market-Share_Blog_1060x698.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/overwatch-elite-in-action-tailored-threat-hunting-services/</loc>
		<lastmod>2022-06-29T18:38:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/06/Blog_1060x698-4.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-to-detect-domain-controller-account-relay-attacks-with-crowdstrike-identity-protection/</loc>
		<lastmod>2022-06-29T19:18:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/06/Blog_1060x698-1.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/06/Picture1-17.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-crowdstrike-traces-the-evolution-of-ecrime/</loc>
		<lastmod>2022-06-30T19:49:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/06/Falcon-X-Recon-featured-image-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/capture-the-flag-crowdstrike-intelligence-adversary-quest-2022/</loc>
		<lastmod>2022-07-11T16:21:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/06/0622_05_AdversaryQuest_2022_Announcement_Blog_1060x698.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/callback-malware-campaigns-impersonate-crowdstrike-and-other-cybersecurity-companies/</loc>
		<lastmod>2022-07-14T21:30:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/07/0622_03_Gartner-Security-Risk-Management-Summit_Blog.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/07/Picture1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/webcast-offers-guidance-on-adopting-the-devops-model-without-sacrificing-security/</loc>
		<lastmod>2022-07-19T12:58:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/08/DevOps-webcast-blog2-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/adversary-universe-world-tour-coming-to-city-near-you/</loc>
		<lastmod>2022-07-19T14:43:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/07/0722_01_AU-World-Tour_Blog.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/07/Picture1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/07/Picture2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-crowdstrike-machine-learning-model-maximizes-detection-efficacy-using-the-cloud/</loc>
		<lastmod>2022-07-19T19:58:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/07/Blog_0620_01.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/07/Blog-Post-Diagram-v2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-the-infrastructure-investment-and-jobs-act-delivers-on-cyber-resiliency/</loc>
		<lastmod>2022-08-01T15:21:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/0522_12_CS-Supports_Infrastructure_JobsAct_Blog_1060x698.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/improving-detection-content-with-gap-analysis-team/</loc>
		<lastmod>2022-08-08T20:43:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Blog_1060x698.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-56.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/introducing-ai-powered-indicators-of-attack-ioas/</loc>
		<lastmod>2022-08-10T11:51:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/0722_04_BlackHat_2022_Blog_1060x698.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-101.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-102.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/tabloid-jackal-adversary-quest-walkthrough-2022/</loc>
		<lastmod>2022-08-10T14:14:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/0722_03_AdversaryQuest_2022_Hacktivist_TABLOID-JACKAL_Blog_1060x698.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-57.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-58.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-59.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-60.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-61.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-62.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-64.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-65.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-66.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-67.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-68.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-69.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-70.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-71.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-72.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-73.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-74.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-75.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-76.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-77.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-78.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-79.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-80.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-81.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-82.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-83.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-84.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-85.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-86.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-87.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-88.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-89.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-90.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-91.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-92.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-93.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-94.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-95.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-96.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-97.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-98.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-99.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-100.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/catapult-spider-adversary-quest-walkthrough-2022/</loc>
		<lastmod>2022-08-10T14:30:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/AdversaryQuest-1-featured-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-15.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-16.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-17.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-18.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-19.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-20.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-21.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-22.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-23.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-24.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-25.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-26.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-27.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-28.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-29.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-30.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-31.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-32.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-33.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-34.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-35.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-36.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-37.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-38.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-39.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-40.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-41.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-42.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-43.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-44.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-45.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-46.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-47.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-48.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-49.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-50.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-51.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-52.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-53.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-54.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-55.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-wins-frost-and-sullivans-global-technology-innovation-leadership-award/</loc>
		<lastmod>2022-08-16T11:48:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/0722_08_Tech-Innovation-Leadership-Award_R2_Blog_1060x698.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/protective-penguin-adversary-quest-walkthrough-2022/</loc>
		<lastmod>2022-08-23T17:20:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-3.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-117.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-118.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-119.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-120.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-121.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-122.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-123.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-124.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-125.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-126.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-127.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-128.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-129.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-130.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-131.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-132.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-133.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-134.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-135.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-136.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-137.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-138.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-139.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-140.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-141.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/cryptobreak_cropped.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-142.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-143.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-144.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-145.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-146.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-147.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-148.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-149.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-150.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-151.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-152.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-153.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-154.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-155.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-156.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-157.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-158.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/output.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-159.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/deep-dive-into-custom-spark-transformers-for-machine-learning-pipelines/</loc>
		<lastmod>2022-08-24T17:00:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/07/Blog_1060x698-2.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/why-you-shouldnt-buy-iam-and-identity-security-from-the-same-vendor/</loc>
		<lastmod>2022-08-27T00:08:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/03/Blog_1060x698-2.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/do-you-think-smbs-are-safe-from-cyberattacks-think-again/</loc>
		<lastmod>2022-08-30T17:46:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/01/SMBBlog-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-to-detect-and-prevent-impackets-wmiexec/</loc>
		<lastmod>2022-08-31T20:46:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/0822_02_Defense-Against-the-Lateral-Arts_Blog_1060x698.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-174.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-175.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-176.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-177.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Screen-Shot-2022-08-31-at-2.48.22-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-178.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-179.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-180.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-181.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-182.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-183.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-184.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-185.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-186.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-187.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-188.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-189.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-190.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-191.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-192.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-193.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-194.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-195.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-196.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-197.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-198.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-199.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-200.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/sandbox-scryer-free-threat-hunting-tool/</loc>
		<lastmod>2022-09-01T14:49:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/09/0822_03_SandBox_Scryer_Blog_1060x698.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/09/Picture1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/09/Picture1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/09/Picture1-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/09/Picture1-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/09/Picture1-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/countdown-to-fal-con-2022/</loc>
		<lastmod>2022-09-01T16:35:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/09/0922_01_Fal.Con_2022_Blog_1060x698-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/naming-adversaries-and-why-it-matters-to-security-teams/</loc>
		<lastmod>2022-09-02T17:13:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/05/0322_10_Naming-Adversaries_Blog_1060x698.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/prophet-spider-exploits-citrix-sharefile/</loc>
		<lastmod>2022-09-02T17:31:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/03/0222_02_Prophet_Spider_Blog_1060x698.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-to-detect-and-prevent-sonicwall-gms-remote-code-execution/</loc>
		<lastmod>2022-09-02T17:34:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/08/Blog_1060x698-10.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/08/Picture1-6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/exploit-research-strengthens-customer-protection/</loc>
		<lastmod>2022-09-02T17:43:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/02/0222_08_CS_Investigates_Exploits_Multi-OS_Blog_1060x698.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/02/Picture1-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/02/Picture1-11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/02/Picture1-12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/02/Picture1-13.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/02/Picture1-14.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/02/falcon-spotlight-dashboard-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/identity-protection-and-the-benefits-of-a-unified-security-platform/</loc>
		<lastmod>2022-09-06T18:54:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/09/0322_02_Reinventing_MDRIDP_Blog_1060x698.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/09/Picture1-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/09/Picture1-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/09/Picture1-7.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/election-security-threats-recommendations/</loc>
		<lastmod>2022-09-06T20:13:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/07/Blog_1060x698-3-1-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/a-primer-on-machine-learning-in-endpoint-security/</loc>
		<lastmod>2022-09-12T15:14:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/04/ML-Blog_Image-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-crowdstrike-achieves-fast-machine-learning-model-training-with-tensorflow-and-rust/</loc>
		<lastmod>2022-09-12T15:47:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/06/Blog_1060x698-8.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/06/Fig1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/06/Fig2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/06/Fig3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/06/Fig4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/06/Fig5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/06/Fig6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/06/Fig7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/06/Fig8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/06/Fig9.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/fal-con-2022-session-highlights-and-special-guests/</loc>
		<lastmod>2022-09-14T14:13:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/09/0922_01_Fal.Con_2022_Blog_1060x698-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/threat-hunting-report-highlights-2022/</loc>
		<lastmod>2022-09-14T14:27:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/09/0922_03_OW_THR_2022_Blog_1060x698_02.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/getting-the-bacon-from-cobalt-strike-beacon/</loc>
		<lastmod>2022-09-15T19:51:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/09/Blog_1060x698-9-4-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/09/Figure-1a-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/09/Figure-2a-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/09/Figure-3a-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/09/Figure-4a-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/09/Figure-5a-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/09/Figure-6a-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/09/Figure-7a-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/09/Figure-8a-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/09/Figure-9a-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/09/Figure-10a-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/rsa-sc-magazine-names-falcon-intelligence-best-threat-intelligence/</loc>
		<lastmod>2022-09-16T03:18:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/03/RSA-wrap-up-blog-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/announcing-the-partners-of-the-year-2022/</loc>
		<lastmod>2022-09-20T00:02:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/09/0722_08_Tech-Innovation-Leadership-Award_Blog_1060x698.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-drives-the-convergence-of-security-and-observability/</loc>
		<lastmod>2022-09-20T16:48:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/09/0922_01_Fal.Con_2022_Blog_1060x698-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/malicious-spear-phishing-campaign-targets-upcoming-winter-olympics-in-south-korea/</loc>
		<lastmod>2022-09-21T17:49:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/01/winter-olympics-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/01/chart-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/announcing-falcon-logscale-and-falcon-complete-logscale/</loc>
		<lastmod>2022-09-21T18:19:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/09/0922_05_Fal.Con_Humio-Name-Change_LogScale_Blog_1060x698.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/compromised-docker-honeypots-used-for-pro-ukrainian-dos-attack/</loc>
		<lastmod>2022-09-22T14:52:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/05/0522_01_CompromisedDocker_Pro-Ukrain_DoS-Attack_Blog_1060x698.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/05/Picture1-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/05/Picture1-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/05/Picture1-7.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-to-extend-zero-trust-protection-to-the-data-layer-with-acquisition-of-securecircle/</loc>
		<lastmod>2022-09-27T20:50:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/12/Blog-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/FalconAnnouncementGraphic_Nov2021_v3cg.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/magic-quadrant-2018-crowdstrike-separates-from-the-pack/</loc>
		<lastmod>2022-09-27T20:52:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/01/MQ-Blog_Image-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/01/magic_quadrant_for_endpoint_blog.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/hunting-badness-os-x-crowdstrikes-falcon-real-time-forensic-capabilities/</loc>
		<lastmod>2022-09-28T19:54:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/Blue.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/mitre-attck-evaluation-reveals-crowdstrike-as-the-most-effective-edr-solution/</loc>
		<lastmod>2022-09-28T19:55:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/12/MITRE-Eval-Blog-Image2-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/12/MITRE-ATTCK-Evaluation-1024x492.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/an-analysis-of-lightbasin-telecommunications-attacks/</loc>
		<lastmod>2022-09-29T14:56:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/09/Blog_1060x698-7.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/nopac-exploit-latest-microsoft-ad-flaw-may-lead-to-total-domain-compromise/</loc>
		<lastmod>2022-09-29T15:31:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Blog_1060x698-2.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-threat-actors-use-github-repositories-to-deploy-malware/</loc>
		<lastmod>2022-10-03T17:46:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/09/0922_07_GitHub_Malware_Blog_1060x698.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/09/Picture1-34.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/09/Picture1-35.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/09/Picture1-36.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/09/Picture1-37.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/09/Gitting-the-Malware-Fig-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/09/Picture1-39.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/09/Picture1-40.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/09/Picture1-41.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/09/Picture1-42.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/09/Picture1-43.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/09/Picture1-44.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/09/Picture1-45.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/09/Picture1-46.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/09/Picture1-47.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/09/Picture1-48.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-adversaries-are-weaponizing-the-cloud/</loc>
		<lastmod>2022-10-05T00:04:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/Adversary-Cloud.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/the-future-of-the-cyber-insurance-market/</loc>
		<lastmod>2022-10-05T17:31:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/Blog_1060x698-3-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/pinchy-spider-adopts-big-game-hunting/</loc>
		<lastmod>2022-10-12T14:39:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/03/PIINCHY-SPIDER-blog-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/new-dragos-app-crowdstrike-store/</loc>
		<lastmod>2022-10-12T14:56:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/09/DragosApp-CS-Store3-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-a-leader-in-new-idc-marketscape-endpoint-security-assessment/</loc>
		<lastmod>2022-10-12T15:03:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/Blog_1060x698-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdscore-solution-to-alert-fatigue/</loc>
		<lastmod>2022-10-12T16:36:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/08/CrowdScore-Noise-Blog-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/itproportal-crowdstrike-discusses-life-beyond-malware/</loc>
		<lastmod>2022-10-12T16:40:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/05/Life-Beyond-Malware-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/the-right-endpoint-detection-and-response-edr-can-mitigate-silent-failure/</loc>
		<lastmod>2022-10-12T16:42:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/09/silent-failure-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-named-a-leader-in-the-2018-forrester-wave-for-endpoint-detection-and-response/</loc>
		<lastmod>2022-10-12T17:33:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/07/Blog_onlyCS-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/07/2018Q3_EDR_Badge.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/07/2018Q2_EPP-Badge-small.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-crowdscore-hunts-attacker-hidden-in-data/</loc>
		<lastmod>2022-10-12T17:38:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/02/who-needs-another-alert-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/3-tips-to-outpace-the-adversary/</loc>
		<lastmod>2022-10-12T17:40:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/11/Cybersec-Maturity-Continuing-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-falcon-overwatch-spots-threats-in-mitre-adversary-emulation/</loc>
		<lastmod>2022-10-12T17:44:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/05/0322_17_MITRE_ATTCK_05_Blog_1060x698.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/05/MITRE_Attack-Evals_Wizard-Participant.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/05/Picture1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/05/Picture1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/05/Picture1-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/05/Picture1-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/05/Picture1-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/defending-against-malware-with-machine-learning/</loc>
		<lastmod>2022-10-12T17:47:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/07/Machine-Learning-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/ir-team-investigations-uncover-ecrime-use-of-nation-state-attack-methods/</loc>
		<lastmod>2022-10-12T17:55:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/01/IR-casebook-blog-image-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/best-practices-for-mobile-device-security/</loc>
		<lastmod>2022-10-12T18:04:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/06/Mobile-Sec-blog-1-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/power-of-the-platform-spring-release-extends-the-crowdstrike-falcon-platform/</loc>
		<lastmod>2022-10-12T18:07:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/05/CrowdStrike-spring-2016-release.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-receives-highest-rating-in-recent-third-party-tests/</loc>
		<lastmod>2022-10-12T18:13:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/08/Validation-blog-image4-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/08/SC-Mag-rating-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/08/AV-Comparatives-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/08/image004-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/08/avtest_approved_macos_2019-06-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/kovter-killer-how-to-remediate-the-apt-of-clickjacking/</loc>
		<lastmod>2022-10-12T18:18:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/09/Kovter-Blog-image-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/09/kovter-blog/Figure-one.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/09/kovter-blog/Figure-two.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/the-anatomy-of-wiper-malware-part-3/</loc>
		<lastmod>2022-10-14T13:46:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/09/Blog_1060x698-14.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/09/Picture1-22.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/09/Picture1-23.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/09/Picture1-24.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/09/Picture1-25.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/09/Picture1-26.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/09/Picture1-27.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/09/Picture1-28.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/09/Picture1-29.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/09/Picture1-30.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/09/Picture1-31.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/09/Picture1-32.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/09/Picture1-33.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-advances-to-research-partner-with-mitre-engenuity/</loc>
		<lastmod>2022-10-21T22:45:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/1022_09_MITRE-CTID_Research-Partner_Blog.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/CTID.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/playing-hide-and-seek-with-ransomware-part-1/</loc>
		<lastmod>2022-10-25T14:35:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/1022_02_Hide-and-seek-with-Ransomware_Blog_1060x698.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/Picture1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/Picture1-11.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/election-security-threat-landscape/</loc>
		<lastmod>2022-10-26T18:39:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/Blog_1060x698-3-1-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-human-expertise-maximizes-detection-efficacy-across-machine-learning-lifecycle/</loc>
		<lastmod>2022-10-27T12:56:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/Blog_1060x698-2.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/Picture1-37.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/Picture1-38.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/falcon-insight-xdr-and-falcon-logscale-use-cases/</loc>
		<lastmod>2022-10-27T14:25:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/1022_04_XDR-and-LogScale_Blog_1060x698.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/new-supply-chain-attack-leverages-comm100-chat-installer/</loc>
		<lastmod>2022-11-01T16:10:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/09/0922_10_SupplyChain_Malware_Trojanized-Comms100-Chat-Installers_Blog_1060x698.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/09/Fig1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/09/Fig2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/09/Screen-Shot-2022-09-30-at-7.43.50-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/discovering-the-critical-open-ssl-vulnerability-with-falcon-platform/</loc>
		<lastmod>2022-11-01T19:04:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/Blog_1060x698-8.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/CVE-2022-OPENSSL_Screenshot.2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/Spotlight-Image-for-OpenSLL.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-named-leader-forrester-wave-endpoint-security-suites-q3-2019/</loc>
		<lastmod>2022-11-02T22:41:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/09/CS_Forrester_Blog_530x349_V1-R3-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-falcon-overwatch-hunts-for-out-of-band-application-security-testing/</loc>
		<lastmod>2022-11-03T18:26:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/11/1122_02_OW-Hunts-Out-of-Band-App-Sec-Testing_Blog_1060x698.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/why-we-chose-elm-for-humios-web-ui/</loc>
		<lastmod>2022-11-08T17:43:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Untitled-1-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/using-humio-log-management-as-the-heart-of-a-siem/</loc>
		<lastmod>2022-11-08T17:46:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/Screen-Shot-2021-10-19-at-4.08.40-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/seven-ways-to-think-about-observability/</loc>
		<lastmod>2022-11-08T17:47:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/Screen-Shot-2021-05-13-at-1.30.38-PM-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/three-key-features-of-log-management-for-cloud-native-systems/</loc>
		<lastmod>2022-11-08T17:50:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/Screen-Shot-2021-05-13-at-1.30.38-PM-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/set-up-your-logs-for-better-insight-make-logs-first-class-citizens-in-your-codebase/</loc>
		<lastmod>2022-11-08T17:54:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/09/Screen-Shot-2021-09-21-at-10.37.44-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/optimizing-an-elm-library/</loc>
		<lastmod>2022-11-08T17:57:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Screen-Shot-2021-07-02-at-1.21.09-PM-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/ui-cropped.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Screenshot-from-2021-02-13-15-52-57-cropped-even-smaller-annotated.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Screenshot-from-2021-02-13-15-51-53-cropped-even-smaller-annotated.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/imageLikeEmbed-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/imageLikeEmbed-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/pasted-image-0-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/observability-redefined/</loc>
		<lastmod>2022-11-08T17:58:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Screen-Shot-2021-06-28-at-9.30.36-AM-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Screen-Shot-2021-06-28-at-9.49.33-AM-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/observability-and-your-scrum-team-break-down-silos-and-promote-agility/</loc>
		<lastmod>2022-11-08T18:00:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/08/Screen-Shot-2021-08-12-at-8.49.01-AM.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/08/unnamed-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/monitoring-digital-experience-to-stay-close-to-customers-how-observability-can-transform-financial-services-and-fintech/</loc>
		<lastmod>2022-11-08T18:02:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Screen-Shot-2021-06-30-at-8.32.35-AM-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/introducing-the-nest-by-humio/</loc>
		<lastmod>2022-11-08T18:07:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/Untitled-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/customers-conviction-speed-a-conversation-with-george-kurtz-ceo-and-co-founder-at-crowdstrike/</loc>
		<lastmod>2022-11-08T18:09:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/George_Kurtz_crowdstrike_blog_size.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-to-use-the-humio-operator-to-run-humio-on-kubernetes/</loc>
		<lastmod>2022-11-08T18:12:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/Screen-Shot-2021-10-25-at-4.39.32-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/screen-shot-2020-11-04-at-2-39-28-pm.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/screen-shot-2020-11-04-at-2-30-07-pm.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/start-logging-everything-humio-community-edition-series/</loc>
		<lastmod>2022-11-08T18:14:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/05/Screen-Shot-2022-05-05-at-7.35.28-AM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/05/Untitled.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/05/Untitled-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/05/Untitled-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/05/Untitled-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/05/Untitled-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/05/Untitled-5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-to-detect-zerologon-attacks-in-your-windows-infrastructure/</loc>
		<lastmod>2022-11-08T18:15:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/09/Screen-Shot-2021-09-30-at-9.23.18-AM.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/09/fig1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-to-collect-microsoft-office-365-logs-with-o365beat/</loc>
		<lastmod>2022-11-08T18:17:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/Screen-Shot-2021-10-04-at-10.40.26-AM.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-humio-leverages-kafka-and-brute-force-search-to-get-blazing-fast-search-results/</loc>
		<lastmod>2022-11-08T18:21:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/09/featured.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/09/fig1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/09/fig2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-fast-can-you-grep/</loc>
		<lastmod>2022-11-08T18:22:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/09/Screen-Shot-2021-09-13-at-5.45.09-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/09/How-Fast-Can-You-Grep.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/09/How-Fast-Can-You-Grep2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/09/How-Fast-Can-You-Grep3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/09/How-Fast-Can-You-Grep4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/09/How-Fast-Can-You-Grep5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/everything-you-think-you-know-about-storing-and-searching-logs-is-wrong/</loc>
		<lastmod>2022-11-08T18:25:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/09/Screen-Shot-2021-09-09-at-9.13.42-AM.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/automate-your-cloud-operations-with-humio-and-fylamynt/</loc>
		<lastmod>2022-11-08T18:26:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-16-at-7.45.56-AM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-16-at-10.04.08-AM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-16-at-10.05.32-AM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-16-at-10.06.27-AM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-16-at-10.07.28-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/humio-brings-streaming-observability-to-fal-con-2021/</loc>
		<lastmod>2022-11-08T18:30:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/Screen-Shot-2021-10-04-at-11.35.42-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/7-things-to-know-about-index-free-technology/</loc>
		<lastmod>2022-11-08T18:32:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/09/Screen-Shot-2021-09-21-at-9.20.40-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-at-oktane22/</loc>
		<lastmod>2022-11-09T02:35:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/11/Blog_1060x698-5.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/the-force-multiplier-of-correlating-your-security-telemetry/</loc>
		<lastmod>2022-11-09T21:00:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/0722_10_Getting-Started-Guide_Falcon-LTR_Blog_1060x698.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/11/ForceMultiplier1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/11/ForceMultiplier2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/unifying-the-power-of-edr-with-saas-and-application-security/</loc>
		<lastmod>2022-11-14T18:42:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/09/Blog_1060x698-18.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/09/Picture1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-crowdstrike-protects-against-domain-impersonations/</loc>
		<lastmod>2022-11-15T17:04:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/11/1122_04_Typosquatters_Falcon-Intel-Recon_Blog_1060x698-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/an-end-to-smash-and-grab-more-targeted-approaches/</loc>
		<lastmod>2022-11-15T18:16:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/12/Think-tank-image-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-achieves-99-percent-detection-coverage-in-mitre-attack-evaluations-for-security-service-providers/</loc>
		<lastmod>2022-11-16T20:35:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/11/0622_03_Gartner-Security-Risk-Management-Summit_Blog.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/11/ATTCK_EVAL_2022_MSSP_Participant.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/11/MITRE_Eval_Diagram_2.svg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-teams-up-with-mitre-to-develop-attack-defense-for-iaas/</loc>
		<lastmod>2022-11-17T15:44:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/11/Blog_1060x698-7.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/11/Picture1-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/11/Picture1-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/11/Picture1-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/tis-the-season-for-ecrime/</loc>
		<lastmod>2022-11-17T18:57:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/11/1122_07_E-Crime_Tis-the-Season_Blog.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-crowdstrike-integrates-threat-intelligence-with-endpoint-protection/</loc>
		<lastmod>2022-11-18T20:43:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/08/GK-Blog_Images-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/what-makes-crowdstrike-falcon-logscale-so-fast/</loc>
		<lastmod>2022-11-22T16:39:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/11/XXXX_Falcon-LogScale-So-Fast_Blog_1060x698.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-and-cloud-security-alliance-enable-pervasive-zero-trust/</loc>
		<lastmod>2022-11-22T21:15:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/03/Blog_1060x698-5.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-identity-protection-can-accelerate-your-cyber-insurance-initiatives/</loc>
		<lastmod>2022-11-30T18:43:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/03/CyberSecurity_CyberInsurance-Blog_1060x698-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-to-acquire-reposify-to-reduce-risk-across-the-external-attack-surface-and-fortify-customer-security-postures/</loc>
		<lastmod>2022-12-05T21:18:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/09/Blog.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-powers-mxdr-by-deloitte/</loc>
		<lastmod>2022-12-06T18:03:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/Blog_1060x698.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/announcing-falcon-intelligence-recon-plus/</loc>
		<lastmod>2022-12-06T18:20:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/07/FalconX.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/falcon-intelligence-threat-intelligence-offers-new-context-in-mitre-attack-evaluation/</loc>
		<lastmod>2022-12-06T18:31:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/04/0322_15_MITRE_ATTCK_03_Blog_1060x698.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/04/MITRE_Attack-Evals_Wizard-Participant-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/04/Picture1-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/04/Picture1-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/04/Picture1-6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/arrests-put-new-focus-on-carbon-spider-adversary-group/</loc>
		<lastmod>2022-12-07T15:44:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/08/CARBON-SPIDER-Blog-image-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/08/Carbon-spider-MITRE1b.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/08/Carbon-Spider-MITRE2b.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/08/Carbon-Spider-MITRE3b.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/08/CARBON-SPIDER-Diagram-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/maze-ransomware-analysis-and-protection/</loc>
		<lastmod>2022-12-07T19:56:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/12/Blog_1060x698-5-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/12/Preempt-Maze-blog-image-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/inside-mitre-attack-evaluation-how-crowdstrikes-elite-managed-services-operate-in-the-real-world/</loc>
		<lastmod>2022-12-07T22:46:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/12/john_V1_R2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/12/Picture1-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/12/Picture1-10.57.07-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/5-partner-predictions-for-2023/</loc>
		<lastmod>2022-12-09T15:15:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/12/1222_01_2023-Predictions_Blog_1060x698.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/our-customers-have-spoken-crowdstrike-delivers-the-best-in-edr-epp-and-xdr/</loc>
		<lastmod>2022-12-13T12:59:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/12/CustomerSiteRewardsWebBlog_1060x698.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/12/GridforWeb_v5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-to-leverage-crowdstrike-falcon-spotlight-to-prioritize-vulnerabilities/</loc>
		<lastmod>2022-12-13T22:39:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/12/Blog_1060x698-2.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/12/FalconSpotlight1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/12/FalconSpotlight2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/managed-threat-hunting-should-top-every-ciso-wish-list/</loc>
		<lastmod>2022-12-14T18:43:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/12/1122_02_OW-Hunts-Out-of-Band-App-Sec-Testing_Blog_1060x698.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/expose-and-disrupt-adversaries-with-crowdstrike-falcon-intelligence-recon/</loc>
		<lastmod>2022-12-19T18:40:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/12/1222_06_Beyond-Perimeter_Falcon-Intelligence-Recon_Blog_1060x698.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/12/Fig1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/12/Fig2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/12/Fig3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/12/Fig4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/why-smbs-need-to-rethink-their-cybersecurity-strategy/</loc>
		<lastmod>2022-12-20T15:00:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/1022_08_Small-Business-Rethink-Cybersecurity_Blog_1060x698.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/owassrf-exploit-analysis-and-recommendations/</loc>
		<lastmod>2022-12-20T19:01:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/12/1222_09_NotProxyNotShell_Blog_1060x698.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/12/Picture1-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/12/Figure1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/12/Figure2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/12/Figure3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/12/Figure4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/12/Figure5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/12/Figure6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/12/Picture1a.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/12/newnewnew.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/detecting-vishing-intrusions-in-retail/</loc>
		<lastmod>2022-12-20T22:33:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/02/OW2021_Blog.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/02/Picture1-23.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/10-questions-to-help-choose-the-right-log-management-solution/</loc>
		<lastmod>2022-12-21T14:49:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/12/1222_08_10-Questions_Choosing-LogMgmt-Solution_Blog_1060x698.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/cve-2020-1472-zerologon-security-advisory/</loc>
		<lastmod>2022-12-23T15:05:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/12/Blog_1060x698-8-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/12/Figure-1-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/enterprise-remediation-with-crowdstrike-and-moxfive-part-1/</loc>
		<lastmod>2022-12-27T22:03:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/12/0Ur7ghyA.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/enterprise-remediation-with-crowdstrike-and-moxfive-part-2/</loc>
		<lastmod>2022-12-29T20:53:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/12/0Ur7ghyA.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/12/EnterpriseRemediation1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/malware-through-the-eyes-of-a-convolutional-neural-network/</loc>
		<lastmod>2023-01-03T19:27:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/11/Blog_1060x698-25-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/11/Screen-Shot-2020-11-02-at-12.01.22-PM-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/11/Screen-Shot-2020-11-02-at-12.13.16-PM-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/11/Substring_1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/11/Substring_2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/11/Substring_3-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/11/Substring_4-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/11/Substring_5-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/11/Substring_6-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-launches-falcon-search-engine-bringing-speed-and-agility-to-cybersecurity/</loc>
		<lastmod>2023-01-04T22:05:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/07/crowdstrike-falcon-search-engine.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/demonstrating-falcon-fusion-automated-response-against-mitre-test-scenarios/</loc>
		<lastmod>2023-01-06T14:04:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/04/0322_16_MITRE_ATTCK_04_Blog_1060x698.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/04/MITRE_Attack-Evals_Wizard-Participant-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/04/Picture1-25.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/04/Picture1-26.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-to-defend-against-threats-with-falcon-fusion-and-falcon-real-time-response/</loc>
		<lastmod>2023-01-06T14:29:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/02/Blog_1060x698-6.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/02/Picture1-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/02/Picture1-9.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/development-cost-of-porting-tensorflow-models-to-pure-rust/</loc>
		<lastmod>2023-01-06T14:43:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/08/Blog_1060x698-8.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/08/training_overview.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/08/conversion_mechanism.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/08/possible-scenarios.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-to-modernize-your-soc-with-falcon-fusion/</loc>
		<lastmod>2023-01-06T15:04:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/Blog_1060x698-2.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/Picture1-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/why-xdr-should-be-on-your-soc-roadmap/</loc>
		<lastmod>2023-01-06T15:22:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/0622_02_RSA-Day3_MikeS_Blog_1060x698.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-116.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/introducing-falcon-xdr-and-crowdxdr-alliance/</loc>
		<lastmod>2023-01-06T15:27:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/xdr-alliance-blog.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/falcon-xdr-now-available/</loc>
		<lastmod>2023-01-06T15:32:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/02/Blog_1060x698-3.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/falcon-xdr-bringing-clarity-to-market-confusion/</loc>
		<lastmod>2023-01-06T15:36:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/02/Blog_1060x698-4.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/experts-discuss-why-xdr-must-start-with-edr/</loc>
		<lastmod>2023-01-06T15:40:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Blog_1060x698-3.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-and-industry-partners-release-open-cybersecurity-schema-framework/</loc>
		<lastmod>2023-01-06T15:43:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/0722_09_OCSR_Blog_1060x698.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-a-strong-performer-in-forrester-new-wave-for-xdr/</loc>
		<lastmod>2023-01-06T15:47:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/xdr-forrester-blog-image.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/new-community-tool-crowdstrike-heartbleed-scanner/</loc>
		<lastmod>2023-01-12T19:14:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/Blue.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/attackers-set-sights-on-active-directory-understanding-your-identity-exposure/</loc>
		<lastmod>2023-01-13T20:07:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/12/Blog_1060x698-3.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/12/IDP_ADRR_ReadySetStop-social-static-banner-1200x628_v3.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/9-ways-a-public-sector-ciso-uses-crowdstrike-identity-threat-protection/</loc>
		<lastmod>2023-01-13T20:08:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/12/Blog_1060x698-1.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/12/IDP_ADRR_ReadySetStop-social-static-banner-1200x628_v3.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/why-small-businesses-choose-crowdstrike/</loc>
		<lastmod>2023-01-17T15:45:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/1022_08_Small-Business-Rethink-Cybersecurity_Blog_1060x698.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/01/Picture1-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-crowdstrike-stops-revil-ransomware-from-kaseya-attack/</loc>
		<lastmod>2023-01-19T20:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/07/Blog_1060x698-2-1.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/07/Picture1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/07/Picture1-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/3-steps-to-end-to-end-xdr-with-crowdstrike-and-zscaler/</loc>
		<lastmod>2023-01-23T16:34:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/Go-Beyond-the-Perimeter-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/01/zscaler1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/01/zscaler2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/01/zscaler3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-leads-av-test-macos-evaluation-with-max-score-for-third-time-in-2022/</loc>
		<lastmod>2023-01-24T18:57:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/12/1122_13_Falcon_MacOS-AV-Test_Blog_1060x698-1.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/12/Picture1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-falcon-pro-for-mac-achieves-100-percent-mac-malware-protection/</loc>
		<lastmod>2023-01-24T19:31:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/06/0622_08_FalconPro_forMac_AV-Comparatives_Award_Blog_1060x698-1.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/06/Picture1-16.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-falcon-achieves-highest-score-in-av-test-macos-evaluation-for-business-2022/</loc>
		<lastmod>2023-01-24T19:41:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/05/0522_04_MacOS_AV-Test_Blog_1060x698.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/05/Picture1-11.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-achieves-100-percent-ransomware-prevention-se-labs-edr-test/</loc>
		<lastmod>2023-01-24T20:37:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/1022_10_AAA-Enterprise-Award_SE-Labs_Ransomware_Blog_1060x698.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/EAS_ransomware_Award_october_2022-e1673282194243.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/Picture1-27.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/who-is-ember-bear/</loc>
		<lastmod>2023-01-24T20:43:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/03/Blog_1060x698-10.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-cloudflare-expand-zero-trust/</loc>
		<lastmod>2023-01-24T20:47:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/03/Blog_1060x698-6.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/03/Picture1-8.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/magniber-ransomware-caught-using-printnightmare-vulnerability/</loc>
		<lastmod>2023-01-25T13:35:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/08/Blog_1060x698-4.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/08/Picture1-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/08/Picture2-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/falcon-pro-for-mac-wins-fourth-av-comparatives-approved-security-product-award/</loc>
		<lastmod>2023-01-25T13:41:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/07/Blog_1060x698-8-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/rsa-conference-recap-2021/</loc>
		<lastmod>2023-01-25T13:58:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Blog_1060x698_V2-1-1.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/race-cars-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-crowdstrike-protects-against-recent-cozy-bear-phishing-campaign/</loc>
		<lastmod>2023-01-25T14:03:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Blog_1060x698-5-1.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Picture1-1-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-cto-mike-sentonas-talks-adversaries-at-rsac-2021/</loc>
		<lastmod>2023-01-25T14:28:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/MSentonas_blog-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/Mike-Sentonas-podcast-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/pit-stop-vs-pit-wall-teamwork-metaphor/</loc>
		<lastmod>2023-01-25T15:07:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/f1-blog-main-1.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/f1-blog-inside-1-1.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/f1-blog-inside-2-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-product-announcements-rsa-2021/</loc>
		<lastmod>2023-01-25T15:15:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/Blog_1060x698_V2-2.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/falcon-protects-from-darkside-ransomware/</loc>
		<lastmod>2023-01-25T15:20:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/Darkside-Blog_1060x698-1.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/DarkSide-Pic-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/redefining-the-we-in-we-stop-breaches/</loc>
		<lastmod>2023-01-25T15:28:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/We-Blog_1060x698.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/we-stop-so-you-can-go/</loc>
		<lastmod>2023-01-25T15:48:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/06/Blog_2x-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/a-long-range-view-of-the-cybersecurity-landscape/</loc>
		<lastmod>2023-01-25T16:02:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/04/Sentonas-Interview-RSA2020-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/the-hoot-podcast-episode-22-humio-at-vijilan-with-kevin-nejad-founder-and-ceo/</loc>
		<lastmod>2023-01-25T16:20:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/07/Screen-Shot-2021-07-02-at-11.02.13-AM-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/the-hoot-podcast-episode-33-financial-services-roundtable/</loc>
		<lastmod>2023-01-25T16:25:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/07/Screen-Shot-2021-07-02-at-11.02.13-AM-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/the-hoot-podcast-episode-35-humio-at-bloomreach-with-junaid-sheriff/</loc>
		<lastmod>2023-01-25T16:31:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/07/Screen-Shot-2021-07-02-at-11.02.13-AM-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/the-hoot-podcast-episode-19-humio-with-miguel-adams-government-agency-security-engineer/</loc>
		<lastmod>2023-01-25T16:35:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/07/Screen-Shot-2021-07-02-at-11.02.13-AM-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/podcast-crowdstrike-cto-michael-sentonas-shares-his-thoughts-on-humio-and-how-crowdstrike-is-addressing-the-complexity-of-the-threat-landscape/</loc>
		<lastmod>2023-01-25T16:38:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/07/Screen-Shot-2021-07-02-at-11.02.13-AM-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/interview-with-simon-phillips-experienced-security-practitioner-and-humio-customer/</loc>
		<lastmod>2023-01-25T16:41:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Screen-Shot-2021-06-10-at-12.41.54-PM-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-adversaries-persist-with-aws-user-federation/</loc>
		<lastmod>2023-01-30T14:38:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/01/0123_07_AWS-User-Federation_Rogue_Permissions_Blog_1060x698-1.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/01/Picture1-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/01/Picture1-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/01/Picture1-11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/01/Picture1-12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/01/Picture1-13.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/01/Picture1-14.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/01/Picture1-15.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/01/Picture1-16.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/01/Picture1-17.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/01/Picture1-18.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/01/Picture1-19.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/01/Picture1-20.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/01/Picture1-21.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/when-crowdstrike-is-number-1-our-customers-win/</loc>
		<lastmod>2023-01-30T15:54:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/11/1022_12_CS-Fights-to-be-Number-1_Blog_1060x698.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-a-google-chrome-enterprise-recommended-partner/</loc>
		<lastmod>2023-01-30T16:03:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/0922_08_CS_GoogleChrome_LogScale_Blog_1060x698_v1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/small-business-cyberattack-analysis-most-targeted-smb-sectors/</loc>
		<lastmod>2023-01-30T19:16:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/01/0123_09_SMB-Malware-Attacks_Blog_1060x698.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/01/Untitled-1-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/01/Untitled-1-1-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-store-adds-new-apps-for-soc-teams/</loc>
		<lastmod>2023-01-31T14:31:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Blog_1060x698-11.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/ceo-power-panel-discussion/</loc>
		<lastmod>2023-01-31T14:38:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/01/Blog_1060x698-28-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-ceo-pandemic-fuels-digital-and-security-transformation-trends/</loc>
		<lastmod>2023-01-31T14:48:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/11/Blog_1060x698-31-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-falcon-xdr-extends-detection-and-response-the-right-way/</loc>
		<lastmod>2023-01-31T15:14:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/02/Blog_1060x698-3.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/02/Picture1-7.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/experts-insights-from-the-fal-con-2020-election-protection-panel/</loc>
		<lastmod>2023-01-31T15:18:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/10/Blog_1060x698-22-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/building-your-security-stack-with-the-crowdstrike-store/</loc>
		<lastmod>2023-02-06T16:41:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/07/Blog_1060x698-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/make-compliance-a-breeze-with-modern-log-management/</loc>
		<lastmod>2023-02-07T20:50:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/02/0223_01_Audits-Centralized-Log-Mgmt_Blog_1060x698.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/dll-side-loading-how-to-combat-threat-actor-evasion-techniques/</loc>
		<lastmod>2023-02-13T15:25:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/02/0123_11_DLL-Sideloading_Advanced-Memory-Scanning_Blog_1060x698.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/02/Picture1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/02/dlldetectionstatic.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/02/Picture1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/02/Picture1-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-ranked-number-one-in-idc-endpoint-security-market-report-2022/</loc>
		<lastmod>2023-02-16T13:00:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/02/0223_02_IDC-Worldwide-Endpoint-Leader_Blog_1060x698.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/going-beyond-malware-the-rise-of-living-off-the-land-attacks/</loc>
		<lastmod>2023-02-22T22:42:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/05/CSO-LOTL-blog2-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/why-you-need-ai-and-machine-learning-to-combat-hands-on-keyboard-attacks/</loc>
		<lastmod>2023-02-22T22:44:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/02/1122_01_Darkside-Ai-vs-Adversaries_Blog_1060x698.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-crowdstrike-uncovered-a-new-macos-browser-hijacking-campaign/</loc>
		<lastmod>2023-02-23T15:01:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/06/Blog_1060x698-1-1-1.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/06/Figure1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/06/Figure2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/06/Figure3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/global-threat-report-preview-2023/</loc>
		<lastmod>2023-02-28T17:32:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/02/0223_04_GTR-2023_Blog_1060x698_ALT.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-named-a-leader-in-gartner-magic-quadrant-for-epp-three-times-in-a-row/</loc>
		<lastmod>2023-03-02T16:38:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/03/1122_12_GartnerMQ_3X_3-Years-Running_Blog_1060x698_Graph.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/03/Picture1-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-wins-best-macos-security-product-for-business-2022/</loc>
		<lastmod>2023-03-02T18:15:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/03/0323_01_2022-MacOS_AV-Test-Award-Winner_Blog_1060x698.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/03/AV-TEST-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/03/AV-TEST-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-log-structured-merge-trees-enable-crowdstrike-to-process-trillions-of-events-per-day/</loc>
		<lastmod>2023-03-03T22:34:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/11/Blog_1060x698-1.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/11/Picture1-5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/guloader-dissection-reveals-new-anti-analysis-techniques-and-code-injection-redundancy/</loc>
		<lastmod>2023-03-07T14:04:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/12/1222_07_Malware-Analysis_GuLoader_Blog_1060x698.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/12/GuLoader1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/12/GuLoader2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/12/GuLoader3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/i2pminer-macos-mineware-analysis/</loc>
		<lastmod>2023-03-08T13:24:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/02/0223_03_I2P-Miner_Mineware-Targeting-MacOS_Blog_1060x698.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/02/Picture1-11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/02/Picture1-12.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/4-examples-of-third-party-testing-and-reviews-that-highlight-crowdstrikes-leadership/</loc>
		<lastmod>2023-03-09T00:00:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/03/0323_05_4-Customer-Reviews_Blog_1060x698.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-falcon-complete-stopped-a-big-game-hunting-ransomware-attack/</loc>
		<lastmod>2023-03-14T17:26:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/Blog_1060x698-2-1.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/MinutesMatterBlog-Picture1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/MinutesMatterBlog-Picture4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/MinutesMatterBlog-Picture8.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-named-a-leader-in-digital-threat-intelligence-management-market-2022/</loc>
		<lastmod>2023-03-14T18:34:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/05/0522_07_QKS_CS-Named-Leader_SPARK-Matrix_Digital-Threat-Intel-Mgmt_ALT_Blog_1060x698.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/05/Picture1-18.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-to-mature-your-threat-intelligence-program/</loc>
		<lastmod>2023-03-14T18:37:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/03/0323_04_GTR-Mature-Threat-Intel-Program_Blog_1060x698.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/03/IntelligenceMaturityJourney.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/explore-the-adversary-universe/</loc>
		<lastmod>2023-03-14T18:58:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/02/adversary_universe-1-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-falcon-intelligence-recon-mitigates-digital-risk-on-the-dark-web-and-beyond/</loc>
		<lastmod>2023-03-16T20:29:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/02/Falcon-X-Recon-featured-image-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/02/Recon-Image-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/seven-common-microsoft-ad-misconfigurations-that-adversaries-abuse/</loc>
		<lastmod>2023-03-17T17:34:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/02/Blog_1060x698-1-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/02/IT-misconfig-Figure-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/02/IT-misconfig-Figure-2-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-extends-identity-security-innovations/</loc>
		<lastmod>2023-03-20T12:04:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/03/0322_02_Reinventing_MDRIDP_Blog_1060x698.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/why-cyber-insurance-is-not-a-substitute-for-cybersecurity/</loc>
		<lastmod>2023-03-20T17:56:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/CyberSecurity_CyberInsurance-Blog_1060x698-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/introducing-falcon-for-aws/</loc>
		<lastmod>2023-03-22T17:09:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/11/GK-Blog_Image-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/01/blog-CNAPP-demo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/mitre-ctid-partnership-reveals-insider-threat-techniques/</loc>
		<lastmod>2023-03-22T18:13:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/02/Blog_1060x698-7.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/02/Insider_Threat_Knowledge_Base.svg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-named-leader-in-frost-sullivan-2022-frost-radar-for-cyber-threat-intelligence/</loc>
		<lastmod>2023-03-22T18:19:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/12/1222_04_Frost-Sullivan_Cyber-Threat-Intel_Blog_1060x698.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/12/My-project-1-7.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-and-dell-make-cybersecurity-fast-and-frictionless/</loc>
		<lastmod>2023-03-23T12:35:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/03/0323_08_Dell-CS-Announcement_Blog_1060x698.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-releases-tf2rust-free-tensorflow-to-rust-conversion-tool/</loc>
		<lastmod>2023-03-29T21:07:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/03/Blog_1060x698-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/03/tf2rust-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/03/tf2rust-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/03/tf2rust-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/qakbot-ecrime-campaign-leverages-microsoft-onenote-for-distribution/</loc>
		<lastmod>2023-03-30T20:42:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/03/0323_06_Qakbot-Microsoft-One-Note_Blog_1060x698.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/03/Picture1-14.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/03/Picture1-15.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/03/Picture1-16.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/03/Picture1-17.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/03/Picture1-18.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/03/Picture1-19.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/03/Picture1-20.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/03/Picture1-21.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/03/Picture1-22.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/03/Picture1-23.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/03/Picture1-24.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/8-lolbins-every-threat-hunter-should-know/</loc>
		<lastmod>2023-03-30T22:17:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/03/0323_03_8-LOLBins_Threat-Hunters_Blog_1060x698.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-discovers-first-ever-dero-cryptojacking-campaign-targeting-kubernetes/</loc>
		<lastmod>2023-03-30T22:55:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/03/0323_02_Dero-Cryptojacking_Kubernetes_Blog_1060x698.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/03/Picture1-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/03/Picture1-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/03/Picture1-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/03/Picture1-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/03/Picture1-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/03/Picture1-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/03/Picture1-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/03/Picture1-9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/03/Screenshot-2023-03-15-at-5.18.42-AM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/03/Picture1-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/03/Screenshot-2023-03-15-at-5.30.14-AM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/03/Picture1-11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/03/Screenshot-2023-03-15-at-5.26.56-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-crowdstrike-uses-similarity-search-to-detect-script-based-malware-attacks/</loc>
		<lastmod>2023-04-03T12:25:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/03/Blog_1060x698.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/03/Picture1-25.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/03/Picture1-26.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/03/Picture1-27.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/03/Picture1-28.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/03/Picture1-29.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/03/Picture1-30.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/getting-started-with-falcon-long-term-repository/</loc>
		<lastmod>2023-04-03T17:39:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/0722_10_Getting-Started-Guide_Falcon-LTR_Blog_1060x698.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/FalconLTR.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Falcon_LTR_Graphic_V2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-brings-xdr-to-z16-linuxone4-single-frame-and-rack-mount-models/</loc>
		<lastmod>2023-04-04T14:05:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/04/Generic_Blogs_Endpoint_Protection-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-to-improve-threat-hunting-with-falcon-long-term-repository/</loc>
		<lastmod>2023-04-04T17:17:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/0722_10_Getting-Started-Guide_Falcon-LTR_Blog_1060x698.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/LTR-Diagram-revised.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/mitigating-usb-data-exfiltration-with-new-capabilities-in-falcon-device-control/</loc>
		<lastmod>2023-04-05T19:55:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/04/0323_07_USB-Data-Exfiltration_Falcon-Device-Control_Blog_1060x698.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/04/fmir_animated.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/04/Picture1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/spicy-hot-pot-rootkit-explained/</loc>
		<lastmod>2023-04-05T21:51:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/12/Blog_1060x698-12-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/12/Figure-1-Detection-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/12/3.-FILTER_FILE_PROTECTION-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/12/4.-EXE_SYS_CHECK-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/12/5.-FILTER_360-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/12/6.-FILTER_AV_SOFTWARE-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/12/7.-RUNONCE_PERSIST-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/12/8.-WEB_HIJACK-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/12/9.-WCCENTER-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/12/11.-EAM-Data-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/12/12.-Driver-Load-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/12/13.-Drivers-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/12/14.-Driver-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/12/15.-Driver-2-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/12/16.-Renamed-Folder-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/12/17.-Denied-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/12/15.-Driver-2-1-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/double-trouble-ransomware-data-leak-extortion-part-1/</loc>
		<lastmod>2023-04-12T21:35:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/09/Blog_1060x698-9-2-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/09/Fig-1-ForumPost_PIZZO_SPIDER-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/09/Fig-2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/09/Fig-3-Blog_Chart-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/09/Fig-4-LeakSite_Maze1_C-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/09/Fig-5-HeatMap_Maze-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/09/Fig-6-LeakSite_REvil1_C-B-2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/09/Fig-7-HeatMap_REvil-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/09/Fig-8-LeakSite_Doppel_C-B-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/09/Fig-9-HeatMap_Doppel-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/09/Fig-10-large-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/09/Fig-11-large-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/09/Fig-12-LeakSite_Medusa_C-B0-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-detects-and-prevents-active-intrusion-campaign-targeting-3cxdesktopapp-customers/</loc>
		<lastmod>2023-04-13T14:47:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/03/Generic_Blogs_Intel_Alert_Adversary_1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/03/image1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/03/Screenshot-2023-03-29-at-1.41.47-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/self-extracting-archives-decoy-files-and-their-hidden-payloads/</loc>
		<lastmod>2023-04-13T14:59:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/03/0621_06_ZipFile.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/03/Screenshot-2023-03-14-at-7.12.20-am.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/03/Screenshot-2023-03-14-at-7.14.34-am.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/03/Screenshot-2023-03-14-at-7.17.42-am.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/03/Screenshot-2023-03-14-at-7.20.06-am.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/03/Screenshot-2023-03-14-at-7.25.47-am.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/03/Figure7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/03/Screenshot-2023-03-14-at-7.28.34-am.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/03/Screenshot-2023-03-14-at-7.32.58-am.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/03/Screenshot-2023-03-14-at-7.34.13-am.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/03/Screenshot-2023-03-14-at-7.35.07-am.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/03/Figure12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/03/Screenshot-2023-03-14-at-7.36.54-am.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/03/Screenshot-2023-03-14-at-7.38.07-am.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-human-intelligence-is-supercharging-crowdstrike-artificial-intelligence/</loc>
		<lastmod>2023-04-13T18:41:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/04/Blog_0620_01.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/04/Picture1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/04/Picture1-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/index-free-logging-are-indexes-necessary-or-simply-overhead/</loc>
		<lastmod>2023-04-13T18:59:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Screen-Shot-2021-06-07-at-9.40.39-AM-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-cto-michael-sentonas-shares-insights-on-humio/</loc>
		<lastmod>2023-04-13T19:09:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/07/Michael-Sentonas-blog-post-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-humio-index-free-log-management-searches-1-pb-in-under-a-second/</loc>
		<lastmod>2023-04-13T19:13:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Screen-Shot-2021-06-09-at-10.19.24-AM-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Screen-Shot-2021-06-09-at-10.19.41-AM-1024x481.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-summer-release-brings-new-modules-and-features-to-the-falcon-platform/</loc>
		<lastmod>2023-04-13T19:22:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/08/AK-Blog_Image-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/modernize-log-monitoring-to-accelerate-digital-transformation/</loc>
		<lastmod>2023-04-13T19:27:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/log-monitoring-blog-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/log-monitoring-blog-image-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/accelerate-troubleshooting-forensics-and-response-with-fast-and-efficient-search/</loc>
		<lastmod>2023-04-13T19:37:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-13-at-2.51.05-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-humio-outpaces-traditional-logging-solutions-and-leaves-competitors-in-the-dust/</loc>
		<lastmod>2023-04-13T19:41:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/Speed-and-Performance-Blog-LI-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/get-used-to-hearing-about-cybersecurity-concerns/</loc>
		<lastmod>2023-04-13T19:43:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/07/Screen-Shot-2021-07-15-at-7.27.13-AM-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/looking-for-an-alternative-to-splunk-elasticsearch-sumo-logic-or-datadog-consider-running-multiple-log-management-systems-instead/</loc>
		<lastmod>2023-04-13T20:01:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/Screen-Shot-2021-05-13-at-1.30.38-PM-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/historic-partnership-between-crowdstrike-dell-and-secureworks-delivers-true-next-gen-security-without-complexity/</loc>
		<lastmod>2023-04-13T20:07:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/01/dell-partnership-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/humio-at-lunar-way-log-management-for-a-kubernetes-and-cloud-native-environment/</loc>
		<lastmod>2023-04-13T20:25:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Screen-Shot-2021-06-08-at-11.45.25-AM-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/top-6-financial-services-log-management-use-cases/</loc>
		<lastmod>2023-04-13T20:28:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/Screen-Shot-2021-11-04-at-6.05.33-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/introducing-falcon-complete-xdr/</loc>
		<lastmod>2023-04-19T11:55:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/04/0423_04_Falcon-Complete-XDR_Blog_1060x698.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/new-falcon-fusion-features-refine-workflow-automation/</loc>
		<lastmod>2023-04-19T13:11:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/04/0423_05_Falcon-Fusion_Workflow-Automation_Blog_1060x698.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/04/Figure1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/04/Figure2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/04/Figure3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/04/Figure4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/04/Figure5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/falcon-overwatch-contributes-to-blackcat-protection/</loc>
		<lastmod>2023-04-19T20:56:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/03/Blog_1060x698-7.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/03/Picture1-13.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/03/Picture1-14.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-to-remediate-hidden-malware-real-time-response/</loc>
		<lastmod>2023-04-19T20:58:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/12/Blog_1060x698-9-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/12/Figure1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/12/Figure2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/12/Figure2b-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/12/Figure2_1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/12/Figure2_2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/12/Figure3-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/12/Figure4-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/12/Figure5-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/12/Figure6-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/12/Figure7-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/actionable-indicators-detection-signs-compromise-target-related-breaches/</loc>
		<lastmod>2023-04-24T13:33:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/03/Blue.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/simplify-xdr-adoption-with-crowdstream/</loc>
		<lastmod>2023-04-28T16:54:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/04/CrowdStream_blog_revised.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/relentless-threat-activity-puts-identities-in-the-crosshairs/</loc>
		<lastmod>2023-05-01T20:14:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/05/0423_01_ID-in-the-crosshairs_Blog_1060x698.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/new-apps-added-to-crowdstrike-store/</loc>
		<lastmod>2023-05-01T22:41:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/11/CrowdStrike-Store-Image-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/01/container-security-data-sheet.pdf</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/01/container-security-datasheet-cover-image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/taking-our-falcon-xdr-platform-further/</loc>
		<lastmod>2023-05-03T19:38:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/02/Blog-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-falcon-2018-spring-release-falcon-intelligence-epp-complete/</loc>
		<lastmod>2023-05-03T19:46:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/04/Spring-Release-Blog_Image-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/the-5-steps-of-log-management-essential-steps-to-improve-observability-enhance-security-and-monitor-system-and-application-performance/</loc>
		<lastmod>2023-05-03T19:48:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/08/Untitled-1-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/08/Untitled-1-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/08/Untitled-1-3.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/08/Untitled-1-4.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/08/Untitled-1-5.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-to-accelerate-your-security-transformation-with-google-workspace-and-crowdstrike/</loc>
		<lastmod>2023-05-03T19:53:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/04/Google-Workspace-CrowdStrike.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-expands-falcon-data-replicator-capabilities/</loc>
		<lastmod>2023-05-08T20:25:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/05/Blog_1060x698-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-to-establish-cross-border-transfer-systems-to-protect-privacy/</loc>
		<lastmod>2023-05-11T14:22:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/05/0523_01_APAC-Cross-Boarder-Transfer-Systems_03.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/carbon-spider-sprite-spider-target-esxi-servers-with-ransomware/</loc>
		<lastmod>2023-05-12T21:28:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/02/hypervisor-blog-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/02/hypervisor-fig-1-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/hypervisor-jackpotting-ecrime-actors-increase-targeting-of-esxi-servers/</loc>
		<lastmod>2023-05-12T21:29:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/02/hypervisor-blog-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-crowdstrike-boosts-machine-learning-efficacy-against-adversarial-samples/</loc>
		<lastmod>2023-05-15T10:03:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/05/1122_01_Darkside-Ai-vs-Adversaries_Blog_1060x698-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/05/figure1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/05/figure2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/05/figure3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/falcon-overwatch-granted-patents-for-two-innovative-workflow-tools/</loc>
		<lastmod>2023-05-15T18:45:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/Blog_1060x698-13.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/making-cybersecurity-everyones-duty/</loc>
		<lastmod>2023-05-17T13:52:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/Blog_1060x698-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/hypervisor-jackpotting-lack-of-antivirus-support-opens-the-door-to-adversaries/</loc>
		<lastmod>2023-05-18T12:36:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/02/hypervisor-blog-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-exceptional-in-forrester-wave-for-mdr-2023/</loc>
		<lastmod>2023-05-18T14:04:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/05/23-SRV-013_Forrester-Wave_MDR_2023_Blog_1060x698_V1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-achieves-certification-in-av-comparatives-first-anti-tampering-test/</loc>
		<lastmod>2023-05-24T17:10:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/05/AV-Comparatives-Anti-Tampering-Test-2023.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/05/2023_Anti-Tampering_Certified.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/what-is-a-hunting-lead/</loc>
		<lastmod>2023-05-24T18:41:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/04/HuntingLeads.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-first-to-deliver-bios-visibility/</loc>
		<lastmod>2023-05-24T19:50:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/04/BIOS-Blog-Image-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/what-is-cloud-native-anyway/</loc>
		<lastmod>2023-05-25T17:59:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Screen-Shot-2021-07-02-at-1.17.58-PM-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/01/blog-CNAPP-demo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/security-compromise-that-comes-with-windows-10-end-of-support/</loc>
		<lastmod>2023-05-31T17:16:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/03/Generic_Blogs_Intel_Alert_Adversary_1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/analysis-of-intrusion-campaign-targeting-telecom-and-bpo-companies/</loc>
		<lastmod>2023-05-31T20:35:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/12/Blog_1060x698.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/12/Picture1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/12/Screen-Shot-2022-12-02-at-4.30.26-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-invests-in-and-partners-with-prelude-security/</loc>
		<lastmod>2023-06-01T14:06:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/05/0523_03_Falcon-Fund_Invests-and-Partners_Prelude.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/05/Prelude-CrowdStrike.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/identifying-data-exfiltration-in-moveit-transfer-investigations/</loc>
		<lastmod>2023-06-05T20:16:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Blog_1060x698-8.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/06/MOVEit-Figure1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/japanese-overwatch-adversary-insights/</loc>
		<lastmod>2023-06-12T15:01:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/05/0523_01_APAC-Cross-Boarder-Transfer-Systems_03.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/06/OWfig1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/ai-decision-making-with-shap/</loc>
		<lastmod>2023-06-13T18:43:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/06/SHAP-main-image.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/06/SHAP-Fig-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/06/SHAP-Fig-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/06/SHAP-Fig-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/06/SHAP-Fig-4-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/06/SHAP-Table-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/06/SHAP-Fig-5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-to-avoid-being-a-victim-of-a-msp-breach/</loc>
		<lastmod>2023-06-16T21:48:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/07/Blog_1060x698.jpeg-07-06-07-521.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/discovering-moveit-software-vulnerability/</loc>
		<lastmod>2023-06-21T19:50:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Blog_1060x698-8.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/06/MOVEit2-Figure1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-wins-2023-av-comparatives-mac-os-evaluation/</loc>
		<lastmod>2023-06-22T17:14:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/06/0623_01_Falcon-Award_AV-C_Test_Blog_1060x698.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/06/2023_Mac-Security_Test_Certified.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/falcon-intelligence-recon-and-dark-web/</loc>
		<lastmod>2023-06-27T21:48:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/06/Falcon-X-Recon-featured-image-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/06/OW-Japan-blog-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/06/OW-Japan-blog-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/06/Recon-blog-Fig-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/ploutus-atm-malware-deobfuscation-case-study/</loc>
		<lastmod>2023-06-28T17:03:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/Blog_1060x698-4.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/Picture1-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/Picture1-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/Picture1-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/Picture1b.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/Picture1-5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/falcon-complete-thwarts-vanguard-panda-tradecraft/</loc>
		<lastmod>2023-06-29T18:05:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/06/23-OTH-060_adversary-5-panda-china.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/consolidating-cybersecurity-with-crowdstrike/</loc>
		<lastmod>2023-07-10T19:37:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/02/0222_03_Falcon_Platform_Blog_1060x698.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/preventing-sophisticated-attacks-tips-from-a-real-world-incident-responder/</loc>
		<lastmod>2023-07-12T19:40:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2017/08/Jackon-tips-blog-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/expanded-xdr-ecosystem-data-advantage/</loc>
		<lastmod>2023-07-13T12:53:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/0622_02_RSA-Day3_MikeS_Blog_1060x698.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/duck-hunting-with-falcon-complete-analyzing-a-fowl-banking-trojan-part-1/</loc>
		<lastmod>2023-07-19T22:05:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/10/Blog_1060x698-10-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/10/QakBot-Timeline-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/10/doc-edit_part1_figure2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/10/locked-doc_part1_figure3-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/10/modules_part1_figure4-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/10/Modules-and-objects_part1_figure5-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/10/encoding_part1_figure6-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/10/URLS_part1_figure7-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/10/chef-decode_part1_figure8-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/10/cradle_part1_figure9-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/10/ptree_part1_figure10-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/adversary-credential-theft/</loc>
		<lastmod>2023-07-19T22:55:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/08/credential-theft-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/08/MITRE-Heat-map3-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/who-is-fancy-bear/</loc>
		<lastmod>2023-07-19T22:56:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2016/09/FancyBearBlog-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/noauth-microsoft-azure-ad-vulnerability/</loc>
		<lastmod>2023-07-20T15:36:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/12/Blog_1060x698-3.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/07/Fig1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/07/Fig2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/07/Fig3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/07/Fig10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/07/Fig11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/07/Fig4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/07/Fig5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/07/Fig6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/07/Fig7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/07/Fig8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/07/Fig9.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-meets-new-tsa-cybersecurity-requirements/</loc>
		<lastmod>2023-07-20T21:03:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/04/TSA-blog_v1-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/4-common-endpoint-tools-used-to-facilitate-covert-c2/</loc>
		<lastmod>2023-07-20T21:52:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/01/0123_04_WalkingThroughWalls_Tools-for-C2_Blog_1060x698.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/chromeos-falcon-insights/</loc>
		<lastmod>2023-07-21T22:10:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/07/crowdstrike-chromeos.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/07/InsightforChromeOS.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-falcon-mitre-attack-evaluation-results-second-iteration/</loc>
		<lastmod>2023-07-27T21:09:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/04/BlogHeader-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/04/Figure-1-copy-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/04/MITRE-Screenshot-Figure-6-small-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/04/Figure-3-med-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/04/MITRE-Screenshot-Figure-4-small-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/04/Figure-8-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/new-video-series-spotlights-cybersecurity-leaders/</loc>
		<lastmod>2023-07-31T19:58:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/07/23-NA-268822-BlogBLOGECS-Protectors-Blog-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-adversary-universe-podcast-launch/</loc>
		<lastmod>2023-08-03T12:49:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/07/AU-Podcast_Blog_1060x698.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/using-similarity-based-mapping-to-prevent-breaches/</loc>
		<lastmod>2023-08-03T12:49:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/02/mapping-it-out-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/06/Similarity-Based-Mapping-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-named-leader-with-world-class-threat-intelligence/</loc>
		<lastmod>2023-08-03T14:21:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/08/Promo-Graphics-Jul-2023_1060x698-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/software-supply-chain-attacks-gained-traction-in-2017-and-are-likely-to-continue/</loc>
		<lastmod>2023-08-03T19:25:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/03/Blog-Supply-chain-image-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-debuts-counter-adversary-operations-team/</loc>
		<lastmod>2023-08-08T13:22:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/08/0521_11_WhenSecondsMatter.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/scattered-spider-attempts-to-avoid-detection-with-bring-your-own-vulnerable-driver-tactic/</loc>
		<lastmod>2023-08-09T19:17:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/01/0123_01_SCATTERED-SPIDER_Blog_1060x698.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/01/Picture1-edited.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/01/Picture2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/playing-hide-and-seek-with-ransomware-part-2/</loc>
		<lastmod>2023-08-09T19:21:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/1022_02_Hide-and-seek-with-Ransomware_Blog_1060x698.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/Figure1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/Figure2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/Figure3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/Figure4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/Figure5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/Figure6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/Figure7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/Figure8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/Figure9.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/4-ways-adversaries-hijack-dlls/</loc>
		<lastmod>2023-08-10T11:24:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/12/1222_10_DLL-HiJacking_Blog_1060x698.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/bert-embeddings-new-approach-for-command-line-anomaly-detection/</loc>
		<lastmod>2023-08-10T11:37:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Blog_1060x698-10.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Picture1-14.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Picture1-15.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Picture1-16.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Picture1-17.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Screen-Shot-2022-01-26-at-5.00.25-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Screen-Shot-2022-01-26-at-5.01.35-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Picture1-18.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Picture1-19.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/falcon-complete-zero-day-exploit-cve-2023-36874/</loc>
		<lastmod>2023-08-10T14:05:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/Blog_1060x698-10.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/08/wermgr.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-achieves-100-percent-attack-detection/</loc>
		<lastmod>2023-08-14T18:01:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/08/23-OTH-106_CrowdStrike-Scores-100_Blogs_V4.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/08/SE-Labs-Apr-Jun-2023.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/zero-day-malware-classification-automation/</loc>
		<lastmod>2023-08-17T21:08:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/04/Blog_1060x698-10.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/06/Figure1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/06/Figure2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/06/Figure3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/06/Figure4-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/06/Figure5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/06/Figure6-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/06/Figure7-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/06/Figure8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/06/Figure9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/06/Figure10-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/06/Figure11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/06/Figure12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/06/Figure13.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/06/Figure14.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/06/Figure15.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/healthcare-experiences-cybersecurity-emergencies/</loc>
		<lastmod>2023-08-23T15:22:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/09/Blog_1060x698-2.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrikes-fight-against-identity-based-attacks/</loc>
		<lastmod>2023-08-24T14:31:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/08/Generic_Blogs_Identity-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/ecriminals-use-payroll-bec-to-steal-paychecks/</loc>
		<lastmod>2023-09-07T13:48:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/09/0923_02_e-Crime_Impersonating-School-Staff_Stealing-Paychecks.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/09/BEC.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/the-new-crowdstrike-community-now-available/</loc>
		<lastmod>2023-09-08T16:08:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/09/0823_03_CS-Community-Site-Launch.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/09/23-MA-076_Customer-Support-Communtiy_Badges_Founding-Member.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/09/CrowdStrikeCommunityRanks.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-announces-falcon-complete-for-service-providers/</loc>
		<lastmod>2023-09-12T00:01:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/09/0923_01_Falcon-Complete-for-Service-Providers_MDR.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/windows-restart-manager-part-2/</loc>
		<lastmod>2023-09-12T16:57:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/08/0823_01_MSFT-Windows-Restart-Manager.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/09/Fig1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/09/Fig2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/09/Fig3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/09/Fig4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/09/Fig5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/09/Fig6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/09/Fig7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/09/Fig8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/09/Fig9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/09/Fig10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/09/Fig11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/09/Fig12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/09/Fig13.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/windows-restart-manager-part-1/</loc>
		<lastmod>2023-09-12T16:59:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/08/0823_01_MSFT-Windows-Restart-Manager.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/08/Figure1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/08/Figure2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/08/Figure3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/08/Figure4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/08/Figure5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/08/Figure6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/08/Figure7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/08/Figure8.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/why-legacy-antivirus-is-an-easy-target/</loc>
		<lastmod>2023-09-14T15:11:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/03/Blog_1060x698-28-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-joins-mitre-engenuity-summiting-the-pyramid/</loc>
		<lastmod>2023-09-14T15:44:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/02/Blog_1060x698-7.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/09/Pyramid-to-Techniques.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/falcon-logscale-chrome-enterprise-security-telemetry-integration/</loc>
		<lastmod>2023-09-14T17:10:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/09/0923_03_LogScale_ThreatHunting_Chrome.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/09/LogScaleChromeOS-figure1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/addressing-threat-landscape-with-intel-and-ai/</loc>
		<lastmod>2023-09-18T15:54:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/03/Blog_1060x698-2-1-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/unveiling-the-crowdstrike-marketplace/</loc>
		<lastmod>2023-09-18T15:57:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/09/0923_04_CS-Marketplace_Fal.Con_.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/09/CrowdStrikeMarketplace.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-highest-rated-2023-gartner-voice-of-the-customer-for-epp/</loc>
		<lastmod>2023-09-20T15:35:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/02/0222_03_Falcon_Platform_Blog_1060x698.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/announcing-crowdstrike-falcon-counter-adversary-operations-elite/</loc>
		<lastmod>2023-09-21T16:31:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/09/Blog_1060x698-4.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-achieves-100-percent-mitre-engenuity-attack-enterprise-evaluation/</loc>
		<lastmod>2023-09-21T19:30:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/09/MITRE-100_Blog_01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/09/Figure1-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/09/Figure2-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/09/Figure3-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/09/Figure4-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/09/Figure5-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/09/Figure6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/09/Figure7-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/09/MITREbadge.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/falcon-intelligence-recon-automation-advancements/</loc>
		<lastmod>2023-09-26T17:42:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/06/Falcon-X-Recon-featured-image-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/09/Figure1-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/09/Figure2-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/09/Figure3-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrikes-advanced-memory-scanning-stops-threat-actor/</loc>
		<lastmod>2023-09-27T16:33:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/02/0123_11_DLL-Sideloading_Advanced-Memory-Scanning_Blog_1060x698.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/09/Figure1-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/09/Figure2-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/09/Figure3-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/09/Figure4-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/09/Figure5-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-vs-microsoft-defender-for-endpoint/</loc>
		<lastmod>2023-10-03T13:56:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/09/0222_03_Falcon_Platform_Blog_1060x698.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/three-recommendations-for-next-gen-cybersecurity-framework/</loc>
		<lastmod>2023-10-03T18:27:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/10/Blog_1060x698.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/move-from-legacy-to-next-gen-siem-falcon-logscale/</loc>
		<lastmod>2023-10-05T15:46:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/02/0223_01_Audits-Centralized-Log-Mgmt_Blog_1060x698.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/09/MoveFromLegacySIEMtoFalconLogScale.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/top-5-siem-use-cases-logscale-solves/</loc>
		<lastmod>2023-10-05T15:50:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/11/XXXX_Falcon-LogScale-So-Fast_Blog_1060x698.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/06/LogScaleSIEMblog1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/06/LogScaleSIEMblog2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/06/LogScaleSIEMblog3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/augment-or-replace-siem-with-crowdstrike-falcon/</loc>
		<lastmod>2023-10-05T15:53:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/11/XXXX_Falcon-LogScale-So-Fast_Blog_1060x698.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/07/1ModernLogMgmt.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/07/2UserBehaviorAnalytics.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/07/3ThreatIntelligence.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/07/4EndpointDetectionResponse.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-falcon-delivers-true-platform-consolidation/</loc>
		<lastmod>2023-10-05T18:39:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/09/Fal.Con_Product-Announcements_Black.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-to-expand-cloud-security-leadership-with-bionic-acquisition/</loc>
		<lastmod>2023-10-05T18:41:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/09/0923_06_Bionic-Acquisition.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-box-partnership-adds-automated-protections/</loc>
		<lastmod>2023-10-12T21:59:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/10/1023_01_CS-Box-Partnership_02.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/forrester-recognizes-crowdstrike-as-leader-in-endpoint-security/</loc>
		<lastmod>2023-10-19T14:34:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/10/1023_04_Forrester-EP.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/falcon-for-mobile-releases-innovations/</loc>
		<lastmod>2023-10-20T16:58:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/10/0921_06_Telecomm_LightBasin.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/10/Figure1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/10/Figure2a.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/10/Figure2b.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/10/Figure3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/10/Figure4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/10/Figure5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/10/Figure6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/10/Figure7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/10/Figure8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/10/Figure9.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/forrester-names-crowdstrike-a-leader-in-the-2020-wave-for-enterprise-detection-and-response/</loc>
		<lastmod>2023-10-20T21:42:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/09/CrowdStrike-logo-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/03/Forrester-EPS-EDR-Badges-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-incident-response-executive-prep-checklist/</loc>
		<lastmod>2023-10-23T17:01:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/10/0122_03_IR_Tracker_for_DFIR_Community.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/five-reasons-legacy-dlp-tools-fail/</loc>
		<lastmod>2023-10-24T14:12:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/10/Falcon-Data-Protection.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/what-to-look-for-in-a-true-xdr-solution/</loc>
		<lastmod>2023-10-31T20:52:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/12/Blog_1060x698-6.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/fal-con-2023-ushering-in-the-future-of-cybersecurity/</loc>
		<lastmod>2023-11-03T18:49:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/09/Fal.Con_Product-Announcements_Red.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/falcon-scores-100-percent-se-labs/</loc>
		<lastmod>2023-11-06T17:52:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/11/1023_05_SE-Labs_AAA-Ransomware-Prevention_Blog_1060x698.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/11/EAS_ransomware_Award_2023-11.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/five-steps-to-build-mdr-business-case/</loc>
		<lastmod>2023-11-08T18:35:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/11/1123_03_5-Steps_MDR-ROI.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/11/MDR-ROI-Figure1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-coreweave-secures-cloud-with-crowdstrike/</loc>
		<lastmod>2023-11-13T16:35:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/11/1123_04_Protectors-Spotlight.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/11/Figure1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/11/Figure2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/five-holiday-tips-to-defend-against-access-brokers/</loc>
		<lastmod>2023-11-16T15:34:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/11/1123_02_Holiday-Access-Brokers.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/unifying-endpoint-and-identity-security/</loc>
		<lastmod>2023-11-17T17:56:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/03/0322_02_Reinventing_MDRIDP_Blog_1060x698.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/11/Fig1A.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/securing-custom-developed-vs-commercial-off-the-shelf-software/</loc>
		<lastmod>2023-11-17T23:33:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/11/1123_06_Securing-Custom-Software_vs_Off-Shelf_ASPM.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/11/COTS-blog-Fig-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/11/COTS-blog-Fig-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/11/COTS-blog-Fig-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/11/COTS-blog-image-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/11/COTS-blog-Fig-2-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/accelerate-response-with-falcon-fusion/</loc>
		<lastmod>2023-11-20T18:38:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/Blog_1060x698-2.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/compromising-identity-provider-federation/</loc>
		<lastmod>2023-11-20T19:11:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/11/1023_03_Compromising-Identity-Provider-Federation.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/11/IdentityProvider-Fig1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/enable-breach-prevention-with-falcon-and-rosa/</loc>
		<lastmod>2023-11-20T19:12:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/1022_03_RedHat-OpenShift-Cert_Cloud_Blog_1060x698.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/common-cloud-security-misconfigurations/</loc>
		<lastmod>2023-11-20T19:13:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/08/Blog_1060x698-3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/cloud-security-incident-response-guidance/</loc>
		<lastmod>2023-11-21T00:57:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/06/Generic_Blogs_Cloud_Security-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/cloud-security-one-click-xdr-innovation/</loc>
		<lastmod>2023-11-21T00:58:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/06/Generic_Blogs_Cloud_Security-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-falcon-cloud-security-delivers-future-of-cnapp/</loc>
		<lastmod>2023-11-21T00:58:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/05/0423_06_Falcon-Cloud-Security_CNAPP-e1720035182317.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/rampant-cloud-activity-requires-modern-protection/</loc>
		<lastmod>2023-11-21T00:58:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/04/Blog_1060x698.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/3-ways-visualization-improves-cloud-asset-management-and-security/</loc>
		<lastmod>2023-11-21T00:59:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/02/0123_05_CS-Cloud-Asset-Graph_Blog_1060x698.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/02/Picture1-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/02/Picture1-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/02/Picture1-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/02/Picture1-9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/02/Picture1-10.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-announces-expanded-service-integrations-with-aws/</loc>
		<lastmod>2023-11-21T01:00:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/02/eZg59Nv0.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/securing-postgresql-from-cryptojacking-campaigns-in-kubernetes/</loc>
		<lastmod>2023-11-21T01:00:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/01/0123_08_Securing-PostgreSQL_Cryptojacking_Blog_1060x698.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/01/Picture1-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/01/Screen-Shot-2023-01-26-at-4.01.45-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/01/Picture1-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/01/Screen-Shot-2023-01-26-at-4.03.40-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/01/Picture1-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/01/Picture1-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/01/Picture1-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/01/Picture1-9.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-named-a-leader-in-frost-and-sullivans-frost-radar-for-cnapp-2022/</loc>
		<lastmod>2023-11-21T01:02:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/11/1122_06_CS-Named-Leader_Frost-Sullivan_CNAPP_Blog_1060x698.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/01/blog-CNAPP-demo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-to-make-cloud-defense-a-team-sport-by-turning-devops-into-a-force-multiplier/</loc>
		<lastmod>2023-11-21T01:02:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/11/eZg59Nv0.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/join-crowdstrike-at-aws-reinvent-2022/</loc>
		<lastmod>2023-11-21T01:02:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/11/1122_05_AWS_Re-Invent_2022_Blog_1060x698.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/11/Picture1-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-crowdstrike-detects-cloud-storage-misconfigurations/</loc>
		<lastmod>2023-11-21T18:18:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/11/Blog_1060x698.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/new-kiss-a-dog-cryptojacking-campaign-targets-docker-and-kubernetes/</loc>
		<lastmod>2023-11-21T18:19:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/1022_05_Kiss-a-Dog_Blog_1060x698.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/01/blog-CNAPP-demo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/Picture1a.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/Picture1b.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/Picture1-28.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/Picture1-29.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/Screen-Shot-2022-10-25-at-4.18.18-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/Picture1-30.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/Picture1-31.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/Picture1-32.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/Picture1-33.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/Picture1-39.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/Picture1-35.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/Picture1-36.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/Screen-Shot-2022-10-25-at-4.28.33-PM-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/Screen-Shot-2022-10-25-at-4.29.38-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/Screen-Shot-2022-10-25-at-5.03.15-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/meet-crowdstrike-at-kubecon-and-cloudnativecon-2022/</loc>
		<lastmod>2023-11-21T18:20:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/1022_07_KubeCon-CloudNativeCon-2022_Blog_1060x698.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/01/blog-CNAPP-demo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-extends-ciem-capabilities/</loc>
		<lastmod>2023-11-21T18:21:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/0922_09_Cloud-Security_CIEM_ID-Based-Threats_Blog_1060x698.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/01/blog-CNAPP-demo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/Picture1-26.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-sponsors-new-mitre-ctid-cloud-analytics-project/</loc>
		<lastmod>2023-11-21T18:22:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/Blog_1060x698-7.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/01/blog-CNAPP-demo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/Picture1-12.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-achieves-red-hat-openshift-certification/</loc>
		<lastmod>2023-11-21T18:22:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/1022_03_RedHat-OpenShift-Cert_Cloud_Blog_1060x698.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/01/blog-CNAPP-demo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/what-is-the-dirtycred-exploit-technique/</loc>
		<lastmod>2023-11-21T18:23:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/0922_04_DirtyCred_PandorasBox_Linux_Blog_1060x698.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/01/blog-CNAPP-demo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/Picture1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/Picture1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/Picture1-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/Picture1-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/Picture1-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/Picture1-5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-gitops-and-shift-left-security-are-changing-the-devsecops-landscape/</loc>
		<lastmod>2023-11-21T18:23:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/0822_01_GitOps_and_ShiftLeft-Security_Blog_1060x698.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/01/blog-CNAPP-demo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-160.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-and-aws-expand-partnership-offering-devops-ready-security/</loc>
		<lastmod>2023-11-21T18:24:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/07/Blog_1060x698-3.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/07/Picture1-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-at-aws-reinforce-2022/</loc>
		<lastmod>2023-11-21T18:25:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/07/0722_02_AWS_reInforce_Blog_1060x698.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/07/Picture1-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/adversaries-increasingly-target-cloud-environments/</loc>
		<lastmod>2023-11-21T18:27:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/07/0622_04_GTR_Spotlight-Cloud-Security_Blog_1060x698.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/01/blog-CNAPP-demo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-crowdstrike-detects-poisoned-python-packages-ctx-phpass/</loc>
		<lastmod>2023-11-21T18:27:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/06/Blog_1060x698-5.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/06/Picture1-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/06/Screen-Shot-2022-06-02-at-5.15.32-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/06/Picture1-7.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/adversary-focused-platform-approach-to-cloud-security/</loc>
		<lastmod>2023-11-21T18:28:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/04/22-PP-040_CNAPP_Announcement_Blog_1060x698.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/01/blog-CNAPP-demo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/lemonduck-botnet-targets-docker-for-cryptomining-operations/</loc>
		<lastmod>2023-11-21T18:30:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/04/Blog_1060x698-11.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/01/blog-CNAPP-demo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/04/Screen-Shot-2022-04-20-at-9.02.13-AM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/04/Picture1-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/04/Screen-Shot-2022-04-20-at-9.04.16-AM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/04/Picture1-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/04/Screen-Shot-2022-04-20-at-9.23.52-AM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/04/Picture1-9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/04/Picture1-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/04/Picture1-11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/04/Untitled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/04/Picture1-12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/04/Picture1-13.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/04/Picture1-14.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/stopping-cloud-breaches-with-runtime-protection/</loc>
		<lastmod>2023-11-21T18:31:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/04/Blog_1060x698-37-1.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/01/blog-CNAPP-demo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/security-consistency-from-endpoint-to-workload/</loc>
		<lastmod>2023-11-21T18:31:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/03/Blog_1060x698-8.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/forrester-wave-names-crowdstrike-strong-performer-for-cloud-workload-security-2022/</loc>
		<lastmod>2023-11-21T18:32:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/03/0322_06_ForresterWave_Cloud-Workload-Security_Blog_1060x698.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/01/1-Cloud-Workload-Protection-730x200-v1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/defense-in-depth-principles-for-protecting-workloads-crowdstrike-aws/</loc>
		<lastmod>2023-11-21T18:33:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/Blog_1060x698.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/01/5-CS-AWS-CloudSecurity-Blog-730x200-v1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/02/Picture1-22.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/02/Picture1-20.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/02/Picture1-21.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/protect-cloud-workloads-from-zero-day-vulnerabilities/</loc>
		<lastmod>2023-11-21T18:34:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/02/Blog_1060x698-2.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/01/1-Cloud-Workload-Protection-730x200-v1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/02/Picture1-6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/cve-2022-0185-kubernetes-container-escape-using-linux-kernel-exploit/</loc>
		<lastmod>2023-11-21T18:34:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Blog_1060x698-15.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/01/3-Container-Security-730x200-v2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Picture1-37.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Picture1-38.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Picture1-39.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/new-docker-cryptojacking-attempts-detected-over-2021-holidays/</loc>
		<lastmod>2023-11-21T18:36:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Blog_1060x698-11.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Picture1-20.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Picture1-21.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Picture1-22.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Picture1-23.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Picture1-24.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Picture1-25.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Picture1-26.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Picture1-27.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Picture1-28.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Picture1-29.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Picture1-30.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/why-you-need-an-adversary-focused-approach-to-stop-cloud-breaches/</loc>
		<lastmod>2023-11-21T18:37:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/01/Blog_1060x698.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/four-keys-to-selecting-a-cloud-workload-protection-platform/</loc>
		<lastmod>2023-11-21T18:37:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/Blog_1060x698-15.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/01/1-Cloud-Workload-Protection-730x200-v1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-announces-partnership-expansions-at-aws-reinvent-2021/</loc>
		<lastmod>2023-11-21T18:38:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/AWS-Blog-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/Picture1-12.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-shift-left-security-streamlines-cloud-apps-development-and-security/</loc>
		<lastmod>2023-11-21T18:38:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/Blog_1060x698-14.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/01/blog-CNAPP-demo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-crowdstrike-and-nutanix-help-achieve-holistic-workload-security/</loc>
		<lastmod>2023-11-21T18:38:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/Blog_1060x698.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/11/Picture1-10.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/falcon-cwp-complete-closes-cloud-security-skills-gap/</loc>
		<lastmod>2023-11-21T18:39:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/Blog_1060x698-14.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-and-aws-expand-technical-integrations/</loc>
		<lastmod>2023-11-21T18:40:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/Blog_1060x698.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/real-time-threat-detection-powered-by-crowdstrike-and-amazon-eventbridge/</loc>
		<lastmod>2023-11-21T18:41:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/09/Blog_1060x698-17.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/09/CS-EB-Arch.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/09/authors_trio.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/stopping-cloud-breaches-with-threat-graph/</loc>
		<lastmod>2023-11-21T18:43:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Blog_1060x698-9-1.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/01/blog-CNAPP-demo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/the-crowdstrike-security-cloud-network-effect/</loc>
		<lastmod>2023-11-21T18:43:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Blog_1060x698-4-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/google-cloud-and-crowdstrike-transforming-security-with-cloud-scale-multi-level-defense/</loc>
		<lastmod>2023-11-21T18:44:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/Cloud-Blog_1060x698-1.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/Google-Cloud-blog-5-10-2021-Image-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/Google-Cloud-blog-image-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/Picture1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/Google-Cloud-blog-Image-4-Falcon-SCC-Connector.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/Google-Cloud-blog-Image-5-SCC-with-CS.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/everything-to-know-about-securing-containers-with-falcon/</loc>
		<lastmod>2023-11-21T18:45:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/04/Sec-Containers-W-Falcon-featured-image-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/04/Sec-Containers-W-Falcon-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/04/Sec-Containers-W-Falcon-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/04/Sec-Containers-W-Falcon-3-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/04/Sec-Containers-W-Falcon-4-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/04/Sec-Containers-W-Falcon-5-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/04/Sec-Containers-W-Falcon-6-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/the-maturation-of-cloud-native-security-for-modern-apps-and-infrastructure/</loc>
		<lastmod>2023-11-21T19:37:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/04/Maturation-of-Cloud-native-Security-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/01/blog-CNAPP-demo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-to-harden-your-cloud-against-smtp-abuse/</loc>
		<lastmod>2023-11-21T19:38:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/04/Harden-your-Cloud-blog.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/whats-hiding-in-your-containers/</loc>
		<lastmod>2023-11-21T19:39:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/Whats-Hiding-In-Your-Containers.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/cloud-security-and-the-shared-responsibility-model-explained/</loc>
		<lastmod>2023-11-21T19:39:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/two-sides-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/cloud-security-recipe-for-success/</loc>
		<lastmod>2023-11-21T19:39:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/02/cloud-security-recipe-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/four-steps-to-ensure-a-secure-containter-deployment/</loc>
		<lastmod>2023-11-21T19:40:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/02/So-You-Think-Blog_1060x698-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-falcon-horizon-solves-the-complexity-of-azure-identity/</loc>
		<lastmod>2023-11-21T19:40:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/02/Azure-Identity_Blog_1060x698-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/02/Azure-Identity_1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/02/Azure-Identity_2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/02/Azure-Identity_3-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/five-cloud-security-must-haves/</loc>
		<lastmod>2023-11-21T19:41:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/01/Blog_1060x698-37-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/join-crowdstrike-at-aws-reinvent-2020/</loc>
		<lastmod>2023-11-21T19:41:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/12/Blog_1060x698-1-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-falcon-horizon-ensures-secure-authentication-to-cloud-environments/</loc>
		<lastmod>2023-11-21T19:41:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/12/Blog_1060x698-32-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/12/Falcon-Horizon-Image-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/beware-blind-spots-in-the-cloud/</loc>
		<lastmod>2023-11-21T19:42:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/11/Blog_1060x698-28-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/modern-infrastructure-requires-modern-cloud-security/</loc>
		<lastmod>2023-11-21T19:42:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/10/Blog_1060x698-15-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/getting-clarity-with-a-cloud-security-posture-management-solution/</loc>
		<lastmod>2023-11-21T19:42:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/10/Blog_1060x698-16-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/join-crowdstrike-at-aws-reinvent-2019/</loc>
		<lastmod>2023-11-21T19:44:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2019/12/AWS-reInvent-BlogImage-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-falcon-discover-for-aws-visibility-that-ensures-security-in-the-cloud/</loc>
		<lastmod>2023-11-21T19:45:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2018/07/FalconDiscover-AWS-blog-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-brings-ai-powered-cybersecurity-to-smbs/</loc>
		<lastmod>2023-11-27T18:50:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/11/1123_05_Ai-Powered-Protection-for-SMB_V2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/imperial-kitten-deploys-novel-malware-families/</loc>
		<lastmod>2023-11-29T14:20:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/11/23-OTH-060_adversary-1-kitten-iran.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-demonstrated-cloud-security-leadership-aws-reinvent-2023/</loc>
		<lastmod>2023-11-30T17:13:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/Blog_1060x698.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-malicious-insiders-use-known-vulnerabilities-against-organizations/</loc>
		<lastmod>2023-12-07T14:56:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/12/1123_08_Insider-Vulnerabilities.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/12/Figure1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/five-common-hybrid-it-security-challenges/</loc>
		<lastmod>2023-12-08T17:02:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/12/Blog_1060x698-3.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/01/blog-CNAPP-demo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-cloud-security-extends-to-red-hat-enterprise-linux-versions/</loc>
		<lastmod>2023-12-08T17:15:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/05/Blog_1060x698-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/cao-identity-threat-hunting/</loc>
		<lastmod>2023-12-12T19:15:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/12/0222_05_FalconFusion_Ransomware_Malware.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-leader-with-stellar-mdr-in-forrester-wave-mdr-services/</loc>
		<lastmod>2023-12-14T18:36:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/05/23-SRV-013_Forrester-Wave_MDR_2023_Blog_1060x698_V1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/12/ForresterWaveMDREU2023-badge.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/the-anatomy-of-wiper-malware-part-4/</loc>
		<lastmod>2023-12-21T23:01:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/Blog_1060x698-1.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/Picture1-15.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/Picture1-16.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/Picture1-17.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/Picture1-18.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/Picture1-19.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/Picture1-20.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/Picture1-21.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/Picture1-22.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/Picture1-23.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/Picture1-24.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/Picture1-25.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/the-anatomy-of-wiper-malware-part-2/</loc>
		<lastmod>2023-12-21T23:01:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Blog_1060x698-2.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-161.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-162.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-163.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-164.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-165.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-166.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-167.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-168.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-169.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-170.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-171.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-172.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-173.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/the-anatomy-of-wiper-malware-part-1/</loc>
		<lastmod>2023-12-21T23:02:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Blog_1060x698-1.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-105.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-106.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-107.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-108.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-109.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-110.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-111.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-112.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-113.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-114.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Picture1-115.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-crowdstrike-falcon-protects-against-wiper-malware-used-in-ukraine-attacks/</loc>
		<lastmod>2023-12-21T23:03:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/02/Blog_1060x698-10.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/02/Picture1-24.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/02/Picture2-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/considerations-when-protecting-cloud-workloads/</loc>
		<lastmod>2023-12-27T15:40:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/12/Generic_Blogs_Cloud_Security-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-participant-in-oceanlotus/</loc>
		<lastmod>2023-12-29T20:33:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/10/Blog_1060x698-7.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/12/OceanLotus-blog-Fig-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-falcon-platform-roi/</loc>
		<lastmod>2024-01-08T16:30:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/01/1060x698-IDC-option-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-named-leader-2023-gartner-magic-quadrant-for-epp/</loc>
		<lastmod>2024-01-12T18:05:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/01/23-GartnerMQ_Blog_Launch_2023.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/01/Figure1-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/three-critical-steps-for-app-security-teams-2024/</loc>
		<lastmod>2024-01-12T19:22:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/01/illustration-3.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/01/Figure1-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/01/Figure2-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/comprehensive-native-xdr-for-all/</loc>
		<lastmod>2024-01-17T16:33:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/01/2310-cmp-pc-blog-multiple-posts-1060x698-final-illustration.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/01/Figure1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/01/Figure2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/01/Figure3-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/01/Figure4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/01/Figure5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/01/Figure6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/reasons-why-nonprofits-are-targets-of-cyberattacks/</loc>
		<lastmod>2024-01-17T19:59:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/01/0123_09_SMB-Malware-Attacks_Blog_1060x698.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/four-falcon-logscale-ng-siem-updates/</loc>
		<lastmod>2024-01-18T18:18:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/11/XXXX_Falcon-LogScale-So-Fast_Blog_1060x698.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/commercial-bank-of-california-cloud-compliance-and-data-security/</loc>
		<lastmod>2024-01-25T21:58:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/01/Generic_Blogs_Cloud_Security-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/01/Figure1-5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/aembit-strengthens-security-for-workload-to-workload-access/</loc>
		<lastmod>2024-01-30T20:11:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/01/0124_02_FalconFund-Partners-with-Aembit.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/01/2024-1-Crowdstrike-Aembit-Integration.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/forrester-names-crowdstrike-a-leader-in-cloud-workload-security-q1-2024/</loc>
		<lastmod>2024-01-30T23:08:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/01/24-CLD-001_Forrester-CWS-Wave_Blog-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/01/2024Q1_Cloud-Workload-Security_180426_L.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/architecture-drift/</loc>
		<lastmod>2024-02-02T17:21:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/08/Blog_1060x698.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-defends-against-azure-cross-tenant-synchronization-attacks/</loc>
		<lastmod>2024-02-05T22:26:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/02/0124_01_Cs-Defends-Against-Azure-Attacks.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/02/Figure1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/02/Figure2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/02/Figure3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/02/Figure4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/02/Figure5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/02/Figure6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/02/Figure7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/02/Figure8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/02/Figure9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/02/Figure10.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/hijackloader-expands-techniques/</loc>
		<lastmod>2024-02-07T15:19:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/09/Blog_1060x698-4.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/02/Figure1-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/02/Figure2a.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/02/Figure3-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-to-secure-business-critical-applications/</loc>
		<lastmod>2024-02-09T21:23:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/09/Blog_1060x698-18.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/key-findings-crowdstrike-2024-state-of-application-security-report/</loc>
		<lastmod>2024-02-13T13:49:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/02/app-security-report-blog-post-art.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/tackle-chromeos-blind-spots-with-dell-and-crowdstrike/</loc>
		<lastmod>2024-02-14T18:28:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/10/Blog_1060x698.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/02/Figure1-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-sponsors-mac-admins-foundation/</loc>
		<lastmod>2024-02-15T16:50:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/02/0224_01_CS-Sponsors-MacAdmins.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/cybersecurity-consolidation-technology-integration-customer-stories/</loc>
		<lastmod>2024-02-26T18:30:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2023/11/1123_04_Protectors-Spotlight.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-and-intel-research-advance-endpoint-security/</loc>
		<lastmod>2024-02-27T21:41:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/03/Blog_1060x698-2-1-1.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/02/Intel-blog-1-diagram-draft.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/anatomy-of-alpha-spider-ransomware/</loc>
		<lastmod>2024-03-01T01:16:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/03/SPIDER-adversary-blog-main-image.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/02/Figure1-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/02/Code1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/02/Figure2-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/02/Code2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/02/Code3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/02/Code4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/02/Figure3-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/02/Figure4-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/02/Figure5-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/02/Figure6-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/02/Figure7-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/02/Code5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/02/Figure8-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/does-your-mdr-deliver-outcomes-or-homework/</loc>
		<lastmod>2024-03-05T17:04:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/08/Falcon-Complete-blog-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/latin-america-malware-update/</loc>
		<lastmod>2024-03-11T20:09:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/02/0224_02_LATAM-Malware-Update.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/02/Figure1-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/02/image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/02/Figure3-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/02/Figure4-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/02/Figure5-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/02/Figure6-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/02/Figure7-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/02/Figure8-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/02/Figure9-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/02/Figure10-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/02/Figure11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/02/Figure12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/02/Figure13.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/02/appendix.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/falcon-cloud-security-supports-gke-autopilot-to-secure-more-gcp-workloads/</loc>
		<lastmod>2024-03-11T23:56:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/03/Cloud-Blog_1060x698-1.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/03/GKE-blog-Fig-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/03/GKE-blog-Fig-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/03/GKE-blog-Fig-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-research-participant-in-two-center-for-threat-informed-defense-projects/</loc>
		<lastmod>2024-03-12T13:10:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/03/MITRE-CTID-main-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/03/MITRE-CTID-Fig-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/new-2023-sec-breach-disclosure-rules/</loc>
		<lastmod>2024-03-14T16:16:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/05/0522_11_Falcon_ID-Threat-Protection_Fed-State-Local_Blog_1060x698.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-enhances-cdr-capabilities-for-cicd-pipeline/</loc>
		<lastmod>2024-03-21T16:54:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2022/04/Blog_1060x698-37-1.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/03/Figure1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2024/03/Figure2-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/how-to-defend-employees-data-as-social-engineering-evolves/</loc>
		<lastmod>2024-03-22T14:25:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/06/Blog_0520_08-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/new-emphasis-on-an-old-problem-patch-management-and-accountability/</loc>
		<lastmod>2024-03-22T15:01:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2020/03/patch-blog-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/crowdstrike-and-ey-join-forces/</loc>
		<lastmod>2024-03-22T15:07:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/05/CS_EY_Blog_1060x698_v2-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.crowdstrike.com/blog/zero-trust-security-with-crowdstrike-and-zscaler/</loc>
		<lastmod>2024-03-22T15:15:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.crowdstrike.com/wp-content/uploads/2021/03/Go-Beyond-the-Perimeter-1.jpg</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->