<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//www.mend.io/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://www.mend.io/blog/</loc>
		<lastmod>2026-02-13T16:13:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/05/CRN_Women_Channel_1000x650-1-1024x666.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/05/CRN_Women_Channel_1000x650-1-1024x666.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/09/npm-supply-chain-attack.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/04/Blog-Cover-Linux-Kernel-LPE-1024x666.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/04/Mini_Shai-Hulud-1024x666.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/04/The_Butlerian_Jihad-1024x666.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/04/Blog-cover-Team-PCP-part-4-1-1024x666.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/04/Blog_Zero-day_Visibility_1000x650-1024x666.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/SAST-All-About-Static-Application-Security-Testing-post-1024x666.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/06/Blog-image_-SCA-tools-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/04/Blog_PROJECT_GLASSWING_1000x650-1024x666.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/04/Docker-Hardened-Images-integration-1024x666.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/04/Blog_AI_Application_Security_1000x650-1024x666.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/03/Blog-cover_Poisoned_Axios-1024x666.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/03/Blog-cover-TEAM-PCP-part-3-1024x666.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/03/Blog-cover-TEAM-PCP-attack-V2-1024x666.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/03/Blog-cover_CanisterWorm-1024x666.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/top-black-duck-alternatives/</loc>
		<lastmod>2026-05-07T13:26:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/04/image-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/11/image-31.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/04/image-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/01/veracode-ui.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/06/checkmarx-logo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/01/checkmarx-ui.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/04/image-8-e1775579366906.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/01/aikido-ui.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/04/image-11-e1775579438408.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/04/image-17.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/04/image-12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/01/soos-ui.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/04/image-9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/01/apiiro-ui.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/04/image-6-e1775569678443.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/01/snyk-ui.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/04/image-15-e1775579629916.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/04/image-18.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/04/image-14.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/04/image-16.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/stephanie-broyles-crn-2026-women-of-the-channel/</loc>
		<lastmod>2026-05-06T19:51:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/phantomraven-wave-5-new-undocumented-npm-supply-chain-campaign-targets-defi-cloud-and-ai-developers/</loc>
		<lastmod>2026-05-04T16:27:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/what-is-an-ai-bill-of-materials-ai-bom/</loc>
		<lastmod>2026-05-01T13:46:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/03/Mend-AI-Dashboard-UI-Solution-pages.svg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/linux-copy-fail-lpe-cve-2026-31431/</loc>
		<lastmod>2026-04-30T18:32:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/shai-hulud-sap-cap-supply-chain-attack-claude-code/</loc>
		<lastmod>2026-04-30T16:45:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/mend-sca-action-within-amazon-codecatalyst/</loc>
		<lastmod>2026-04-29T10:53:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2022/12/image-11-e1769436239181-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/sast-static-application-security-testing/</loc>
		<lastmod>2026-04-28T22:02:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/content-image-how-does-SAST-work.svg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/best-sast-solutions/</loc>
		<lastmod>2026-04-27T15:12:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/best-software-composition-analysis-sca-tools-top-solutions/</loc>
		<lastmod>2026-04-23T20:30:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/03/The_Complete-Guide_to_Open-Source__AI_Licensing_2026_1000x650.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/11/Mend-io-favicon-outline-200px.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/06/Sonatype_stacked_logo_full_color.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/06/checkmarx-logo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/06/BlackDuckLogo-scaled.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/06/snyk-logo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/07/Xygeni-New-Logo-Black-3-scaled.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/06/image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/compromised-bitwarden-cli-npm-worm-ai-poisoning/</loc>
		<lastmod>2026-04-23T19:53:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/the-saas-loophole-in-gpl-open-source-licenses/</loc>
		<lastmod>2026-04-22T23:17:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/03/The_Complete-Guide_to_Open-Source__AI_Licensing_2026_1000x650.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/top-9-gpl-with-the-classpath-exception-questions-answered/</loc>
		<lastmod>2026-04-22T23:15:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/03/The_Complete-Guide_to_Open-Source__AI_Licensing_2026_1000x650.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/open-source-licenses-trends-and-predictions/</loc>
		<lastmod>2026-04-22T23:13:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/03/The_Complete-Guide_to_Open-Source__AI_Licensing_2026_1000x650.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/top-10-cddl-questions-answered/</loc>
		<lastmod>2026-04-22T23:12:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/03/The_Complete-Guide_to_Open-Source__AI_Licensing_2026_1000x650.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/top-10-microsoft-public-license-ms-pl-questions-answered/</loc>
		<lastmod>2026-04-22T23:11:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/03/The_Complete-Guide_to_Open-Source__AI_Licensing_2026_1000x650.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/dual-licensing-for-open-source-components/</loc>
		<lastmod>2026-04-22T23:10:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/03/The_Complete-Guide_to_Open-Source__AI_Licensing_2026_1000x650.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/top-10-eclipse-public-license-questions-answered/</loc>
		<lastmod>2026-04-22T23:08:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/03/The_Complete-Guide_to_Open-Source__AI_Licensing_2026_1000x650.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/open-source-copyleft-licenses/</loc>
		<lastmod>2026-04-22T23:06:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/03/The_Complete-Guide_to_Open-Source__AI_Licensing_2026_1000x650.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVkYjE2NWRjMzM3MDEuanBnJnZlcnNpb249MDAwMCZzaWc9MWQ3ODE2NjY5NDVjYTZmZmQzMmM0MmEzYWU4NjI2MjA.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVkYjE2NmI1NTE4NzAuanBnJnZlcnNpb249MDAwMCZzaWc9Yjc5ZTEyNTgyMTJiYzQ2YjZiMjBkNzM4OWYwNDkzMTE.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/top-10-gpl-license-questions-answered/</loc>
		<lastmod>2026-04-22T23:04:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/03/The_Complete-Guide_to_Open-Source__AI_Licensing_2026_1000x650.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/top-10-apache-license-questions-answered/</loc>
		<lastmod>2026-04-22T23:02:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/03/The_Complete-Guide_to_Open-Source__AI_Licensing_2026_1000x650.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/top-open-source-licenses-explained/</loc>
		<lastmod>2026-04-22T23:01:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/10/open-source-license-types-graphic.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/03/The_Complete-Guide_to_Open-Source__AI_Licensing_2026_1000x650.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/license-compatibility/</loc>
		<lastmod>2026-04-22T22:59:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/03/The_Complete-Guide_to_Open-Source__AI_Licensing_2026_1000x650.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/51HDQMM2FByHU7cGdU-NWqJSImukXFcgTWc7CAa3NXNC7wzBpiaEvajXY2v-ROK78dC97VynSb5Nve5fvLSMaRiQH21gavjZeJM1S1NAGHI-G83ahZqHhO4cT1_VsWp4uFIt1eL1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/open-source-due-diligence/</loc>
		<lastmod>2026-04-22T22:58:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/03/The_Complete-Guide_to_Open-Source__AI_Licensing_2026_1000x650.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Graph3.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Graph4.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/the-right-time-for-an-open-source-audit/</loc>
		<lastmod>2026-04-22T22:54:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/03/The_Complete-Guide_to_Open-Source__AI_Licensing_2026_1000x650.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/open-source-license-management-tools-features-and-best-practices/</loc>
		<lastmod>2026-04-22T22:52:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/03/The_Complete-Guide_to_Open-Source__AI_Licensing_2026_1000x650.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/best-practices-for-open-source-governance/</loc>
		<lastmod>2026-04-22T22:50:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/03/The_Complete-Guide_to_Open-Source__AI_Licensing_2026_1000x650.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/open-source-licenses-comparison-guide/</loc>
		<lastmod>2026-04-22T22:48:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/03/The_Complete-Guide_to_Open-Source__AI_Licensing_2026_1000x650.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVkNWU0YTg2OTQxZWMucG5nJnZlcnNpb249MDAwMCZzaWc9YzM1ZTM3ZmUwZmQ4ZWI4YzFmNjczODhmZDY2MjA1MzA.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVkNWU0YWE2MWFiNjUucG5nJnZlcnNpb249MDAwMCZzaWc9MDk2ZGRlNjUxOGQwNDJkNDY4MmM5MjVjMjIxOWU1NjY.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/what-you-should-know-about-open-source-license-compliance-for-ma-activity/</loc>
		<lastmod>2026-04-22T22:47:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/03/The_Complete-Guide_to_Open-Source__AI_Licensing_2026_1000x650.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/top-security-open-source-vulnerabilities/</loc>
		<lastmod>2026-04-22T22:46:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/03/The_Complete-Guide_to_Open-Source__AI_Licensing_2026_1000x650.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/ultimate-guide-to-open-source-security/</loc>
		<lastmod>2026-04-22T22:44:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/03/The_Complete-Guide_to_Open-Source__AI_Licensing_2026_1000x650.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/generate-and-audit-sbom/</loc>
		<lastmod>2026-04-22T22:43:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/03/The_Complete-Guide_to_Open-Source__AI_Licensing_2026_1000x650.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/communicating-the-value-of-your-company-with-sboms/</loc>
		<lastmod>2026-04-22T22:40:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/03/The_Complete-Guide_to_Open-Source__AI_Licensing_2026_1000x650.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/sbom-security-6-key-components-and-top-3-use-cases/</loc>
		<lastmod>2026-04-22T22:38:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/03/The_Complete-Guide_to_Open-Source__AI_Licensing_2026_1000x650.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/what-is-a-software-bill-of-materials-sbom-4-critical-benefits/</loc>
		<lastmod>2026-04-22T22:35:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/03/The_Complete-Guide_to_Open-Source__AI_Licensing_2026_1000x650.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/best-software-composition-analysis-providers/</loc>
		<lastmod>2026-04-22T22:34:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/03/The_Complete-Guide_to_Open-Source__AI_Licensing_2026_1000x650.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/06/BlackDuckLogo-scaled.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/03/image-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/10/veracode-logo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/03/image-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/06/checkmarx-logo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/03/image-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/06/Sonatype_stacked_logo_full_color.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/03/image-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Mend-io-logo-color-32px-2.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/02/sca-findings.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/best-software-composition-analysis-for-enterprise/</loc>
		<lastmod>2026-04-22T22:32:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/03/The_Complete-Guide_to_Open-Source__AI_Licensing_2026_1000x650.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Mend-io-logo-color-32px-2.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/02/sca-findings.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/06/snyk-logo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/06/BlackDuckLogo-scaled.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/03/image-15.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/06/checkmarx-logo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/03/image-17.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/10/veracode-logo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/03/image-22.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/03/image-13.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/03/image-21.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/03/image-20-e1773183912592.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/03/image-19.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/03/image-16.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/03/image-18.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/getting-started-with-software-composition-analysis-solution/</loc>
		<lastmod>2026-04-22T22:30:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/03/The_Complete-Guide_to_Open-Source__AI_Licensing_2026_1000x650.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/how-to-make-a-case-for-buying-sca/</loc>
		<lastmod>2026-04-22T22:21:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/03/The_Complete-Guide_to_Open-Source__AI_Licensing_2026_1000x650.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/software-composition-analysis/</loc>
		<lastmod>2026-04-22T22:19:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/03/The_Complete-Guide_to_Open-Source__AI_Licensing_2026_1000x650.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/malicious-xinference-pypi-teampcp-part-4/</loc>
		<lastmod>2026-04-22T17:15:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/04/image-36.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/zero-day-vulnerability-response-workflow/</loc>
		<lastmod>2026-04-21T19:01:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/04/image-zero-day.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/best-application-security-testing-solutions/</loc>
		<lastmod>2026-04-16T21:51:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/04/image-21.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/10/sast-ui.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/04/image-14.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/04/image-31.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/04/image-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/04/image-32.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/04/image-26-e1776292655167.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/04/image-28.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/04/image-30.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/04/image-23-e1776293079724.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/03/acunetix-ui.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/04/image-22-e1776293247577.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/04/image-35.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/04/image-29.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/04/image-8-e1775579366906.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/04/image-33.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/04/image-25.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/02/sca-findings.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/04/image-5-e1776293410263.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/04/image-34.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/04/image-13-e1776293476319.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/ai-application-security/</loc>
		<lastmod>2026-04-16T21:47:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/ai-red-teaming-solutions/</loc>
		<lastmod>2026-04-16T20:28:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/11/Mend-io-favicon-outline-200px.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/04/lakera-logo-black.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/04/cyber-nx-logo-300x62-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/04/pyrit-logo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/04/DeepTeam-logo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/04/CrowdStrike_logo.svg.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/04/shaip-logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/top-veracode-alternatives/</loc>
		<lastmod>2026-04-13T19:42:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/04/image-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/11/image-31.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/04/image-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/02/checkmarx-ui.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/06/BlackDuckLogo-scaled.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/12/screenshot-5-12-2025.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/04/image-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/02/sonarqube-ui.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/04/image-2-e1775569597328.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/02/contrast-security-ui.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/04/image-6-e1775569678443.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/02/snyk-ui.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/04/image-7-e1775569757161.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/02/deepsource-ui.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/anthropic-project-glasswing-appsec/</loc>
		<lastmod>2026-04-13T16:39:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/docker-hardened-images-container-security/</loc>
		<lastmod>2026-04-08T20:33:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/04/image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/building-strong-container-security/</loc>
		<lastmod>2026-04-06T16:13:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/responsible-ai-licenses-rail-heres-what-you-need-to-know/</loc>
		<lastmod>2026-03-31T15:32:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/poisoned-axios-npm-account-takeover-50-million-downloads-and-a-rat-that-vanishes-after-install/</loc>
		<lastmod>2026-03-31T13:47:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/famous-telnyx-pypi-package-compromised-by-teampcp/</loc>
		<lastmod>2026-03-27T13:32:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/teampcp-supply-chain-series-part-2/</loc>
		<lastmod>2026-03-24T18:28:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/canisterworm-the-self-spreading-npm-attack-that-uses-a-decentralized-server-to-stay-alive/</loc>
		<lastmod>2026-03-24T15:57:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/cursor-moonshot-kimi-ai-governance-lessons/</loc>
		<lastmod>2026-03-20T22:00:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/global-infrastructure-expansion-india/</loc>
		<lastmod>2026-03-19T17:45:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/introducing-contextual-project-classification/</loc>
		<lastmod>2026-03-17T13:31:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/what-is-ai-compliance/</loc>
		<lastmod>2026-03-16T21:24:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/ai-security-testing-guide/</loc>
		<lastmod>2026-03-16T21:17:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/model-context-protocol-security-explained/</loc>
		<lastmod>2026-03-16T20:58:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/ai-security-guide-protecting-models-data-and-systems-from-emerging-threats/</loc>
		<lastmod>2026-03-16T20:35:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/ai-risk-management/</loc>
		<lastmod>2026-03-16T20:20:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/veracode-sca-solution-overview/</loc>
		<lastmod>2026-03-13T21:08:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/understanding-veracode-sast/</loc>
		<lastmod>2026-03-13T21:07:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/black-duck-sca-solution-overview/</loc>
		<lastmod>2026-03-13T21:07:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/understanding-black-duck-sast/</loc>
		<lastmod>2026-03-13T21:06:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/introducing-system-prompt-hardening/</loc>
		<lastmod>2026-03-13T21:00:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/02/System_Prompt_v4-1.svg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/claude-code-security-vs-enterprise-appsec/</loc>
		<lastmod>2026-03-13T20:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/ai-agent-configuration-scanning/</loc>
		<lastmod>2026-03-13T20:57:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/you-cant-rely-on-open-source-for-security/</loc>
		<lastmod>2026-03-13T20:56:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/why-ai-security-tools-are-different-and-9-tools/</loc>
		<lastmod>2026-03-09T22:40:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Mend-io-logo-color-newsroom.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/03/Mend-AI-Dashboard-UI-Solution-pages.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/09/robust-intelligence-logo-e1757369782384.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/09/robust-intelligence-ui.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/05/HiddenLayer-Logo.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/09/hidden-layer-ui-e1769435821955.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/09/prompt-security-logo-e1757369766272.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/09/prompt-security-ui.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/05/HiddenLayer-Logo.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/09/hidden-layer-ui2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/09/aim-security-logo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/09/aim-security-ui.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/05/Protect-AI-logo.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/09/protect-ai-ui.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/09/arthur-ai-logo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/09/arthur-ai-ui.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/09/relyance-ai-logo.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/09/relyance-ai-ui.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/the-hidden-stories-behind-the-open-source-logos-we-all-love/</loc>
		<lastmod>2026-03-03T15:46:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Logo_Android-e1456816899521-150x150.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/android.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/linux.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/github-150x150.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/firefox-150x150.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/bower_build-tool-150x150.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/a-bowerbird-in-action.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/gradel_build-tool.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Gradlephant-just-needs-a-moment.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/gimp-gnu.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/a-corrbrantula.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Kangarooster.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Apache-Hadoop-150x150.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/docker_repository-150x150.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/gnu-150x150.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/generative-ai-statistics-to-know-in-2025/</loc>
		<lastmod>2026-02-17T22:39:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/a-brief-guide-to-cloud-native-applications-technology-and-security/</loc>
		<lastmod>2026-02-17T17:02:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/infrastructure-as-code-iac/</loc>
		<lastmod>2026-02-17T17:00:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/10/iac-inner-graphic.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/10/terraform-logo.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/10/hashicorp-terraform-ui.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/10/ansible-logo.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/10/ansible-ui.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/10/chef-logo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/10/chef-ui.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/10/aws-cloudformation-logo.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/10/aws-ui.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/mend-io-is-a-strong-performer-in-the-forrester-wave-software-composition-analysis-q4-2024/</loc>
		<lastmod>2026-02-17T16:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/cloud-security-architecture-a-practical-guide/</loc>
		<lastmod>2026-02-17T16:56:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/introducing-the-mend-risk-reduction-dashboard/</loc>
		<lastmod>2026-02-13T15:14:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/introducing-mend-io-ai-security-maturity-survey/</loc>
		<lastmod>2026-02-06T20:08:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/01/Inner-Blog-AI-security-survey.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/llm-red-teaming-threats-testing-best-practices/</loc>
		<lastmod>2026-02-06T20:08:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/automated-red-teaming-capabilities-pros-cons-and-latest-trends/</loc>
		<lastmod>2026-02-06T20:06:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/mend-leadership-update-the-next-phase-of-growth/</loc>
		<lastmod>2026-02-06T20:05:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/top-7-sast-tools-for-devsecops-teams/</loc>
		<lastmod>2026-02-06T20:03:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Mend-io-logo-color-newsroom.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/10/sast-ui.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/06/checkmarx-logo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/10/checkmarx-ui.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/06/snyk-logo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/10/snyk-ui.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/10/veracode-logo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/10/veracode-ui.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/06/BlackDuckLogo-scaled.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/10/blackduck-ui.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/10/image-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/10/image-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/10/image-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/10/image-6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/best-application-security-testing-services-to-know/</loc>
		<lastmod>2026-02-06T20:01:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Mend-io-logo-color-newsroom.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/10/veracode-logo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/11/image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/06/checkmarx-logo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/11/image-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/11/image-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/11/image-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/06/snyk-logo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/11/image-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/why-ai-red-teaming-is-different-from-traditional-security/</loc>
		<lastmod>2026-02-06T20:00:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/best-sast-tools-top-10-solutions/</loc>
		<lastmod>2026-02-06T20:00:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Mend-io-logo-color-newsroom.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/11/image-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/11/image-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/11/image-19.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/11/image-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/11/image-16.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/06/checkmarx-logo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/11/image-22.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/11/image-15.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/11/image-18.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/11/image-9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/11/image-11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/06/snyk-logo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/11/image-21.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/11/image-13.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/11/image-20.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/11/image-12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/11/image-17.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/11/image-14.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/11/image-23.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/best-application-security-testing-providers/</loc>
		<lastmod>2026-02-06T19:58:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/11/image-25.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/11/image-31.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/11/image-26.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/11/image-32.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/11/image-29.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/12/screenshot-5-12-2025.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/11/image-28.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/11/image-34.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/06/checkmarx-logo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/11/image-30.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/06/snyk-logo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/11/image-37.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/12/open-text-logo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/11/image-36.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/best-sast-tools/</loc>
		<lastmod>2026-02-03T14:51:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2022/03/Mend-SAST-graphic.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2022/03/SonarQube-SAST.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2022/03/Veracode-SAST.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2022/03/Codacy-SAST.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2022/03/checkmarx-ui.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2022/03/Snyk-SAST.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2022/03/spectral-sast-graphic.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2022/03/AppScan-SAST.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2022/03/OpenText-SAST.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/llm-security-risks-mitigations-whats-next/</loc>
		<lastmod>2026-02-02T16:26:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/shining-a-light-on-shadow-ai-what-it-is-and-how-to-find-it/</loc>
		<lastmod>2026-02-02T16:24:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/vulnerability-assessment/</loc>
		<lastmod>2026-01-21T15:07:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/the-five-key-principles-of-modern-application-security/</loc>
		<lastmod>2026-01-21T15:05:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/six-more-top-tips-for-holistic-appsec-and-software-supply-chain-security/</loc>
		<lastmod>2026-01-21T15:04:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/risks-faced-by-cloud-native-apps-and-how-to-assess-them/</loc>
		<lastmod>2026-01-21T15:03:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/just-who-exactly-should-take-responsibility-for-application-security/</loc>
		<lastmod>2026-01-21T15:03:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/how-to-manage-risk-effectively-in-cloud-native-environments/</loc>
		<lastmod>2026-01-21T15:02:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/docker-vs-kubernetes/</loc>
		<lastmod>2026-01-21T15:01:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/docker-dependencies/</loc>
		<lastmod>2026-01-21T15:00:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/media/2021/06/Docker_Image_Alpine_Vs_Normal_Size-1024x426-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/docker-containers/</loc>
		<lastmod>2026-01-21T14:58:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/cvss4-0-whats-new/</loc>
		<lastmod>2026-01-21T14:57:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/cvss-v3-creates-new-challenges-for-developers/</loc>
		<lastmod>2026-01-21T14:56:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzViMThlOTc0YjE5ZWMucG5nJnZlcnNpb249MDAwMCZzaWc9NGI1YzllZTY1YmVjZTk4ZGEyNzhmZjY2YzQ3MTljMWI.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/container-security-scanning/</loc>
		<lastmod>2026-01-21T14:54:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/why-appsec-and-network-risk-management-must-be-unified-in-the-modern-enterprise/</loc>
		<lastmod>2026-01-13T17:08:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/mend-io-launches-mend-container/</loc>
		<lastmod>2026-01-09T15:06:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/what-is-the-difference-between-an-sca-scan-and-a-container-scan/</loc>
		<lastmod>2026-01-09T15:01:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/what-makes-containers-vulnerable/</loc>
		<lastmod>2026-01-09T14:50:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/mend-io-and-sysdig-launch-joint-solution-for-container-security/</loc>
		<lastmod>2026-01-09T14:48:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/sysdig1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/sysdig2-1024x586.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/kubernetes-security/</loc>
		<lastmod>2026-01-09T14:47:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/06/Content-image-Kubernetes-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/06/Content-image-Kubernetes-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/top-container-security-tools/</loc>
		<lastmod>2026-01-09T14:46:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/open-source-vulnerability-scanning/</loc>
		<lastmod>2026-01-07T14:48:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/npm-how-to-install-a-specific-version-of-node-js-package/</loc>
		<lastmod>2026-01-06T17:03:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2021/02/npm-install-command.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2021/02/install-Renovate.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2021/02/check-Renovate-version.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2021/02/tree-structured-list-of-installed-packages.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2021/02/installed-top-level-packages-without-dependencies.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2021/02/latest-version-of-installed-package.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2021/02/semantic-versioning-to-specify-install-versions.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2021/02/semantic-versioning-to-specify-install-versions2.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/shadow-mcp-unauthorized-ai-connectivity-in-your-codebase/</loc>
		<lastmod>2026-01-06T16:46:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/06/Screenshot-2025-06-11-at-9.16.03-scaled.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/06/Screenshot-2025-06-11-at-9.03.40.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/best-ai-red-teaming-companies/</loc>
		<lastmod>2026-01-06T16:43:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/11/Mend-io-favicon-outline-200px.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/05/mindguard-logo-scaled.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/05/adversa-ai-logo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/05/HiddenLayer-Logo.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/04/CrowdStrike_logo.svg.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/04/shaip-logo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/05/Schellman-Logo.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/05/hackerone-logo.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/05/labelbox-logo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/05/Nexigen-logo.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/best-ai-red-teaming-providers-top-5-vendors/</loc>
		<lastmod>2026-01-06T16:42:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/11/Mend-io-favicon-outline-200px.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/05/HiddenLayer-Logo.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/05/Protect-AI-logo.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/05/mindguard-logo-scaled.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/05/adversa-ai-logo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/04/CrowdStrike_logo.svg.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/05/nri-secure-logo-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/05/Reply_logo-e1753734113578.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/05/Synack-Logo-e1753734166788.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/what-is-ai-red-teaming/</loc>
		<lastmod>2026-01-06T16:42:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/best-ai-red-teaming-services-top-6-services/</loc>
		<lastmod>2026-01-06T16:41:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/11/Mend-io-favicon-outline-200px.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/05/mindguard-logo-scaled.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/05/hackerone-logo.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/07/Redbot-Security-Logo.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/04/CrowdStrike_logo.svg.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/05/Schellman-Logo.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/04/shaip-logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/what-is-ai-penetration-testing-and-5-techniques/</loc>
		<lastmod>2026-01-06T16:40:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/best-ai-red-teaming-tools-top-7-solutions-in-2025/</loc>
		<lastmod>2026-01-06T16:39:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/11/Mend-io-favicon-outline-200px.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/05/HiddenLayer-Logo.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/05/mindguard-logo-scaled.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/05/Protect-AI-logo.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/04/pyrit-logo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/07/Woodpecker-Logo-scaled.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/04/DeepTeam-logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/owasp-dependency-check/</loc>
		<lastmod>2026-01-06T16:27:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/7-questions-to-evaluate-software-composition-analysis-solution/</loc>
		<lastmod>2026-01-06T16:21:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/top-three-user-priorities-for-software-composition-analysis/</loc>
		<lastmod>2026-01-06T16:11:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/rasp-runtime-application-self-protection/</loc>
		<lastmod>2026-01-06T14:34:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/gray-box-testing/</loc>
		<lastmod>2026-01-06T14:33:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzYwMWJkM2Q2MzgyYTEucG5nJnZlcnNpb249MDAwMCZzaWc9Yjc5OWM2MDQwOGVmMzJmNmJhN2MxMjE2MGVlODU1YTQ.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/black-box-testing/</loc>
		<lastmod>2026-01-06T14:29:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVmYTI5ZTdkODQzOGEuanBnJnZlcnNpb249MDAwMCZzaWc9OWU2NmQwMTkxYmQyMmQxODQzZWZkMjEyOTA0MzBkZTA.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVmYTI5ZWE1MzUyMmYuanBnJnZlcnNpb249MDAwMCZzaWc9ZmIxN2FiNDg0NzI3OTg2NWEzNzYyYzZiNTQ0YTBhNzI.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVmYTI5ZWQxMTZlMzQuanBnJnZlcnNpb249MDAwMCZzaWc9YjYwNjcwOTYwYjQ4ZjE5ODY4NWZmOTYyMDI0MDNjZTU.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVmYTJhNTgzNGIyNWEucG5nJnZlcnNpb249MDAwMCZzaWc9YTQ2MjY2MTFkMWQ2ZDM3MGIxN2UyN2FhNTU1YjRlOTE.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/white-box-testing/</loc>
		<lastmod>2026-01-06T14:29:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/6WFi3qhccJe655Ij8T-OYgRRjYjL7Bw9b7PQK6r5NQUlnMO8tsHrhRXPIvTTz_Zo591x0xfI_-bYmx2vZGhBs54dsEi1E83YunyIyPvOJH93qmjpYJZdc1FKBWTEbF38GKkHJQHwWQK7X2yz7g.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/a3tgVqLr93ybHcvcUoEHDh9pfsxYUfEa8Mkc3ub_Ms3EHf6heq88TOja_Y7gq5EV4mektH_X57gSz-33Z1iLZzenjpdCoJs-igJc9GvjouxueUHXioRHd5FSayt8Y2bN8E32mQT8.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/dast-dynamic-application-security-testing/</loc>
		<lastmod>2026-01-06T14:29:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/05/SAST-DAST-and-IAST-Value-Trade-Off.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/05/DAST-Pros-and-Cons.svg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/iast-interactive-application-security-testing/</loc>
		<lastmod>2026-01-06T14:28:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVmMGZmY2EwNWRjMWQucG5nJnZlcnNpb249MDAwMCZzaWc9M2U3ODc3ZWI5YzQ3ZjBhMmNmMDI1MTIxOGEzMDUwY2E.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVmMGZmYzQ0N2Q2N2UucG5nJnZlcnNpb249MDAwMCZzaWc9Yjk0N2U2Y2E4MWNjZGJjMGQ4YWVlOGRhY2M2ZGM3MGM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/asto-application-security-testing-orchestration/</loc>
		<lastmod>2026-01-06T14:26:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVmZDIwOWQwMDcyNTkucG5nJnZlcnNpb249MDAwMCZzaWc9NGQyZTI5OWRkMzc0ZWVjM2IwNGY1NDkxYjA4ZWZmNWM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/SnYwrZ2L8SwcomXyPh-FE1HmtPHxLOqxU4sKBUehLMS1RJOrZSjC28z2tLtAETpJTfDA1RgXP_H94AI79M3hiJTZA9wTR6NABQLOfFThr9Nw3n1lgHTyLgVBI-AcMvAUil8Pa-Cn.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/ast-application-security-testing/</loc>
		<lastmod>2026-01-06T14:26:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2020/08/AST-2.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2020/08/AST-1.svg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/best-application-security-testing-tools-top-10-tools-in-2025/</loc>
		<lastmod>2026-01-06T14:26:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/11/Mend-io-favicon-outline-200px.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/07/Xygeni-New-Logo-Black-3-scaled.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/06/Xygeni-Sast.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/dependency-management-protecting-your-code/</loc>
		<lastmod>2025-12-30T21:37:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/patch-management/</loc>
		<lastmod>2025-12-30T20:59:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/npm-user-flooding-registry-with-fake-font-packages/</loc>
		<lastmod>2025-12-16T18:32:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/aspm-and-modern-application-security/</loc>
		<lastmod>2025-12-16T17:23:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/all-about-rag-what-it-is-and-how-to-keep-it-secure/</loc>
		<lastmod>2025-12-16T17:19:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/vital-signs-of-software-dependencies-understanding-package-health/</loc>
		<lastmod>2025-12-16T17:19:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/its-cybersecurity-awareness-month-lets-talk-appsec/</loc>
		<lastmod>2025-12-16T17:11:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/why-and-how-you-should-automate-dependency-updates/</loc>
		<lastmod>2025-12-16T17:08:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/introducing-the-mend-appsec-platform/</loc>
		<lastmod>2025-12-16T17:06:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/01/Mend-AppSec-Platform-graphic-update.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/application-security/</loc>
		<lastmod>2025-12-16T17:05:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Open-Source-Security-HP-Solution-display-253x160-1.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/01/Mend-AppSec-Platform-graphic-update.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/09/application-security-tools.svg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/the-power-of-platform-native-consolidation-in-application-security/</loc>
		<lastmod>2025-12-16T17:05:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/09/Mend-all-in-one-platform.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/01/Mend-AppSec-Platform-graphic-update.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/09/cohesive-appsec-risk-management.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/dont-treat-dast-like-dessert/</loc>
		<lastmod>2025-12-16T17:02:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/10/Partnership-resource-center-graphic.svg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/cybersecurity-awareness-month-ai-safety-for-friends-and-family/</loc>
		<lastmod>2025-12-16T17:01:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/introducing-the-mend-io-value-dashboard/</loc>
		<lastmod>2025-12-16T16:48:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/introducing-mend-forge/</loc>
		<lastmod>2025-12-16T16:46:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/introducing-the-mend-io-ai-security-dashboard/</loc>
		<lastmod>2025-12-16T16:44:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/09/ai-security-dash.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/mend-and-wiz-a-new-code-to-cloud-integration/</loc>
		<lastmod>2025-12-16T16:43:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/all-about-ci-cd/</loc>
		<lastmod>2025-12-11T15:24:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/application-security-best-practices/</loc>
		<lastmod>2025-12-11T15:22:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/large-blog-graphic-06.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/large-blog-graphic-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/large-blog-graphic-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/large-blog-graphic-03.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/learning-from-history-ai-gender-bias/</loc>
		<lastmod>2025-12-10T15:37:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/software-supply-chain-compliance-ensuring-security-and-trust-in-your-software-and-applications/</loc>
		<lastmod>2025-12-09T13:11:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/from-zero-to-rce-how-a-single-http-request-compromises-react-and-next-js-applications/</loc>
		<lastmod>2025-12-04T14:09:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/mend-io-backstage-integration-bringing-security-insights-where-you-need-them/</loc>
		<lastmod>2025-12-03T09:03:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/introducing-mends-integration-with-microsoft-defender-for-cloud/</loc>
		<lastmod>2025-12-02T16:23:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/shai-hulud-the-second-coming/</loc>
		<lastmod>2025-12-01T14:59:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/11/image-24.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/secure-npm-ecosystem-with-mend-renovate/</loc>
		<lastmod>2025-11-17T20:41:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/top-tools-for-automating-sboms/</loc>
		<lastmod>2025-11-07T22:02:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/container-registry-scanning/</loc>
		<lastmod>2025-11-07T22:01:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/devsecops/</loc>
		<lastmod>2025-11-06T11:52:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Vulnerability-Scanning_2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Runtime-protection_2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Cloud-Service-Provider_2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Standards-and-Policies_2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Container_2-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/single-author-uploaded-168-packages-to-npm-as-part-of-a-massive-dependency-confusion-attack/</loc>
		<lastmod>2025-11-05T18:21:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/malicious-package-npm/</loc>
		<lastmod>2025-11-03T20:03:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/tips-and-tools-for-open-source-compliance/</loc>
		<lastmod>2025-11-03T20:00:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/over-100-malicious-packages-target-popular-ml-pypi-libraries/</loc>
		<lastmod>2025-11-03T19:55:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/blog1-5-1024x550.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/blog2-3-1024x289.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/blog3-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/what-are-malicious-packages-how-do-they-work/</loc>
		<lastmod>2025-11-03T19:36:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/open-source-risk-management-in-financial-sector/</loc>
		<lastmod>2025-11-03T19:29:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/introducing-the-mend-open-source-risk-report/</loc>
		<lastmod>2025-11-03T19:21:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/mend-io-now-integrates-with-cursor-ai-code-editor/</loc>
		<lastmod>2025-10-31T19:38:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/code-scanning-guide/</loc>
		<lastmod>2025-10-31T19:26:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/ai-code-review-technologies-challenges-best-practices/</loc>
		<lastmod>2025-10-31T19:25:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/from-whitesource-to-mend-a-rebrand-journey/</loc>
		<lastmod>2025-10-31T10:00:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/mend-renovate-enterprise-cloud-dependency-updates-at-scale/</loc>
		<lastmod>2025-10-31T09:58:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/mend-io-and-jetbrains-partner-to-bring-enhanced-code-security-to-developers/</loc>
		<lastmod>2025-10-31T09:57:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/introducing-mend-ai-premium/</loc>
		<lastmod>2025-10-31T09:56:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/mitre-cve-program-uncertainty/</loc>
		<lastmod>2025-10-31T09:56:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/mend-io-herodevs-partnership-eliminate-risks-in-deprecated-package/</loc>
		<lastmod>2025-10-31T09:55:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/owasp-top-10-vulnerabilities/</loc>
		<lastmod>2025-10-31T09:49:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/05/OWASP-Top-13.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/security-testing-in-2025-testing-apps-ai-cloud-native-and-more/</loc>
		<lastmod>2025-10-31T09:49:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/shadow-ai-examples-risks-and-8-ways-to-mitigate-them/</loc>
		<lastmod>2025-10-31T09:48:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/what-is-a-prompt-injection-attack-types-examples-defenses/</loc>
		<lastmod>2025-10-31T09:46:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/what-is-application-security-posture-management-aspm/</loc>
		<lastmod>2025-10-31T09:43:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/deploying-gen-ai-guardrails-for-compliance-security-and-trust/</loc>
		<lastmod>2025-10-31T09:43:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/what-is-ai-system-prompt-hardening/</loc>
		<lastmod>2025-10-31T09:43:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/what-is-generative-ai-security/</loc>
		<lastmod>2025-10-31T09:41:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/devops-statistics-to-know/</loc>
		<lastmod>2025-10-31T09:33:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/understanding-bias-in-generative-ai/</loc>
		<lastmod>2025-10-31T09:32:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/the-vision-behind-mends-recognition/</loc>
		<lastmod>2025-10-31T09:31:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/observability/</loc>
		<lastmod>2025-10-29T15:22:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/software-supply-chain-security-the-basics-and-four-critical-best-practices/</loc>
		<lastmod>2025-10-24T01:16:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/secure-coding/</loc>
		<lastmod>2025-10-24T01:01:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/vulnerability-management/</loc>
		<lastmod>2025-10-22T21:55:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Asset-1-1-1-1024x453.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/modern-appsec-moves-beyond-shift-left-to-shift-smart/</loc>
		<lastmod>2025-10-22T21:53:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/mend-io-expands-ai-native-appsec-to-ai-coding-tools/</loc>
		<lastmod>2025-10-21T14:52:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/2025-owasp-top-10-for-llm-applications-a-quick-guide/</loc>
		<lastmod>2025-10-20T22:27:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/how-is-a-container-scan-done/</loc>
		<lastmod>2025-10-20T22:03:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/top-5-docker-vulnerabilities/</loc>
		<lastmod>2025-10-20T21:54:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/secure-docker-with-containerd/</loc>
		<lastmod>2025-10-20T21:42:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/docker-image-security-scanning/</loc>
		<lastmod>2025-10-20T21:33:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/container-security-creating-an-effective-security-program-with-reachability-analysis/</loc>
		<lastmod>2025-10-20T21:23:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/kubernetes-pod-security-policy/</loc>
		<lastmod>2025-10-17T17:18:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/docker-container-security/</loc>
		<lastmod>2025-10-17T17:08:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Picture1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVkNmNmOTUxNzlkNGMucG5nJnZlcnNpb249MDAwMCZzaWc9YjMzYmFmMzIwM2I3YTVlYzg1OWMwMjI4OWE0ZDllMTk.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/microservices-architecture/</loc>
		<lastmod>2025-10-17T17:05:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/oQg78tlfI3PxSxjz_REn76BOhB1uup3g7xmdpiQDrDIjKiKbwl65D8FU2y1H4t4BIJgV51JQh0QxfovTP4jQLPYZzOpIrJHqlveB7uQbajVQpCylWK2yeC0QBFs1Jb1heV5U20y9.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/using-components-with-known-vulnerabilities/</loc>
		<lastmod>2025-10-16T21:04:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/api-security/</loc>
		<lastmod>2025-10-16T20:49:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzYwMDk0ZDgzY2I4ZTMucG5nJnZlcnNpb249MDAwMCZzaWc9MWViNTEyZmU2ZTVjZGJmOTZlMzhjNjMwNjJmY2U1YTU.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/3-devops-security-challenges-how-to-overcome-them/</loc>
		<lastmod>2025-10-14T23:07:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/gitops/</loc>
		<lastmod>2025-10-14T23:07:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/C6ShdPPeh-xVuw79n2XkxOnv4bOt8lDDdge9lFP_JiEOfWftf_yJ09FJ9IKTVGsBvGkX6Jd4YAl1i_GzM6f0e4d-_3eqsvJLo7PIf9AJbeUUP8zuSvQ4Lxndbi3ZPbR8P_z13sFx.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVlM2MwMWNhMjhhNGMuUE5HJnZlcnNpb249MDAwMCZzaWc9N2NhMjFhYWVlOTNhNTRhNGU3OWRhZDAyZDcxNjM5OGI.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/devops-to-devsecops-team-transition/</loc>
		<lastmod>2025-10-14T23:07:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/continuous-testing/</loc>
		<lastmod>2025-10-14T23:05:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/devops-pipeline-tools/</loc>
		<lastmod>2025-10-14T23:05:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/O69rBMbAQusn2GVHTy9FqtBzqNPs5Uf1z9gOoi2qWEkiZ8R3skf3JtEoz5nWlzDKaeobx6XnWogV4QCVX7-4F1Z9jogOQD205r88QgALIaIGj8E9cYcIHGxfBfP_7wuw3dYFJibR.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/v0AvkTYAV9GVJuCPV-64BYiWYwWsoPMpp751__s1Lg-ckGv8-dfOv1M6c5usSm7RMK4XRcwIZtZGZ3Z86s03q6Gv3fg_3n13cJ9XxifFqxHm_wWoBL7dAEjnVKviSM7HgNtPYe8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/ungPLVFGJIFgAaeQkOkHdjARTceiTe4bUfZcN31u8nj0h8BkwQ64jFFEVuDehb7v7-APJ6OlVjdsXtzF2aNptIHdziUuZMRvh06INFccMrjfnxnyoxVXPJGiD59UvKx6138xgqt8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/7liv1PySDLixG1MliK4qps8aefmtgkh8P5wWVu_w-Ha1t_2aNvwP3PixSCW0rjcmohmkHEoNGImYx2np62RkjBh4AjZN8Hi4iAy9SMG5_snQcXJcSty5jSKgo521fV74Ycn0Hn7I.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/GLEmweDRc9bG-Jvq0GAuDElUJCTjdw-bFfbDfje274HOalJjdlNUeNqWx00RyJFRXNOv79sh24aZpnYkapaG1SGal4XGflT9bGI-1n22EXK_lapBRaqRmodohEPY7ufPycvUMUut.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Pugb_oW3HjFftbdRky0yhh2lyS8GjWFw-83qdIrggl4rB2t6a3fMp1Y-V0WASA6Cm9xucG_E3hfZlXZ2EkcCWEOR3rz9_t_KabpgJQYkP-DDuhTNAcaq3Di4BeNl_ftRfK3MpOSf.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Fmx3pfa1aciHtJy2bFVM8iXhOkCc-Mtits5LTGXEu_pmMrGfFN0-BjMSCsPDNKBKSSFgxx4JelBLRVBMZ8cpy28Ew8Vj61xoxoOPBBPQl1iZCrvS3aqXGlWh_ax493bog9tWv6rW.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/devops-automation/</loc>
		<lastmod>2025-10-14T23:03:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/devops-vs-agile/</loc>
		<lastmod>2025-10-14T23:02:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/quality-quantity-how-to-get-the-most-out-of-sast/</loc>
		<lastmod>2025-10-07T13:15:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/ai-governance-in-appsec-the-more-things-change-the-more-they-stay-the-same/</loc>
		<lastmod>2025-10-06T23:51:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/how-do-i-protect-my-ai-model/</loc>
		<lastmod>2025-10-03T23:24:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/securing-ai-vs-ai-security-what-are-we-talking-about/</loc>
		<lastmod>2025-10-03T23:11:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/sast-false-positives/</loc>
		<lastmod>2025-10-03T22:00:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/top-ten-tips-to-choose-a-great-sast-tool/</loc>
		<lastmod>2025-10-03T21:54:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/sast-vs-sca/</loc>
		<lastmod>2025-10-03T21:44:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/source-code-analysis-for-safer-application-development/</loc>
		<lastmod>2025-10-03T21:37:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/code-review-tools/</loc>
		<lastmod>2025-10-03T21:26:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVmNWEwYTdmNmU3NmQucG5nJnZlcnNpb249MDAwMCZzaWc9OTg5ZGM0NThjM2IyYzU0NTFkMjI1NTYxMmQzOGU4ODk.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVmNWEwYWRlYzgyOTIucG5nJnZlcnNpb249MDAwMCZzaWc9ZmUxMWUzYjQxMDMyNGM0MDI2YjE3ZDcxNjE4ZDdkZTk.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVmNWEwYjI2YmNkYjcucG5nJnZlcnNpb249MDAwMCZzaWc9MmI3NTIxNmNhN2JmOWI2YzI2NmYxMGYwOTZjYWJhNTM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVmNWEwYjViMjdlNjcucG5nJnZlcnNpb249MDAwMCZzaWc9NjFkYjgzNjM3NTI0ZTBmNjU3NmYyZWUyZDhjNzg4NTA.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVmNWEwYjg1OTIxYjcucG5nJnZlcnNpb249MDAwMCZzaWc9YTdkMTJiYTUxNzlmNjc5OWYzMmJiZWZkNTc0MjFlMjg.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVmNWEwYmJmMjJhYTMucG5nJnZlcnNpb249MDAwMCZzaWc9YzIxY2E2ZGVkZDlhNTQ2YjgzNWU4NTg5MTUwZTgyMzk.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVmNWEwYmU3Y2FlM2QucG5nJnZlcnNpb249MDAwMCZzaWc9MGY5ZjJmODZkN2EzZTNmNjE3MTkzZGMxYzFlNGNlNzE.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVmNWEwYzFkODcyZTIucG5nJnZlcnNpb249MDAwMCZzaWc9YzViNGJhMjcwZmE3NzVmNTUzMTQyZDliNzU4MzE0N2M.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/B7QlVwXRZ0IIxiOZFQj17ZSLZj7gpTP73n-cKhdKOMFkGvEvYZY0B9KQXt-9dADkPYLWqFKeHL_9hwmFJ_nvUJivVj-o7hXq08weq7hX4HBqHbzmsEXk1kh0wuGeJWWssGrL7kQK.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/benefits-of-vex-for-sboms/</loc>
		<lastmod>2025-10-03T17:52:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/11/sbom1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/guide-to-standard-sbom-formats/</loc>
		<lastmod>2025-10-03T17:38:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/five-tips-for-using-sboms-to-boost-supply-chain-security/</loc>
		<lastmod>2025-10-03T17:09:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/getting-started-with-software-dependency-management/</loc>
		<lastmod>2025-10-01T20:02:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/the-risks-and-benefits-of-updating-dependencies/</loc>
		<lastmod>2025-10-01T20:00:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/how-to-manage-php-dependencies-using-composer/</loc>
		<lastmod>2025-10-01T19:30:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/dependency-management-vs-dependency-updates-whats-the-difference/</loc>
		<lastmod>2025-10-01T19:10:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/maven-update-dependencies-automatically/</loc>
		<lastmod>2025-10-01T19:03:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/media/2020/07/1-517x258-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/media/2020/07/2-386x429-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/media/2020/07/3-1-517x242-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/media/2020/07/4-517x384-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/media/2020/07/5-517x302-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/media/2020/07/6-517x243-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/media/2020/07/8-517x388-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/media/2020/07/9-768x660-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/how-to-manage-python-dependencies/</loc>
		<lastmod>2025-10-01T18:56:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/top-8-bsd-licenses-questions-answered/</loc>
		<lastmod>2025-10-01T16:17:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/the-top-web-vulnerability-scanners/</loc>
		<lastmod>2025-09-29T19:05:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/6-open-source-software-security-concerns-dispelled/</loc>
		<lastmod>2025-09-23T13:43:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/5-ways-to-speed-up-your-software-development-process/</loc>
		<lastmod>2025-09-23T13:38:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/scrum-board.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/defect-cost-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/5-tips-for-using-open-source-components-more-wisely/</loc>
		<lastmod>2025-09-23T13:37:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/5-steps-to-get-developers-to-care-more-about-security/</loc>
		<lastmod>2025-09-23T13:35:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/5-free-developer-tools/</loc>
		<lastmod>2025-09-23T13:34:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVkZGZkY2NmNTEwOTgucG5nJnZlcnNpb249MDAwMCZzaWc9OWNmYzc2M2JkMzhlMTg3M2Q4YWM3ODBkOTQ1MzZjZWI.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVkZGZkY2RiNDk5MGQucG5nJnZlcnNpb249MDAwMCZzaWc9ODkxMGJjZjIyNmYwNzU2MTliN2Q1Y2MyNTc3NDgzZWU.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/bolt-fdt-logo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVkZGZkY2Q2MTNhMDcucG5nJnZlcnNpb249MDAwMCZzaWc9MzlmM2Y5NTg5ZTEzNDBkYjFhZDM4OWE3YmQyMzM4YTU.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVkZGZkY2U1MGI2YmYucG5nJnZlcnNpb249MDAwMCZzaWc9NmNhMzA1NTJiYTEyYmZkNWFmMmQ2NzZlMWVkN2RhZTE.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/3-essential-steps-for-vulnerability-remediation-process/</loc>
		<lastmod>2025-09-23T13:31:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/3-critical-best-practices-of-software-supply-chain-security/</loc>
		<lastmod>2025-09-23T13:27:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/2023-owasp-api-security-top-ten/</loc>
		<lastmod>2025-09-23T13:20:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/npm-supply-chain-attack-packages-compromised-by-self-spreading-malware/</loc>
		<lastmod>2025-09-22T19:45:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/software-security-vulnerability-prioritization/</loc>
		<lastmod>2025-09-17T19:42:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/ThnfyUBPfYnvAbewOEQTEnPlhAJsvYQsatb8dIjHtO49FO-kdJvPqcq73aJS3t8z7z5PqURj8P-it0u-7WYl_6lvjvHej7pmHhrPtTIAVpdUNeYqv4jAqxI_3q1mTog3l-cGAVqP.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/F02VN2SidCwb-gZkK5avt6cOfCYUIu2zaGhZFwjbBPtTqBoyneU4-6st3AMJ9zk0HRHxJVwWH29aDoq78_nPAdUJIQ6-G9G3oF1nCTT_pFCoqL_2URmpWXa-uLQNwPGAz5BDn2oP.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Prioritize-page-An-innovative-approach-to-scoring-2-e1618838498992.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/modern-appsec-programs-run-on-automation/</loc>
		<lastmod>2025-09-17T19:35:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/devsecops-demands-cultural-change/</loc>
		<lastmod>2025-09-17T19:29:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/announcing-the-open-source-reliability-leaderboard-a-new-resource-for-preventive-appsec/</loc>
		<lastmod>2025-09-17T15:45:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/whats-driving-the-adoption-of-sboms-and-whats-next-for-them/</loc>
		<lastmod>2025-09-12T21:57:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/what-risks-do-you-run-from-brandjacking-and-how-do-you-overcome-them/</loc>
		<lastmod>2025-09-12T21:55:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/what-cybersecurity-risks-typosquatting-poses-and-how-to-beat-them/</loc>
		<lastmod>2025-09-12T21:54:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/understanding-the-anatomy-of-a-malicious-package-attack/</loc>
		<lastmod>2025-09-12T21:53:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/security-debt/</loc>
		<lastmod>2025-09-12T21:49:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/JSlqEIDric6mar647B9FxCSgYj37HiKDhTAAhQXowkRithnj6Kex9r9Ld5cobWgpnOTkc-MYxdTma5f4-UsOZExjmGmrckThA271jbPlvAR2o7FKmc17YrEkDepK3rxR2g90Tl9T.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzYwNDRhNmM1YjQ3YjYuUE5HJnZlcnNpb249MDAwMCZzaWc9MGJjNjBkMzZhYmQ2ODkzZGZlYWRjYmYyZDZmM2M2NTY.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/FRNTWYwiGiHR6uNzz_bacnExsXvQJHQUkdqYpypmErvDB4Zjf5hfbW9D3fRF_IDtu7e1MPkQ8W0dpCC5hn-myPqN09uzvSr_DGW9hLJnT84XCxqEVmyyHboYIDCYraCIG9Rt7_zs.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/YjUY8JEAnQWYEck5wzS7CK4DzuCblY0F4T1BgVmlg89VmLjXmzLcRHJ_ubvodisnfUK3_Xxf9BgIuyTnK51U6878nfXBIQDqxs-jCkmtb1E2e3gZF8CBXdPg1LWl3KyELpCg_D2K.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/sdlc-software-development-life-cycle/</loc>
		<lastmod>2025-09-12T21:47:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVlZjM5NGQxMDg4NTUucG5nJnZlcnNpb249MDAwMCZzaWc9NzBhNTM2YjU3ODU3ZjM2NTkzOGJlMzE3MmZhMWQyMTY.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/sdlc1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/how-software-supply-chain-attacks-work-and-how-to-assess-your-software-supply-chain-security/</loc>
		<lastmod>2025-09-12T21:42:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/stages-of-software-supply-chain-attack-1024x576.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/software-supply-chain-common-vulnerabilities-1024x576.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/software-supply-chain-hidden-vulnerabilities-1024x576.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/assess-current-software-supply-chain-security-1024x576.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/software-supply-chain-technical-tools-1024x576.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/eight-considerations-for-thwarting-malicious-packages/</loc>
		<lastmod>2025-09-12T21:39:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/npm-supply-chain-attack-infiltrates-popular-packages/</loc>
		<lastmod>2025-09-11T17:25:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/forresters-state-of-application-security-2021-key-takeaways/</loc>
		<lastmod>2025-08-29T14:32:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzYwNmVkZmIxYjI5ZmQuUE5HJnZlcnNpb249MDAwMCZzaWc9MjRiYjMzMWNmZWMwNDI2ZTMxMmUzN2Y3OGYxYmIyNGI.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/magic-quadrant-for-application-security-testing-2023-gartner-report/</loc>
		<lastmod>2025-08-28T13:36:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/vector-and-embedding-weaknesses-in-ai-systems/</loc>
		<lastmod>2025-08-22T15:53:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/the-hallucinated-package-attack-slopsquatting/</loc>
		<lastmod>2025-08-21T13:03:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/08/vibe-coding.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/08/slopsquatting.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/open-source-dependencies/</loc>
		<lastmod>2025-08-07T19:00:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/cvss-3-1-vs-cvss-4-0-a-look-at-the-data/</loc>
		<lastmod>2025-07-21T22:00:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/01/CVSS-4.0-faq-use.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/01/CVSS-3.1-vs-CVSS-4.0-statistics-graph.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/01/CVSS-3.1-vs-CVSS-4.0-blog-image.svg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/mend-sast-ai-powered-remediation/</loc>
		<lastmod>2025-07-21T21:43:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/fake-vs-code-extension-on-npm-spreads-multi-stage-malware/</loc>
		<lastmod>2025-07-21T21:42:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/02/Fake-VS-graphic-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/02/Fake-VS-graphic-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/02/Fake-VS-graphic-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/02/Fake-VS-graphic-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/02/Fake-VS-graphic-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/02/Fake-VS-graphic-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/02/Fake-VS-graphic-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/02/Fake-VS-graphic-8.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/devsecops-tools/</loc>
		<lastmod>2025-06-16T12:09:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Mend-io-logo-color-newsroom.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVkZmI2MmU3NzI1ZTcucG5nJnZlcnNpb249MDAwMCZzaWc9NjE4YzA2ZmVlZWM2NjA1NjVlNWFlZmIyMjI3NzJhN2Y.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2025/06/Astra-logo.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVkZmI2MWI1MmNjNzkucG5nJnZlcnNpb249MDAwMCZzaWc9Mzk0ZGE1ODlmODBlNDg1MDAzNzYwOGRmYjVlMzI5MmM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVkZmI2MjU1MzdlNWUucG5nJnZlcnNpb249MDAwMCZzaWc9OGNhOThjMzhiNTMzZGVlNDY1NGU3YmIyZDVjM2ViZGE.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVkZmI2M2YyNzU2MTgucG5nJnZlcnNpb249MDAwMCZzaWc9ZTJmMTRmMTY4OGIwZmM3MTQ1MWYyMmU4MjA5ZDU2MmU.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVkZmI2NGQwMWZiMTkucG5nJnZlcnNpb249MDAwMCZzaWc9ZDFiNjdhMjdmZjI2Zjc5YmIyNTk3YTAwYzA0NWY3NzY.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVkZmI2NTgyOGJjOGEucG5nJnZlcnNpb249MDAwMCZzaWc9ODNhY2U0MDQzYjRkMDc0MTBhOGM4ZGM0NTNkNmE1Mzg.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzViMjExM2QwNTM3ZGMucG5nJnZlcnNpb249MDAwMCZzaWc9ZTM3ZjNlOTY4M2I5OTAxY2RkMTBjMWUzODNkZjFkYTg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/the-new-era-of-ai-powered-application-security-part-one-ai-powered-application-security-evolution-or-revolution/</loc>
		<lastmod>2025-06-11T20:08:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/large-AI-Powered-Application-Security.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/large-large-The-challenge-of-software-provenance.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/the-new-era-of-ai-powered-application-security-part-two-ai-security-vulnerability-and-risk/</loc>
		<lastmod>2025-06-11T20:07:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/large-Security-Vulnerabilities-and-Risk.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/how-can-application-security-cope-with-the-challenges-posed-by-ai/</loc>
		<lastmod>2025-06-11T20:07:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/large-Coping-with-AI-related-security-challenges.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/what-new-security-threats-arise-from-the-boom-in-ai-and-llms/</loc>
		<lastmod>2025-06-11T20:06:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/the-challenges-for-license-compliance-and-copyright-with-ai/</loc>
		<lastmod>2025-06-11T20:06:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/what-existing-security-threats-do-ai-and-llms-amplify-what-can-we-do-about-them/</loc>
		<lastmod>2025-06-11T20:06:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/what-you-need-to-know-about-hugging-face/</loc>
		<lastmod>2025-06-11T20:05:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/owasp-top-10-for-llm-applications-a-quick-guide/</loc>
		<lastmod>2025-06-11T20:05:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/quick-guide-to-popular-ai-licenses/</loc>
		<lastmod>2025-06-11T20:04:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/hallucinated-packages-malicious-ai-models-and-insecure-ai-generated-code/</loc>
		<lastmod>2025-06-11T20:04:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/what-you-don-t-know-about-android-application-security/</loc>
		<lastmod>2025-06-02T13:44:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/what-is-the-nist-supply-chain-risk-management-program/</loc>
		<lastmod>2025-06-02T13:43:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/top-10-linux-kernel-vulnerabilities/</loc>
		<lastmod>2025-06-02T13:41:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/five-critically-important-facts-about-npm-package-security/</loc>
		<lastmod>2025-05-15T19:13:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/why-your-devops-platform-needs-a-security-partner-to-safeguard-your-software/</loc>
		<lastmod>2025-05-15T19:05:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Picture1-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/devsecops-vs-secdevops/</loc>
		<lastmod>2025-05-12T22:32:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/the-100-million-case-for-open-source-license-compliance/</loc>
		<lastmod>2025-05-12T22:31:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/how-to-expose-ports-in-docker/</loc>
		<lastmod>2025-05-12T22:29:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2020/10/image-7.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/what-you-can-do-to-stop-software-supply-chain-attacks/</loc>
		<lastmod>2025-05-12T21:56:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/content-image-whats-in-an-SBOM.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/content-image-how-can-SBOM-help.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/content-image-SBOMS-and-their-relation.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/content-image-SBOMS-best-practices.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/content-image-know-your-components.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/content-image-malicious-packages.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/content-image-if-you-dont.svg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/more-than-100k-sites-impacted-by-polyfill-supply-chain-attack/</loc>
		<lastmod>2025-05-12T21:32:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/polyfill-notification.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/polyfill-code.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/the-solana-web3-js-incident-another-wake-up-call-for-supply-chain-security/</loc>
		<lastmod>2025-05-12T21:00:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/12/solana1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/12/solana2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/cve-2024-50379-a-critical-race-condition-in-apache-tomcat/</loc>
		<lastmod>2025-05-12T20:51:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/vulnerability-research-heres-how-it-works-at-mend/</loc>
		<lastmod>2025-05-08T02:16:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/top-security-open-source-vulnerabilities-2019/</loc>
		<lastmod>2025-05-08T02:11:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVlMzJkNmNjYTQ3MzcuanBnJnZlcnNpb249MDAwMCZzaWc9MTVmYTAyNmFjMzhiOWUzNGRhOTk5ZTZiNzQzMGIxZDA.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVlMzJkNzNhNTAxNTIucG5nJnZlcnNpb249MDAwMCZzaWc9Njk4NjZiNDNlZTk1MWMwNDdmYmYxNGQ5ZmNhYmYwNDk.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVlMzJkODA4ODczOGQuanBnJnZlcnNpb249MDAwMCZzaWc9ZDg1NjEzYWM1OTkwYzY4NGYyZTVkNzk2ZjhmNjZmZjA.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVlMzJkODY1MThlMDkucG5nJnZlcnNpb249MDAwMCZzaWc9MTA0ZDdjOGNmMzg1YTRhYTM0NThlNTc0NDU4OTljNDE.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVlMzJkOGNkMDAwY2YuanBnJnZlcnNpb249MDAwMCZzaWc9YjU2YTk1NTA2MDEwN2JhMTYwZjk0NzU5YTY0Y2M5NGI.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVlMzJkOTdjMzMzZGUuanBnJnZlcnNpb249MDAwMCZzaWc9MTRjYjkzYjk3MjQ2NDgzNGE3YzRjZDQyNmRmZjVlMjI.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVlMzJkYTAxZDBiNTkucG5nJnZlcnNpb249MDAwMCZzaWc9ODYwZTAyOWU3YjcwNjYzYzkyYmVkMWQxOWFlMjc2OGE.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVlMzJkYTg0NWZkZDAucG5nJnZlcnNpb249MDAwMCZzaWc9MjMzYjQzY2JlMTdmYzE0Yzc3M2NiNmYyNjZmYzAwOTU.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVlMzJkYWQzNzIwNjAucG5nJnZlcnNpb249MDAwMCZzaWc9NjE4ZDk3OWRlMDI0MjQ4MWY5NTJiZTRjMTRiZDJkN2Q.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/sboms-and-the-need-for-speed/</loc>
		<lastmod>2025-05-08T01:59:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/nvd-update-help-has-arrived/</loc>
		<lastmod>2025-05-08T01:50:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/new-feature-dependency-deprecation-warnings/</loc>
		<lastmod>2025-05-08T01:35:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/3-major-challenges-in-big-data-security/</loc>
		<lastmod>2025-05-07T22:09:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/top-security-open-source-vulnerabilities-2018/</loc>
		<lastmod>2025-05-07T20:25:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/linux.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/drupal.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/spring-data-commons.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/requests.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/apache-struts.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVjMzc0YjY4ZjFjYzQuanBnJnZlcnNpb249MDAwMCZzaWc9ZTc2YzllNmNiODY3MzczNzM2NTRhNzliN2IyNTRkZjA.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/angularJS.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/MomentJS.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/lodash.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/overcoming-software-supply-chain-risk/</loc>
		<lastmod>2025-05-07T20:20:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/open-source-vs-free-software/</loc>
		<lastmod>2025-05-07T20:19:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/new-vulnerability-in-sudo-cve-2019-14287/</loc>
		<lastmod>2025-05-07T20:19:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVkYTgzMmI1NzU0NTMuUE5HJnZlcnNpb249MDAwMCZzaWc9ZDg1NjA4MDQzNjY5ZTk4NTgyYzIyMDY4N2MxMzNkNTI.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/merge-confidence/</loc>
		<lastmod>2025-05-07T20:15:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVmYjI2OTBlZDRkNjIuUE5HJnZlcnNpb249MDAwMCZzaWc9ZmQ2YjI5ZTVkY2ZjZTFlMTliYTlmNTMzNzI2ZGNjY2M.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVmYjI2OTQ1ZWVmODQuUE5HJnZlcnNpb249MDAwMCZzaWc9NDdhMDJmMDI2MzY4YmYzYzJiOGIwNjkwNWQyMjQwN2I.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVmYjI2OTdkOTc0MDEuUE5HJnZlcnNpb249MDAwMCZzaWc9NmUzYjE4Y2RmZmJiOGRmNzMwNjk2OTBjY2E0NDBjNGU.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVmYjI2OWI0MjdlYmMuUE5HJnZlcnNpb249MDAwMCZzaWc9ZGQzMDdmODlkMDk4OTk3NTNiYzI5YWQyODI0MGNlMDM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVmYjI2YTBhNTFkODEuUE5HJnZlcnNpb249MDAwMCZzaWc9M2NiYzBhOGIwMDgyNDA0MGRlMDY0NzQxNzM2NjdkY2M.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/mends-handy-guide-to-using-epss-scores/</loc>
		<lastmod>2025-05-07T20:13:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/how-we-use-our-software/</loc>
		<lastmod>2025-05-07T20:13:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/advisory-new-openssl-critical-security-vulnerability/</loc>
		<lastmod>2025-04-15T14:53:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/blog1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/blog2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/blog3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/cvss-v3-1/</loc>
		<lastmod>2025-04-07T18:36:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVkY2Q0OTNmNzVkMzYuUE5HJnZlcnNpb249MDAwMCZzaWc9NDFkOTUxYjMxOWU0MmZiMjZhNTY4ZWE2NmNkYTQ5ZTk.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVkY2Q0OTljNmU2MTYuUE5HJnZlcnNpb249MDAwMCZzaWc9NjAyNjUzMDdjMjUwMWZiYzM5OTVkYWE3ZDQ0OTM4MDE.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVkY2Q0OWMzMTdjODYuUE5HJnZlcnNpb249MDAwMCZzaWc9ZGYzZjE1ZDFhNzI2MWMxMzk3ZjJjMmFkNDUwMTkwNWI.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/log4j-vulnerability-cve-2021-45046/</loc>
		<lastmod>2025-04-01T18:57:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/continuous-integration-tools-comparison/</loc>
		<lastmod>2025-03-31T16:57:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/why-vulnerability-management-must-go-beyond-cvss-to-priority-scoring/</loc>
		<lastmod>2025-03-28T20:57:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/what-role-should-dependency-management-play-as-the-regulation-of-the-software-supply-chain-escalates/</loc>
		<lastmod>2025-03-28T20:55:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/what-are-the-key-considerations-for-vulnerability-prioritization/</loc>
		<lastmod>2025-03-28T20:52:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/prioritization-funnel-centered-1024x874.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/the-future-of-vulnerability-management-programs/</loc>
		<lastmod>2025-03-28T20:49:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/sometimes-a-vulnerability-isn-t-so-vulnerable/</loc>
		<lastmod>2025-03-28T20:46:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/iEQr2zquS86HyGATxmrGXkgRck7O43sSF5yiTfvLbotXZDePbOLgSLprtnEW7S80B0pmS_vo-MzRfF6tdc9ttCqHmZfMCgA-Ier1lYWs4TNqDnkkl1KPhEVEjVuM-AMSHl_uru3v.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/fhhpvkC8GYvOa_AUwwsZMJeigBFRQfxq96dLoqOdGXCFo-9RILs21SWrGo6qudoWftbMhMj8sBCBP1a1qut4iL_b8H896zlwv2N8ZFGhqpka1Td-XkcoOnePKK9sotmzcM7E4Zbi.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/2mbTi3O0XU0a0WJ280mjICVjVFbbM8BscE7NoZbnp6RobrozVlc7oT2AGNjWmlK9VPfY7TArqtYZas29rF_YkUw6IA_C8COyp_zCgQqbUNph7gAl8cih0pG6uFQ6U8jmW1cfqIrX.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/six-golden-rules-for-software-and-application-security/</loc>
		<lastmod>2025-03-28T20:44:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/log4j-vulnerability-cve-2021-44228/</loc>
		<lastmod>2025-03-28T20:40:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/get-the-response-to-spring4shell-right-best-practices-for-immediate-remediation/</loc>
		<lastmod>2025-03-28T20:34:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/are-you-protected-from-the-twelve-most-exploited-vulnerabilities/</loc>
		<lastmod>2025-03-28T20:30:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/best-security-conferences-2021/</loc>
		<lastmod>2025-03-28T16:58:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/top-5-git-security-mistakes/</loc>
		<lastmod>2025-03-28T16:55:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/building-a-modern-application-security-strategy-part-two/</loc>
		<lastmod>2025-03-28T16:50:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/penetration-testing/</loc>
		<lastmod>2025-03-28T16:49:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/web-application-security/</loc>
		<lastmod>2025-03-28T16:47:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/npm-package-javascript-library-compromised-via-account-takeover/</loc>
		<lastmod>2025-03-28T16:35:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/JS-post-1-300x94.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Zrzut-ekranu-z-2021-10-22-21-11-56-300x183.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Zrzut-ekranu-z-2021-10-22-21-14-48-300x88.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/JS-post-2-2-1024x437.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/quick-guide-to-the-owasp-oss-risk-top-10/</loc>
		<lastmod>2025-03-28T16:34:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/add-to-your-appsec-arsenal-with-mend-ios-integration-with-secure-code-warrior/</loc>
		<lastmod>2025-03-28T16:30:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/getting-started-with-npm-basics-mastering-node-package-manager-commands/</loc>
		<lastmod>2025-03-18T15:51:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/media/2023/11/Blog-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/media/2023/11/npm-user-interface.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/media/2023/11/npm-CLI.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/media/2023/11/npm-search-info-1024x576.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/media/2023/11/npm-init.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/2021-state-of-open-source-security-vulnerabilities-cheat-sheet/</loc>
		<lastmod>2025-02-26T17:32:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/C4w6sooI48iMpYjEIFAJ2_R1SpRH-2t7rtv0Ay2mxH_p2_a1PDJHt1PrcTMBlLD6BFYFjEBbWBwoVxJc3Jz2i4oNY6OHCOJPoFN-twlvi25gI81iY9C-W6tEhIoZJQ57s5qqOCKX.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/LYspjkrZOMc6TJIHVAFTsE15YhJOMBLweU9pqd5gJWDlAzvdRxZ_41NISnGdefk1Uay8YTc1BeFMeWxwqzEi04xds9T5LD0yPuKhY-W4n7Kbnt3rqJSp1MYuunriN5uUs_rj4Fdw.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/SES4NkHghZ_48SAetJ_H1QaW1WaZ740dtZyhvzHePG4QGVdr9be9sihi8HKR3dD3Cq_wghHSnXtWPC-9MtEiHt2eakqGkmmLN5OuKhPdc2djYsm8IVT2LMuvsYsU0cE8mJSjz1h_.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/why-the-need-for-application-security-intensifies-as-eu-tightens-cyber-security-regulations/</loc>
		<lastmod>2025-01-27T20:17:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/president-executive-order-supply-chain-attacks/</loc>
		<lastmod>2025-01-27T20:03:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/dude-wheres-my-documentation/</loc>
		<lastmod>2025-01-16T15:50:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/08/documentation-blog1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/new-supply-chain-attack-methods-april/</loc>
		<lastmod>2025-01-15T20:53:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/supply-chain-security-tips/</loc>
		<lastmod>2025-01-15T20:53:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/external-resources-threaten-supply-chain/</loc>
		<lastmod>2025-01-15T19:27:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/lockfiles-security/</loc>
		<lastmod>2025-01-15T19:27:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2021/09/Diagram-1-02-497x400-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2021/09/Diagram-1-01-1.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/using-zero-trust-to-mitigate-supply-chain-risks/</loc>
		<lastmod>2025-01-15T19:27:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/implementing-software-supply-chain-risk-management/</loc>
		<lastmod>2025-01-15T19:21:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/how-to-mitigate-ruby-supply-chain-security-risks/</loc>
		<lastmod>2025-01-15T19:21:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/aws-targeted-by-a-package-backfill-attack/</loc>
		<lastmod>2025-01-15T19:20:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/impact-analysis-rubygems-critical-cve-2022-29176-unauthorized-package-takeover/</loc>
		<lastmod>2025-01-15T19:20:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/undefined-Imgur.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/undefined-Imgur-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/LCnH1zA-Imgur.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/3-new-github-features-to-reinforce-your-security/</loc>
		<lastmod>2025-01-15T19:20:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/six-steps-to-achieve-zero-trust-in-application-security/</loc>
		<lastmod>2025-01-15T19:12:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/how-to-conquer-remote-code-execution-rce-in-npm/</loc>
		<lastmod>2025-01-15T19:12:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/todays-security-tidbit-an-encrypted-json-file-containing-malicious-code/</loc>
		<lastmod>2025-01-15T19:12:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2022/08/Figure-1-the-content-of-the-package.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2022/08/Figure-2-the-install.js-file-and-the-encrypted-install.json-file-e1769435878653.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2022/08/Figure-5-the-README-file-of-the-package-%E2%80%98support-center-components.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/popular-cryptocurrency-exchange-dydx-has-had-its-npm-account-hacked/</loc>
		<lastmod>2025-01-15T19:11:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/JxEp2MA_Xy22o5S654mqiIBdMyH2i27ee3flSXjL2u0bXhYRQMCMl7JxdRBrcEhJlv_IchQkA7FPBKYy0G9uQq65xVCBMhqJkgJo6Slvz1_dwmbW6AtXYa3SMyNhoymEFw9Cv_tUjoTnNrsC81Nx0f-oCiA_SuGFZAhnyd_Uw9BkKImN_m08xZabqA.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/image-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/mPklQ2zqBCM_nlz_jcy8crWlmc-63YxnhhFLl_qMcmyWC4za-aQGam9VCuXZI7Z6MnCoDIyX0RIOuPjsFaB-j09jCHWGKlD9FlxE_GCj3z5ieXDHPUizDHBKHDuPQRKJ57Zr_Xt48B2zepq6h5L2peiiNyi_Aw4T8STBrBPNmLRbDnyv-D8IcZkENQ.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/5Izu4f1W1sevG8wbRTcUjSGO5wDuTvawkpfF-fXFpHQSeIryJ8qzU0tzF5Ge-LF1hwmforI98fOcKKRDt6KjrywjGVCEBlGWB0TMkNaLoo6I3oLOiAMI5FghIgH937Mja58zQHhA7kN0gLGcMXaskg4UMXLOcs8iyQqNZerCR2XbmZmUPBSNNK-3Bw.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/image-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/image-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/announcing-mend-sca-for-bitbucket-cloud-integration/</loc>
		<lastmod>2025-01-15T19:10:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/maximize-value-from-your-sast-tool/</loc>
		<lastmod>2025-01-15T19:08:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/malicious-code-deletes-directories-if-you-do-not-have-a-license/</loc>
		<lastmod>2025-01-15T19:08:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/why-do-we-need-modern-sast-detection-engines-and-a-new-approach-to-sast/</loc>
		<lastmod>2025-01-15T19:07:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/open-source-license-management-tools-challenges-opportunities-and-what-to-look-out-for/</loc>
		<lastmod>2025-01-15T19:06:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/the-cisos-guide-to-application-security-innovation/</loc>
		<lastmod>2025-01-15T19:06:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/the-shift-to-the-cloud-and-its-implications-for-application-security/</loc>
		<lastmod>2025-01-15T19:05:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/why-you-should-scan-your-applications-in-the-repository/</loc>
		<lastmod>2025-01-15T19:04:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/deceptive-vibranced-npm-package-discovered-masquerading-as-popular-colors-package/</loc>
		<lastmod>2025-01-15T19:04:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/4CgzJLPbLsWSGG2AC9kuoVf5uZRrjYjJEp0bhDsD1YExrsHFuiXn5oCqTlsc1ZHYTGkKoFl4YY9gu-ZmuZahhk0LM_nX4qpLvy3tFeijxEljv0DOwrcSbl6pwK6WGkjAJnQjpwuCsbuB1J4YDPfeSFo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/nkJCNUJMF6qe7KzPbnfvfRUqj4lGdOgqYivjwMEqpKXNRCuZkAzlSz1HLvTxa-616-YSayDrDJeSxRS2F6dE1UzlfblkbCHvIa4HwQLTHWhuD0Ph3Sc337TfZBZEQMNrJ3tCPY7TqIocSAU2hOBflyE.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/kU3okHkizybdaUNvI5PrT6WTm9MFjdV2I-2hY1n6Zu9AlVA9YJf1oNjvdgo37H13AWjG6HcW5kp7AZebRHVoE5143QAxKRGSJD8yzp3qjv1u3rd-5IOAxjkvDCYRxEbQ0WN4gUE7CYxyDuvYO_uE3pE.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/9x56ymQ6CsEe0HO1PsH_2HFSyyfpZgtjyxK9nwXua-iocyuIC21tS84KirW-WPCMqykfSL8f_w73OeQFslcXgGnD3NOkqmj33d1h956ytgEze-kpPfnz3e-ya5j6Q7ZKgr9qeyHoA3BVN7ZnKVegGgM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/8W0wo6EdTmJOl5a1p5VRiOFzjz0sO2ZTOuhH0ymBQLDQk4zb8uHnHVToKk8EXDGSqRc2nwo7o6h8TN5wjMSFFQ_NNmfc0mTKCZCcaCWvixc_TNieeNxpxq76kSAhiEm0WRS-thwp1fOZX602fW_pnYs.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/the-unseen-risks-of-open-source-dependencies-the-case-of-an-abandoned-name/</loc>
		<lastmod>2025-01-15T19:04:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2023/05/Picture1-4.png.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2023/05/Picture3-3.png.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2023/05/Picture4-2.png.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/mend-io-launches-appsec-risk-assessment-program/</loc>
		<lastmod>2025-01-15T19:02:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/how-to-boost-confidence-in-your-open-source-security-with-mend-smart-merge-control/</loc>
		<lastmod>2025-01-15T19:02:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/a-new-version-of-mend-for-containers-is-here/</loc>
		<lastmod>2025-01-15T18:57:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/theres-a-new-stealer-variant-in-town-and-its-using-electron-to-stay-fully-undetected/</loc>
		<lastmod>2025-01-15T18:57:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/crazydown-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/crazydown-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/crazydown-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/crazydown-code.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/crazydown-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/crazydown-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/crazydown-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/crazydown-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/crazydown-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/crazydown-9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/crazydown-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/crazydown-11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/crazydown-12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/crazydown-13.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/crazydown-14.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/why-legal-regulation-shifts-responsibility-for-software-supply-chain-security-to-vendors/</loc>
		<lastmod>2025-01-15T18:56:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/how-software-supply-chain-security-regulation-will-develop-and-what-will-it-look-like/</loc>
		<lastmod>2025-01-15T18:56:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/adversaries-are-using-automation-software-vendors-must-catch-up/</loc>
		<lastmod>2025-01-15T18:56:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/why-dependency-management-reduces-your-enterprises-technical-debt/</loc>
		<lastmod>2025-01-15T18:54:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/why-the-us-government-continues-to-push-for-software-supply-chain-security/</loc>
		<lastmod>2025-01-15T18:54:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/lets-embrace-death-in-the-software-development-lifecycle/</loc>
		<lastmod>2025-01-15T18:54:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2023/10/sdlc1.png.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/what-developers-need-to-succeed-for-effective-application-security/</loc>
		<lastmod>2025-01-15T18:53:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/building-security-culture-starts-with-building-relationships/</loc>
		<lastmod>2025-01-15T18:53:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/turnover-relationships-and-tools-in-cybersecurity/</loc>
		<lastmod>2025-01-15T18:47:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/six-top-tips-for-holistic-appsec-and-software-supply-chain-security/</loc>
		<lastmod>2025-01-15T18:47:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/cvss-4-0-is-here-how-to-make-the-most-of-it/</loc>
		<lastmod>2025-01-15T18:46:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/secrets-management-vs-secrets-detection-heres-what-you-need-to-know/</loc>
		<lastmod>2025-01-15T18:46:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/breaking-what-is-going-on-with-the-nvd-does-it-affect-me/</loc>
		<lastmod>2025-01-15T18:43:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/critical-backdoor-found-xz-utils-cve-2024-3094/</loc>
		<lastmod>2025-01-15T18:40:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/file-in-the-released-tarballs-img-1024x194.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/nvds-backlog-triggers-public-response-from-cybersec-leaders/</loc>
		<lastmod>2025-01-15T18:39:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/nvd-update-more-problems-more-letters-some-questions-answered/</loc>
		<lastmod>2025-01-15T18:36:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/threat-hunting-101-five-common-threats-to-look-for/</loc>
		<lastmod>2025-01-15T18:36:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/log4j-vulnerability-cve-2021-45105/</loc>
		<lastmod>2024-12-31T16:41:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/5-female-pioneers-of-software-development/</loc>
		<lastmod>2024-12-18T23:52:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/top-20-developer-advocates-to-follow/</loc>
		<lastmod>2024-12-18T23:42:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVlMjA1MmM0YTIxMmYuUE5HJnZlcnNpb249MDAwMCZzaWc9ZDZkN2E3OWZjYmMzMjljZTQxNmEzOTVmYjY0NGIwZjM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVlMjA1MzdhMzE3YzMuUE5HJnZlcnNpb249MDAwMCZzaWc9MGM2YTEzNzBiMDNjNDgwYjBmYWJhNWQyMTBkNmVmMDY.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVlMjA1M2NhNDRjOTEuUE5HJnZlcnNpb249MDAwMCZzaWc9YmI2ODBhZjZjNzI3N2FkYTY4YWU1ZGZiOGNmNDIwMjM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVlMjA1NDE3ODMxZTAuUE5HJnZlcnNpb249MDAwMCZzaWc9OGY0MWQ4NmU5NzZkNDJiNTU2MzZjMmFjNDZjMGIzOGM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVlMjA1NDdhM2VlZWIuUE5HJnZlcnNpb249MDAwMCZzaWc9ZTljNjRmOTgzMTY1YzkyNTY4NzliYTc1OGRjNTFhNzg.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVlMjA1NTAwMmJhYzQuUE5HJnZlcnNpb249MDAwMCZzaWc9OTY5N2VlMmRmMzJjNWY5MTNiNzE5ZWRhYTA4MWVkYjA.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVlMjA1NTNkMDJkYjMuUE5HJnZlcnNpb249MDAwMCZzaWc9MWE1NGE4NjhhMGRhNTAwY2NiMDYyODU1MmM4NjI2ZjQ.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVlMjA1NWZkNjE0NDMuUE5HJnZlcnNpb249MDAwMCZzaWc9NjVhZTViN2JhMzFkZDcyMDk3MWEyYTJmNjMwODQ1ZjI.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVlMjA1NjNiZDhmNjYuUE5HJnZlcnNpb249MDAwMCZzaWc9MTBiMTllNTM2Mjg4OWM3NTNmZTE3MzljNWU3NzVjYjY.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVlMjA1NjdlNWJmNmEuUE5HJnZlcnNpb249MDAwMCZzaWc9MDdhYTkwNDI0Zjc0YmU3ZWNkMmNiNWUxOWY1Zjg1MDI.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVlMjA1NmU1M2M2NjUuUE5HJnZlcnNpb249MDAwMCZzaWc9YmNlNjgxNWNiYzI5Y2E0M2E0NzJlYWRhOTE2MzJmZWQ.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVlMjA1NzJmNTJhY2IuUE5HJnZlcnNpb249MDAwMCZzaWc9MDA5YzgwMDU5ZjZlN2Y0ZGIxNzBmZTNiNTQyMjRhYjY.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVlMjA1NzZiYzc0YjMuUE5HJnZlcnNpb249MDAwMCZzaWc9OWNiYjQzMGEzMmUzNGM4MzE0MjYzMjY5ODVjMGI0MzQ.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVlMjA1N2ExZWMwMmYuUE5HJnZlcnNpb249MDAwMCZzaWc9NjA5MmI0OWQ1MzIxOWMzYTg5NTIzZGZhNTc5NDQ2NDI.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVlMjA1N2UxMTU3OTEuUE5HJnZlcnNpb249MDAwMCZzaWc9MTA2MDJkOTYxNWRmNzM5MzEyZTQ1ODlkM2Y2YjExNzA.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVlMjA1ODExNThmZDIuUE5HJnZlcnNpb249MDAwMCZzaWc9Zjc5ZDIwNDE1YmQ3NjRmMTg0ODYxNWVmODViODc4NjA.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVlMjA1ODU2MjhhOGEuUE5HJnZlcnNpb249MDAwMCZzaWc9YTY4NDFiOTlkNjdmNzQxMWE3YjQzNmE4ZWRkNDJhYmY.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVlMjA1ODlmMjYxMjQuUE5HJnZlcnNpb249MDAwMCZzaWc9YTlhMDliNzg2M2Y1YWFhMjY2YWNjODRiNjQ0MmIwNWU.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVlMjA1OGRkMzc1ZDQuUE5HJnZlcnNpb249MDAwMCZzaWc9Njk3MjgyYzVjYjYxZGZlOGRmNjdhM2VmZmVkYjc3Mzc.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVlMjA1OTE3YmViOTAuUE5HJnZlcnNpb249MDAwMCZzaWc9ZDU5MzAyMmI3MGFmN2E3NmQ2ZjlkZTc5MThlZWMwOTY.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/supply-chain-attack-against-composer/</loc>
		<lastmod>2024-12-03T21:20:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/why-manually-tracking-usage-of-open-source-components-is-futile/</loc>
		<lastmod>2024-12-03T21:18:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/what-is-the-kev-catalog/</loc>
		<lastmod>2024-11-25T23:27:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Risk-based-prioritization.svg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/best-practices-of-highly-effective-appsec-programs/</loc>
		<lastmod>2024-11-25T22:48:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/ESG4-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Blog-The-Best-Tactics-and-Tools-to-Get-Great-AppSec-02-1024x516.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Blog-The-Best-Tactics-and-Tools-to-Get-Great-AppSec-03-1024x922.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/new-esg-research-report-outlines-best-practices-for-effective-application-security-programs/</loc>
		<lastmod>2024-11-25T22:44:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/esg-report1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/ESG4-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/ESG-5-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/mend-io-launches-mend-renovate-enterprise-edition/</loc>
		<lastmod>2024-11-25T22:39:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2023/10/renovate-merge-confidence-1024x318.png.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/lgbtq-open-source-projects-we-love/</loc>
		<lastmod>2024-11-20T23:43:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/7-open-source-projects-we-love/</loc>
		<lastmod>2024-11-20T23:40:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVlNDU0MDU5OGEzZTAuUE5HJnZlcnNpb249MDAwMCZzaWc9Nzk3YTlmNjk1N2M3MjgwMDc4ZWIzZWEyZGQxMTk2MzQ.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVlNDU0MDhlMmIwNDMuUE5HJnZlcnNpb249MDAwMCZzaWc9ZTdlYWEzNDg4MmI1YjUxZDZmNWIwNTM3MDY2YmMyNmY.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVlNDU0MGM1NWUwMGEuUE5HJnZlcnNpb249MDAwMCZzaWc9ODNjYjVjZDMyODQ0Mjg3OThiMTRiNmU2MWMxOTY0MjM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVlNDU0MTBkNzRmMGIuUE5HJnZlcnNpb249MDAwMCZzaWc9NGIyMzczOTYzOGUxYmIzODliMzcxNTk5N2ZhMGY2YTM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVlNDU0MTI1NDkyZGMuUE5HJnZlcnNpb249MDAwMCZzaWc9ZDNmODNkMzgyNWE0OWQwM2Q2NjI2OGQwYmIxN2IzMTI.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVlNDU0MTUzNzE0MzguUE5HJnZlcnNpb249MDAwMCZzaWc9NDliMjM2OTQ4NmFhMzZiZWU4NGQxZTM2ZTEwMTM5MDQ.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/how-does-slsa-help-strengthen-software-supply-chain-security/</loc>
		<lastmod>2024-11-15T21:42:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/mend-io-jira-security-doing-devsecops-better-together/</loc>
		<lastmod>2024-11-15T21:29:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/pic-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Picture8-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Picture9-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Picture10-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Picture11-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Picture6-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/mend-io-achieves-aws-security-competency-status/</loc>
		<lastmod>2024-11-15T21:02:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/securing-the-software-supply-chain-mend-open-source-risk-report/</loc>
		<lastmod>2024-11-15T20:51:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/blog1-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/blog2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/blog3.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/blog4.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/blog5.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/building-a-modern-application-security-strategy-part-one-threats-opportunities-and-challenges/</loc>
		<lastmod>2024-11-15T20:45:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Open-Source-Vulns-per-month-2020-2022.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/yandex-data-leak-triggers-malicious-package-publication/</loc>
		<lastmod>2024-11-15T20:39:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/mends-trends-for-2023/</loc>
		<lastmod>2024-11-15T20:35:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/integrating-dependency-management-into-cloud-services-the-mend-aws-partnership/</loc>
		<lastmod>2024-11-15T20:02:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/a-rash-of-recent-cves-in-go/</loc>
		<lastmod>2024-11-15T19:54:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/blog-image-1-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/cybercriminals-targeted-users-of-packages-with-a-total-of-1-5-billion-weekly-downloads-on-npm/</loc>
		<lastmod>2024-11-15T19:30:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/ixjAOrxZRocHiUtDxjUmzsAGkfO45O9v9pMCeHZdP9UG1B1QARjI_7_qUG7ZKZCrijDbJUebc9YwDr8kiJxr4iL8kP1m4BfRITeHEVSonBZqp4Pmzjpsmsp9J47yxR6Qxq0JmOkffMxtjzaeT1NWxQtgBn_che9i_xR1ZyWDQEsq2AfUZ4owx5m08g.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/eJvlLPZTfVl1FdhgPXPG3F7IK3WEzjpUfqaRSi8q0bdfYV_unQjrbUQu6tdDjqm5o508JcjZl-rmv0_V-IjBDB4Pw-8_LTa-awCfUiisGZcaSD4qDFMXh8xsbJC-NbH1Hue725oDZUKOf5NO_xhDfsayPZj_kKplcKOCdXXXyXx2r1_-Mmt5BPQpEg.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/KYGwFglYovF2dVLxnxciRyb6xpXyljxzuih1Gs6wEStD0AfO78Qwyu3f7UoDGAN_6DHX44HLfdQaT8ilX3n1gWfxPjg2anvnlXPhShjry83QUQT38Hxnpi9R24fOvV2WS97M8hCyviraXfNpvtwFV8OgCY4LDyo8ZVHR14icGNLBOe4E77Ymbu27MQ.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/VG3seLvZgldZneJOnev6TF_DBeA7Qd6H3FaO3-JpOJf2dw3FeM45qZvHG63puTkA4mGl1siVku03fDMlmDKJxKyk34-9faWtZahf_91doK1grcs2ivk1l_Q8nKxoysu8JTS2uiC6sp5ftzK0BSE7CAIsRk6QoQWsiWXYrf4PdIOn2onMFNrZsCBAOg.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/HsaUZ-L0NyU-F_SlGGlG9UyWA_krdwDponURGxYoujSt3uZ7kl1gA7yLkvt_3cISGsZLU70YhmYGmhIEK1A9BO2QFJdyZEjeVkrPmXTtp1zgFryEPezJND7u5XYOUjnf5uLtRdtXfcsH9j7PbHYpUQWCo3sa4IuUOxXU6gwCu5FncB0vzFUxaZGJyg.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/ZkVS6zwrzAgfMR6EqbIry9dcAemvIj_BJ2V52h9YDSDJ9VXJi0qjQ6Q2pGhadM-UvAhTolnUILBijAmyz7D0PbVwBHn3HdmdgPnneBjT5kNZoB3ydAsjzb4DtZ7_qJ7Fw8hdD2TW_JsCUAX1GyX28NFNEkTwsU_FqgY8Mr5QaY3MpFwMMXZqvwZmkA.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/three-big-myths-about-application-testing-with-sast-tools/</loc>
		<lastmod>2024-11-14T22:52:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/new-typosquating-attack-on-npm-package-colors-using-cross-language-technique-explained/</loc>
		<lastmod>2024-11-14T22:32:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/figure-2-1024x577.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/vulnerability-assessment-tools/</loc>
		<lastmod>2024-11-14T22:24:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/samba-vulnerability-cve-2021-44142/</loc>
		<lastmod>2024-11-14T21:49:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/best-practices-for-dealing-with-log4j/</loc>
		<lastmod>2024-11-14T21:34:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/data-flow-of-a-Log4j-attack-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/polkit-pkexec-vulnerability-cve-2021-4034/</loc>
		<lastmod>2024-11-14T21:28:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Screen-Shot-2022-01-27-at-9.37.43.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Screen-Shot-2022-01-27-at-7.59.19-1024x131.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Screen-Shot-2022-01-27-at-7.59.34-1024x165.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Screen-Shot-2022-01-27-at-7.59.46-1024x167.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Screen-Shot-2022-01-27-at-9.37.13.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Screen-Shot-2022-01-27-at-8.00.20-1024x315.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/vulnerability-management-metrics/</loc>
		<lastmod>2024-11-14T21:00:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/prototype-pollution-vulnerabilities/</loc>
		<lastmod>2024-11-14T20:43:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Untitled-1-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Prototype-Pollution-07-1-300x177.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Prototype-Pollution-08-2-300x177.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/patch-management-best-practices/</loc>
		<lastmod>2024-11-14T20:27:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/3l6Vm8Vr-TBsFG5fBCUnj2PQwmWGAA8vWU0YuUEAggmyOtyuvq7Or1xU4ijw0DBMUDmzFs2KNAeE_55N1NGeIImOz0IdN6eQjWCq44AS88_76IGYtbUy_PuQf7z-zb9YVZp5wHriV6VE1g9PoQ.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/maven-security-vulnerability-cve-2021-26291/</loc>
		<lastmod>2024-11-14T20:20:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Maven-Vulnerability-g-01-2-300x150.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/apache-struts-vs-spring-vulnerabilities/</loc>
		<lastmod>2024-11-14T20:04:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/05/1.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/05/4-1.svg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/reducing-enterprise-appsec-risks/</loc>
		<lastmod>2024-11-14T20:00:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2026/05/CRN_Women_Channel_1000x650-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/how-to-secure-your-sdlc/</loc>
		<lastmod>2024-11-14T19:55:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/New-blog-image-how-to-secure-your-sdlc.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/welcome-to-whitesource-diffend/</loc>
		<lastmod>2024-11-14T19:48:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/lw8xznx7n_2zqvJMwrbUJAqpSy02Rv1Y0Hd05D_GVnH8Qh9oKvuNmuuzU6DTE1LflVdYrQIuje6l-ZINLu-URkNd-oyAnQUNJqpoTOjC_9XhHDYy3PH-VR-ExR6LlQSNWQrC0u3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/best-coding-easter-eggs/</loc>
		<lastmod>2024-11-14T19:44:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Robinnetts-Easter-egg-in-Atari-2600s-Adventure.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/The-image-of-a-heart-modeled-according-to-the-sqrt-coordinates-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Search-results-for-Once-in-a-Blue-Moon-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Search-results-for-askew.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/A-verse-from-The-Book-of-Mozilla.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Firefox-search-results-from-about-robots.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/A-unicorn-appears-in-the-Mozilla-Menu-once-all-buttons-are-removed.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Space-Invaders-Easter-egg-in-Open-Office-Calc.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/alert-fatigue/</loc>
		<lastmod>2024-11-14T19:35:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/XCUWcYPI_8IrAPGUo8RFNvKIoZ-Erlm7G2IfmZ-9HJRsgmUzRywIUy9EuNT68hQaKg07xmiaUnbScfGVFtYUSThYBuRGWIBYVoN2_hgQX4hDCK5VjLedNZH5mAcFumBncGnAVp2c.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/pci-software-security-framework-explained/</loc>
		<lastmod>2024-11-14T19:33:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/renovating-with-renovate/</loc>
		<lastmod>2024-11-14T19:28:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/BjIskKJMGD-UCCxAP9TncxGYbk5E_KtK5XxtUm_0nZDbXuXx3vsRsukuBYBHVDk5H7eYK3WMiipHFP9d6FwgBLinrQXrDBn3GJk-GufZroGOcr1b4t9TaaGAg_yIpFvnmJgV0tXT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Mf0aJP7R9wvKdM1KIuMqVV7tOhXmLpPMFbz1B1fzRIxBcgtYNGM00tmw7xASAMPZzntRjiDqchDm0Lu0VV9dzDKk6iD-Eoqu9LZmV4VWgYyM7hujvv6mVhirF3zr7Nw_zTMVaw4L.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/serverless-security/</loc>
		<lastmod>2024-11-14T19:23:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/iot-application-security/</loc>
		<lastmod>2024-11-08T23:12:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/may-open-source-security-vulnerabilities-snapshot/</loc>
		<lastmod>2024-11-08T22:59:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVlYjM5ZDZlNGNmZGYucG5nJnZlcnNpb249MDAwMCZzaWc9YTIwMmQ1NzE3ZWEzZmVmYTIyZDQ3ZWY2YTJmMGNjODk.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVlYjM5ZGEwNjE3YTIucG5nJnZlcnNpb249MDAwMCZzaWc9YjVlYjE0ZmZlNTBiNTlkMTQ3NGU1MTYwYTIwNzAwN2Y.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVlYjM5ZGRiNTliOTcucG5nJnZlcnNpb249MDAwMCZzaWc9YzhmOWY2Y2UxZjI0NjlhOTY2ODU1YThlYjYyNzc3MDI.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVlYjM5ZTU1NzAyZDYucG5nJnZlcnNpb249MDAwMCZzaWc9MjIwZGU2NTkyYWFmZmQ1NTI1NmY4YmExNTE0MmZkYjA.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/forresters-state-of-application-security-2020-key-takeaways/</loc>
		<lastmod>2024-11-08T22:55:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVlY2U2NWE0N2IwMTAuUE5HJnZlcnNpb249MDAwMCZzaWc9ZTVkMTEyNTkyZmI4MTQ5MjJiMDBiMGVlOGUzNTBlNGU.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/open-source-analysis/</loc>
		<lastmod>2024-11-08T22:52:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVlOTgzYTY5MDNkZTMuUE5HJnZlcnNpb249MDAwMCZzaWc9MjE5ZTU5ZmMzZmNlOWU1Mzg3YzM4NzI3YTg3NjlkZGI.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/how-to-balance-security-and-agile-dev/</loc>
		<lastmod>2024-11-08T22:43:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/top-zoom-backgrounds-we-love-for-april-1st/</loc>
		<lastmod>2024-11-08T22:39:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVlODRmYWJjNmM3NjMuanBnJnZlcnNpb249MDAwMCZzaWc9OWZmMGQwZTdjMWExYTYwMzUxMDI3NjBiNDEyNmI5NjA.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVlODRmYjQwM2NiNWYuanBnJnZlcnNpb249MDAwMCZzaWc9YjgxYTkyNDhiYTA1NGRiNDFhNmVmZTUxMTgyMmNkYTk.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVlODRmYjk1ODI0YzguanBnJnZlcnNpb249MDAwMCZzaWc9NTA4NjVjMjdjYTUzNTk1NzNiNTUwZTNmZjhmZDUwMzE.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVlODRmYzE1NTg4ODgucG5nJnZlcnNpb249MDAwMCZzaWc9MTc1ZThkZmI1NjMzYjM2Nzc0ZWY0MTBlMmIyNTA1OTM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVlODRmYzUzOGY1YjkuanBnJnZlcnNpb249MDAwMCZzaWc9ZDg0MmU2MjBiNzdhYjZlNmMzYmQwYzk3MDhhMzAxMjk.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVlODRmY2U0N2VkOWYuanBlZyZ2ZXJzaW9uPTAwMDAmc2lnPTVmNzNjYmI0MTQ4YjRmZDFiMzYyZGE1YjFhNWExMWU4.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/openssh-security-updates-v82/</loc>
		<lastmod>2024-11-08T22:29:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/NMC-MTgwZ5B5TPstQsK45g4vYJg5VRbtWRTqZvQE0SHZ5Ny4t2Bsy0O3WHTIS71vXOL0QxMczUaYtNtaZ2tvgUUaoYRHLQxtjzptJGN68xHQHD8PPcNKrzTzj1H0hD_J-GG5yKWj.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/open-source-licenses-trends-and-predictions-2020/</loc>
		<lastmod>2024-11-08T22:24:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVlMjg3ZjdkYmJmMWMuanBnJnZlcnNpb249MDAwMCZzaWc9MTMwOGQ5NzczZjg5Y2I4ZTc5YzY2NWI4MmIxNmJmNDY.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVlMjg3ZWNlZGRjM2EuanBnJnZlcnNpb249MDAwMCZzaWc9NWU3MjA5YzM5NWFlNzAxMzllYzQ2MDA3NDFjNTE2Yzk.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVlMjg4MDQ0MWYyMjYuanBnJnZlcnNpb249MDAwMCZzaWc9OTJhZGJiYzg1MTM2ZTk5YmVmMzM5ZDY0ZmI0OTZjYTc.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVlMjg4NjBhN2IzYTAucG5nJnZlcnNpb249MDAwMCZzaWc9MmRiZmQ4MGMwOTIwYzRlMjEzY2M2YWY2YjU5OTZhOTQ.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/whitesource-for-developers-gitlab-server-eclipse-launch-blog/</loc>
		<lastmod>2024-11-08T22:10:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/top-5-open-source-vulnerabilities-for-may-2019/</loc>
		<lastmod>2024-11-08T22:08:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/cyberark-s-whitehat-hacker/</loc>
		<lastmod>2024-11-08T21:53:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2019/02/len-noe-pic.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/how-the-heartbleed-vulnerability-shaped-openssl/</loc>
		<lastmod>2024-11-08T21:45:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVjMmI2NzkzNzkyZDQucG5nJnZlcnNpb249MDAwMCZzaWc9ZGM4M2FiNDc5ZWJhYTcwNWQxNGZiM2I4NmMzZGMyZDI.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/sweetalert2-open-source-project-of-the-month-january-2019/</loc>
		<lastmod>2024-11-08T21:41:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/the-national-vulnerability-database-explained/</loc>
		<lastmod>2024-11-08T21:36:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Prr6pv-Xgi2oDBOhqFTWVjroW7iL3jtS2Gi7WJP-nqkEC0-kJlz5dGGzqXNe6dcne6tUE6_NsC-uMIjgl6Q6dgF0jS1Gt9IYrlkxFJmGUlHz9YNdzh_1og01Cr1u_8_4FWxHNLB7.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/open-source-vulnerability-databases/</loc>
		<lastmod>2024-11-08T21:35:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/open-source-projects-for-starting-developers/</loc>
		<lastmod>2024-11-08T21:25:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/7-chinese-open-source-projects-you-should-know-about/</loc>
		<lastmod>2024-11-08T21:21:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/known-open-source-vulnerabilities-in-reusable-software-components/</loc>
		<lastmod>2024-11-08T21:01:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/open-source-license-trends-2017-vs-2016/</loc>
		<lastmod>2024-11-08T20:51:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVhY2UxOWU3MTM1M2IucG5nJnZlcnNpb249MDAwMCZzaWc9NGFmYmQ2ZmJhYjZlYTFhMWFmZGNkMjNjY2I2MjQ4NzE.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVhY2UxMDU1NjdhMjAucG5nJnZlcnNpb249MDAwMCZzaWc9MTcyNzA5N2NlOTcwMzJhNWJlNTY3YmE1YjU1ODhiNWM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVhY2UyMmVjMWI4MzQucG5nJnZlcnNpb249MDAwMCZzaWc9Nzc5ODYyNjJhNTM2MTc5NGVjMzcyN2FkZGU0OTBmNWU.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/the-equifax-hack-6-months-later-what-did-we-learn/</loc>
		<lastmod>2024-11-08T20:44:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/top-5-developer-jokes-explained/</loc>
		<lastmod>2024-11-08T20:38:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/top-3-challenges-to-fintech-in-a-post-equifax-world/</loc>
		<lastmod>2024-11-08T20:36:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/top-new-open-source-vulnerabilities-in-march/</loc>
		<lastmod>2024-11-08T20:33:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/bug-bounty-programs/</loc>
		<lastmod>2024-11-08T20:27:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/top-10-open-source-software-licenses-of-2016-and-key-trends/</loc>
		<lastmod>2024-11-08T20:22:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/PERMISSIVE-VS-COPYLEFT-LICENSES-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Permissive-Vs-Copyleft-2-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/apache-struts-cve-2017-5638/</loc>
		<lastmod>2024-11-08T20:19:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Apache-Struts-Vulnerbailty.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/7-factors-developers-should-consider-before-choosing-an-open-source-project/</loc>
		<lastmod>2024-11-08T20:12:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/top-10-resources-for-exploring-the-world-of-open-source/</loc>
		<lastmod>2024-11-08T20:09:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/4-software-development-challenges-every-enterprise-is-facing/</loc>
		<lastmod>2024-11-08T20:06:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/the-open-source-revolution/</loc>
		<lastmod>2024-11-08T20:03:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/sourceforge-logo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Git-Logo-1788C-e1455110212271.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/github_XS.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/stackoverflow_logo-e1455110970639.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/open-source-software-in-mergers-and-acquisitions/</loc>
		<lastmod>2024-11-08T18:35:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/application-lifecycle-management-5-pitfalls-to-avoid/</loc>
		<lastmod>2024-11-08T18:31:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/the-vmware-open-source-lawsuit-and-what-it-means-for-you/</loc>
		<lastmod>2024-11-08T18:24:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/top-3-open-source-risks-and-how-to-beat-them/</loc>
		<lastmod>2024-11-08T18:16:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/risk-management-of-code/</loc>
		<lastmod>2024-11-08T18:12:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/are-all-bugs-shallow-questioning-linus-s-law/</loc>
		<lastmod>2024-11-08T18:00:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/3-reasons-why-open-source-is-safer-than-commercial-software/</loc>
		<lastmod>2024-11-08T17:57:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/npm-security/</loc>
		<lastmod>2024-11-08T17:13:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVkZjYwYWRjODEwN2UuUE5HJnZlcnNpb249MDAwMCZzaWc9MmI5NzJhMmIxZmNhOTExM2JhZDUzNjE4MjhiZjM2Yzg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/when-to-consider-a-nosql-vs-relational-database/</loc>
		<lastmod>2024-11-08T17:06:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/teaching-programming-to-kids/</loc>
		<lastmod>2024-11-08T15:40:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/a-guide-to-open-source-software/</loc>
		<lastmod>2024-11-08T15:32:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Content-image_-A-quick-Guide-to-Open-Source-software.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Content-image_-A-quick-Guide-to-Open-Source-software-1.svg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/the-8-startup-due-diligence-dos/</loc>
		<lastmod>2024-11-08T15:19:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/open-source-vs-proprietary-code-security/</loc>
		<lastmod>2024-11-08T15:07:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/how-to-use-dependency-injection-in-java-tutorial-with-examples/</loc>
		<lastmod>2024-10-31T21:53:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/closing-the-loop-on-python-circular-import-issue/</loc>
		<lastmod>2024-10-31T21:52:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/python-import-mastering-the-advanced-features/</loc>
		<lastmod>2024-10-31T21:50:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/update-docker-images-and-containers-to-the-latest-version-easily-and-quickly/</loc>
		<lastmod>2024-10-31T21:49:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/media/2020/11/Using-docker-images-or-docker-image-ls-command-to-see-a-list-of-images-on-system.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/media/2020/11/Output-of-running-docker-inspect-command-to-check-image-version.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/media/2020/11/Using-docker-ps-a-command-to-see-a-list-of-containers-on-system.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/media/2020/11/Using-docker-stop-command-to-stop-a-container.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/media/2020/11/Using-docker-rm-command-to-remove-a-container.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/media/2020/11/Using-docker-rmi-command-to-remove-an-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/media/2020/11/Docker-Hub-screenshot-showing-mysql-version.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/media/2020/11/Using-docker-pull-command-to-download-an-image-from-Docker-Hub.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/media/2020/11/Undertaking-Docker-update-container-task-based-on-an-upgraded-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/media/2020/11/Checking-the-success-of-Docker-update-image-tasks-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/how-to-update-node-js-to-latest-version/</loc>
		<lastmod>2024-10-31T21:47:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/media/2020/08/node-js-linux.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/media/2020/08/node-js-mac-windows.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/reinstall-npm-node-js/</loc>
		<lastmod>2024-10-31T21:44:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/media/2020/09/12121.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/equifax-breach-year-in-review/</loc>
		<lastmod>2024-10-30T20:00:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/creating-your-open-source-policy-template/</loc>
		<lastmod>2024-10-30T19:37:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/next-gen-vulnerability-assessment-aws-bedrock-claude-in-cve-data-classification/</loc>
		<lastmod>2024-10-30T18:47:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/unstructured-data-1.png.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/claude-responses.png.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/auto-remediation-whitesource-cure/</loc>
		<lastmod>2024-10-30T16:12:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/overcoming-dockers-mutable-image-tags/</loc>
		<lastmod>2024-10-24T16:20:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2018/03/image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2018/03/image-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2018/03/image-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2018/03/image-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2018/03/image-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2018/03/image-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2018/03/image-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2018/03/image-7.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/new-feature-github-vulnerability-alerts/</loc>
		<lastmod>2024-10-24T16:09:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/automated-dependency-updates-for-kubernetes-manifests/</loc>
		<lastmod>2024-10-24T16:08:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/automating-circleci-orb-updates/</loc>
		<lastmod>2024-10-24T16:04:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/automatically-update-cdnjs-dependencies/</loc>
		<lastmod>2024-10-24T15:54:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/media/2020/03/1-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/media/2020/03/3-6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/yarn-update/</loc>
		<lastmod>2024-10-24T15:51:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/npm-vs-yarn-which-should-you-choose/</loc>
		<lastmod>2024-10-24T15:06:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2020/08/image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2020/08/image-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2020/08/image-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2020/08/image-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2020/08/image-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2020/08/image-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2020/08/image-9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2020/08/image-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2020/08/image-11.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/is-one-programming-language-more-secure/</loc>
		<lastmod>2024-10-23T19:34:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/hUO9Q0RhH-HzFSuSDPNzM35cvvynqF9vJujmlxf2263Wwm9nT8Jiq53yzytGlEWcFxWyvydg-Do63v-Qe4crd2LWJQiZwLwy5F9PVfxlKQvsevF72plzg42IMAMJrF8XspV9jgRS.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/BaJfx8nIyIgsdK3IlBjQA1TxuU2nQyj0rh5CdytrBEkV4ojFH_m-eaRC6hOHqsBYOdu0QFIXbfIz6X1YdUz5xUtb9SIBTpWfQVISF34Aif_9FCOyZJbg5eIWA_SQg7Epcrwm80A.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/lAlrNbsU3KhWVNjtM4lL04fPpRRdXSQhRZl0q6XMFlojmp1tx4INXMBhirAX26Iv2TDo-ofE9wRf3STadAPe9G5qsFfT5lHNpXDh16fgVHgRDO1i8Nt36tlHbkzd6Ntq-fU8uj6h.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/npm-audit/</loc>
		<lastmod>2024-10-21T21:36:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/media/2020/08/1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2020/08/npm-audit-security-report.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2020/08/npm-audit-fix.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2020/08/npm-audit-fix-subcommand.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/media/2020/08/5-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/golang-dependency-management/</loc>
		<lastmod>2024-10-21T21:28:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/docker-images-vs-docker-containers-a-detailed-comparison/</loc>
		<lastmod>2024-10-21T21:16:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2020/12/bash-image-from-Docker-Hub.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2020/12/view-Docker-image-details.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2020/12/view-layers-of-downloaded-docker-image.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2020/12/launch-container-based-on-latest-version.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2020/12/docker-ps-command.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2020/12/docker-images-in-containers.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2020/12/docker-container-ids.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2020/12/docker-image-and-container-differences.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/azure-devops-security-checklist/</loc>
		<lastmod>2024-10-21T20:47:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/media/2021/02/image13.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/media/2021/02/image7-1024x454.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/media/2021/02/image6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/media/2021/02/image9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/media/2021/02/image8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/media/2021/02/image11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/media/2021/02/image10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/media/2021/02/image5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/media/2021/02/image12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/media/2021/02/image9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/media/2021/02/image14.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/media/2021/02/image15.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/media/2021/02/image16.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/media/2021/02/image17.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/media/2021/02/image18.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/media/2021/02/image19.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/media/2021/02/image20-1024x564.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/media/2021/02/image21.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/media/2021/02/image22.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/media/2021/02/image23.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/media/2021/02/image1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/media/2021/02/image2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/media/2021/02/image3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/media/2021/02/image4-1024x462.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/azure-static-web-apps/</loc>
		<lastmod>2024-10-21T19:54:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2021/07/sample-visual-code-web-page.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2021/07/azure-static-web-app.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2021/07/Azure-sign-in-with-github.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2021/07/azure-github-repo-branch.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2021/07/azure-github-build.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2021/07/review-and-create-azure-github-deployment.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2021/07/GitHub-azure-workflow.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2021/07/image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2021/07/azure-full-emulation-architecture.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/azure-functions-static-web-apps/</loc>
		<lastmod>2024-10-21T19:52:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2021/08/azure-storage-account.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2021/08/azure-table.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2021/08/azure-connection-string.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2021/08/azure-http-function.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2021/08/azure-typescript.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2021/08/azure-storage-explorer.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2021/08/azure-web-interface.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/typosquatting-malware-found-in-composer-repository/</loc>
		<lastmod>2024-10-18T14:26:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/improving-your-zero-day-readiness-in-javascript/</loc>
		<lastmod>2024-10-17T22:16:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/how-to-manage-secrets-in-kubernetes/</loc>
		<lastmod>2024-10-17T21:59:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/idempotency-the-microservices-architects-shield-against-chaos/</loc>
		<lastmod>2024-10-17T21:54:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/what-is-ldap-injection-types-examples-and-how-to-prevent-it/</loc>
		<lastmod>2024-10-17T21:47:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/9-expert-appsec-predictions-for-2020/</loc>
		<lastmod>2024-10-02T20:26:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/3gJ-oz90b0GdeV0JrfUH4uAG7jcdFNlFfidTGAmFm2sORcT-7NaTA2Ur2_5tLfj658WZ3hyi11mOScfkcK403nslz88GTrzI361yjRYREeHlXIx0R7Yqp58KuNRZGQzxzPQOrj-Q.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/izar-tarandach.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/gleb-bahmutov.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/hnrISKH7oRIg4DQfQaiceYqqTAJogJnt_ZVtBtpwncjAx-lBcxT8KyxjvDWkxDYe7W2S8zwVzbW5SxlR73jLKkukqxLJ-1iauhsCTTYFTqSRWwHmvn34Htlf14Gcp6i8fOVFk6vc.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVlNjdhY2YzNjcwMDcuanBnJnZlcnNpb249MDAwMCZzaWc9OWUzYTA3ODY1M2Y1YzljOGUzODA3Yjg2YjQyMzEwNGM.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/daniel-ruf.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/prashant-kumar.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/ralph-framke.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/stack-overflow-developer-survey/</loc>
		<lastmod>2024-10-02T20:00:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/boKcOP8uFzTkatCUvuPYAzwzLV1FfTo26HhalARuHY2DOh0B8JbECHEiI5l2viNi-DA5Mf7dyMy1yFsgCeIuajaAs5dyU1ONuomDjOEIJy5LlsgYEdtD-Otv014hy1N_vD4CCG8h.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/p7QKe-nmnwLz7tWn9QF41yLjjDQIEvuUsifYVtnfEWoBrJWFLCWgNuZblDHr91HjlzC1iZYlwFoOTLooRtOJGxHc3I0sEmG7PP4LLIAWiT9wg77VqsKBKSiK3Pvpyz6yfiqkS0n8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/7brGZjnFdXuKvWy_y7X5GmfonD2QvqI4TkqRrZ_9-liu6YcRnFWrrstm41RoFyXuBBk5DaEX3OSgYreC_DeBjVEPbZ-yCq_V7GVORKTGZ8cPVsdyYkWzDLoqmT3BvciZ6ylluCqw.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/UDx_V38IxvlSrhGoTNHNoCCiIb6j4quhns7Z5_PR9RC_hwGOTbjPNWtqmrdk5X8TgWz045Laf_ioCbblVQyYYhweJVYMLjONNtZ3wmtKEote9wF80fZZZgtv82_hXSkOOe8cOJom.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/wqPVmfjCudBb3GB9UBbeREuK9qy6YIMjAHcfLEk5qQtQ17P-DNiYOoh-Flc0g8M92L42gPFGDq0-zvWOEm1hLJn0i2OHsfRIFU-OBNsMLzqibngsRHVso6nH0fvW7YoGp790jvks.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/jPAjozgRfwbjY9lBYlh-ZuYrUOg5baoPjyb7EW9-PBnVliLBqsWAVLVH4z9rYJu8oJq8W46IZ2PWD0m4m9MW-mnQyP2nHOKDlVw7zSAeorsVY06d-up0rTXZSzqRq8qmA_kzLExJ.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Qa-dfZv6foxB_tTfSCX0lrNzvSFPtDNQPA1sjFCslvmoft9TP1SCnREmlsHeCW9to8hPHGo6dZH1Ra4P18PAHTzxhsV5IJchHwPVmbn0omZVHuwTivQU7Mn_wtj5v1g3s8_ezYnI.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/key-considerations-for-open-source-strategy/</loc>
		<lastmod>2024-10-02T19:28:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/technical-due-diligence/</loc>
		<lastmod>2024-09-10T17:18:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/next-generation-sast/</loc>
		<lastmod>2024-09-05T23:24:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/seven-devsecops-best-practices-challenges-and-how-to-address-them/</loc>
		<lastmod>2024-09-05T23:09:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/open-source-vulnerability-scanner/</loc>
		<lastmod>2024-09-05T22:39:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/how-to-fix-vulnerable-npm-packages/</loc>
		<lastmod>2024-09-03T23:01:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/preventing-sql-injections-with-python/</loc>
		<lastmod>2024-09-03T22:51:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/asynchronous-programming-in-python-understanding-the-essentials/</loc>
		<lastmod>2024-09-03T22:49:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/vulnerability-remediation-a-practical-guide/</loc>
		<lastmod>2024-09-03T22:36:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/cloud-computing-security/</loc>
		<lastmod>2024-09-03T22:09:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/what-threatens-kubernetes-security-and-what-can-you-do-about-it/</loc>
		<lastmod>2024-09-03T21:37:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/blog1-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/top-10-weirdest-names-for-open-source-projects/</loc>
		<lastmod>2024-08-27T21:01:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/misra-and-iso-26262-compliance-is-key-to-security/</loc>
		<lastmod>2024-08-27T20:52:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/ten-women-in-tech-who-changed-our-world/</loc>
		<lastmod>2024-08-27T20:42:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/9s3ZznCzs2leOpirv43voUYRpnIScOX7dFlUuOK5GEyu90hs75HtFiYNwbEGaHXvyhCdWoCPfhdbyPSVL_PoTWapLYzrMLKr6wPsCvJYIzfty_CnYgsxvVglYyYp0h-bj-hBRX1fK-vKaLAC6hfhuio.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/1_IrzzgDDQ-noAV0IkOhxftXC4Zsm4ayW-kBM0dQ7Ur_sc04-qqsKHiT1TBZHOpt0_LlTnroO4qSWFNukWOSdYWP3xuZaTyXKl-EQXAZaRiDsUDUZhXS212g8ArutsdxePFk4ZQdk2xJr0RIKOMjOHI.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/IJUDslt_JqXbudQxk-8ly6MXn_6WQdezaXnNI1u2njr5SzN_LSJ_7eluvzQ7QKM9mT5rVW6_HlRoL9PypNys5jNXuqekJHsHzOoCr7zS74KyZmBO5PLqBFBEvfjDqQtwtXefCDbP8sDicTFA8Uxc1eg.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/4p7ketj526wlRKASMVDhIrbI0fDDdp0DVUPb81l6GEVTCEi9ljEWL1bSOJVZ3QMLqw24Npc1UmYBdBrJsrUPo8o9rgCSy-N0C0K3FEwaagDUuleyxkz-8VAOuwNbIE4TsyjiwthOHE0CH0q8QAPOgIs.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/JANCLVRuIYCrm743vxjh_vy8QmPi0yBs9S9OeMRzXdzxdWrcsbFFT6K3NKaTzgcSwr10uX1SooOwUrckf4PYdmEh-462LJbJqiGCTmXejJpFS0ENTlReWO19PSMzSJo80HocCJG9YkdR9Sle3aIQEUY.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/nlsjG-JpFAQkv5HNhNSumaFnnnewew44ETBTjFs_VoqMXP-aASqzA3qTsTCiOgyFgFe2TbbiJ7OQjMLmGXkxqIRVTWaKnjIFRvHrYoyVSU1Rz2R008UAaWslMkzqjiviXfkiIGZplCsY-3pkBgujpsk.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/A-wbeYIgTpqwAGxkeMpeF6fsedsMDgDyiNOnN0SIQ8RsxyTzN16CsbF5gDc_3dEZpOvMix1rBx4MHno5PeAi_ac8cqZ2cqpTb0UOZ4WUHZNARzj9BwnrB49gYeth7s8N80His-KxvJvCTZrmNePmj_E.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/GAcJwmfgPiUXdyOVTKiWhGpb2YDldZUk5E2Y-kxEldcZWWDTEd4ewWcu3CZgVAzKpZv77QTsGO-v2X3Ck_56gEBuptZwBKzDl3M1-taW46BLNK2nGZjy9MQ7-w8W_9tGEHLLluMXt_2tt3P-DCR_Ewo.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Xy5kgicGseej2J9Smb5OWBxzGqhIYrXeImt7Zjv96dLI4e95x_9EHj-PaA431qxMcKfDicyR0ld-xKwNrKTtYY_dayw79irVqiP_t9K9UrW7UwFQgHRgOQRRzwaIpdfJmyr_Q3dBxkp748Od7QsGIwQ.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/xLmeG12U-m92NIVFAAIewfqEcW4Xv6vU8DvrTivVw38aJzqXGL5zTvcNTk2FkSYDnsniXXI1Rg_KcwN6uczkkvNO4IcAfYBgoDYLFucSRxq9ucjKAsU8UB54Ra2betcwLZAxQrb_uOl3TytIciq6rhY.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/how-do-fintech-firms-handle-vulnerabilties-like-spring4shell/</loc>
		<lastmod>2024-08-27T20:21:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/whats-the-state-of-open-source-in-financial-services/</loc>
		<lastmod>2024-08-27T20:19:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/leveraging-ai-for-open-source-management/</loc>
		<lastmod>2024-08-27T19:38:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/top-5-go-vulnerabilities/</loc>
		<lastmod>2024-08-27T18:41:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/spring4shell-what-to-expect-and-how-to-prepare/</loc>
		<lastmod>2024-08-27T18:30:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/automating-go-module-dependency-updates/</loc>
		<lastmod>2024-08-27T17:45:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/16-women-paving-the-way-in-appsec/</loc>
		<lastmod>2024-08-23T20:42:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/hvlVErsB5iEFonTBs8WfxP112cdl3-v4JqBae-_d6hgIMFbugmzq1ixafzenW7VcZiyf0uW-UQ9-A8K1z89nr5dOIZHqb-xsM-5GgG1afsQlSZnxL_VhZzFfsXwOyPnub8vVEpip.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/JuT4z0A778H26GEf71FQ4dCBpeoykvAbP4iF61jguGLa4FqnJMDLYhytbkr-96rmVO506BZrCKne6l_q0YhSFRelX4wSG1nOLwQRDrNrOtWLmS-5cG2eRJrQD5W5DC5fedslXDTp.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Hrmff3X2VIQrZxYf_lSFqpC9Y3D5X45bnSHCYuR0UnW8krKhMF4nhXbi-OsTgig2rTjD9Hidp46ylgJ2wn4spEsPIkVCaIiO6gVEm_BpqqWTDnZwnmgPAnVIDVZUuRO9EfzcCigj.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aKD6QOv4Qbd5mqTug6bp2NWEvtktQjhZM0amu5xkUL6UATjrYRtpe_oUUiPniSNFjOSQ_dP8pSkH-nQJxnZRGzf-Z9HqsZ5hSHMNNIYvf1c4mr7zgsvftOLFjlHbEnQpt38vROo.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/7Udwhx2h39D2ByTjIMNcBvY5HOxnRc-bcZwBcxx8D82GqJXMRJ2FBGvxbtDv6v-QW1CqFAJ6bOACDQX7suyQoA65fdwNpNO1EngAlvSLCxoxCfcpDEnGcdGWFA1zTL9L7IBA1K3F.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/6UA3MLemhbhpyh-sdy6Yw4SNWU-S0lVX_xpw3__ifAgVVmbTv2fz3cggQn1WaduQfxiXnJX_yWYsz0pmKSn_jG8PrqMBj1Ph9QG-BntdHqzNqYZdKai0al1geP2x9oRjXAWlO1V6.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/kbOEDBjJ_mJEIvZF8xEcplrcqL02o1m8KTVGzrbSfKDuLUdKPjsJLooaO8cc2MqnGPP2eGkGLrj8ljqt9Ra65AlTotCOSL3s5_3Z6OURKQs9B-W_p2VYVgbSuNN7oSE1zcM8ZhIV.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/dV2SB2rJPeRhJmicq9UQp7ypOGRdIEXozANomGutWQtFNeI2UmPvxgQCeCS5Vi-s0zUNfsV59X17404dYD0k9VRfxg5XXEvCDXRdb_1v07WH9hBc-9vpBWNNEBZt5EkR0kMTLm8L.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/pX-qKG3_fFfYaF6v4KBFyCivHKH7t_uUDvk3BezCUA1PkQ6OrkNvyCC13hlKdhC_-vqDcJOL3iNbs45SyKENFB_m4tEN7enfQJcE-Iq8Nko_oRdpYGsy6TmWYjbY_4B_2AX4eI88.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/vEbX5OFxsFERa3lCNO9WgZJ88yNfvUHiBpdYmnmGOa790GQXY5DymUutae-FebKO1Kktc2_3v5Z4u3D2UPB35Y4oH3quBVyEv5EQJUXAgkArQfwVkFq8hX2iTxmIDzDhK7ZZjSzG.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/xa7jOG7gJNL2ywJbYdsTiZnbAXqKR0XywODbR3PRxlQKK7Jv-jVkgzp5fmxluvbfEIRPYja6Kbvcz8a3drts7G2LZzEzs6iuRr98s_OZVA8BFgPatkHHrTSqKQTrjqfkIVW_wT8a.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/eWvCTq93nj7qXFXFQ_3aV5ja3T_Vdh9X58Ww5oMngj3XUTjj1plQL7hg2mGl_Yshe1Y6rhnlBIYN_aG3pFq6V-FjaLbSBA8hyt6Cxon1lNsShvz9QmnLdtHEzJipjHCuMphLZkao.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/kVlrezXjxHptjc6RpkLdq7x2q-CEPNbCagyF0rFUdwDeGwCA-2x3RlMcu5RVvumJ4GQXm_WOU3snIcOS5vzw1UZA-AdPRhlCHlX766-KuBDn_I4_4QAR0SdKLujP6BK5BnvEtiA9.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/lWVftkUcXrs3r6rNLp55EAQK-ml2crzwbRv8_BqWDdVdb0QVgBpFgSZ_HMMHCH-PzAK3Tx9INugJj3uA5grAflLD5vnkdHMNp5ZXwaPO8zubhqwNkbjtITfVk-j70qMKRuz579_V.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/UEPx84j6lO2hUIrR0yZBFCSjrBmxkFLvO3uorDqSwQe3LJ7PulPJeUmXsi_20ZXHpvx0YNYPr7eLb75tVtuXHrZ41OcU9sHO_BrE2so5U4qQ6Wsu91Vj1HvqKdmbXJy1bAGjvddr.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/FEp7VX-H8NIMKgGSGNe8VQm1Klt0ZrCB9EzITrObgkYtZfmeUuK4QGLqxOIzRjrgZ3tYPNO6VCg41EvA87VeBNERjSp1mG3Nd-CRuA-z72ugVlNUt_Tco6eoelaxXhV_86hLFTMo.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/developer-security-champions/</loc>
		<lastmod>2024-08-23T19:50:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/IUraiBifbL3zX4XyT9NSS7Y8_muKddpG6UyKQyc8RJMs3c7k5-sDp5eScbaD1NQf1lMlFOVlOpwERYYdJnYkiHCMoTj4yFX50eV_i2nPbJstHJQ9GvIFDPE3A0k6ce3GRzEI2KMG.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/vulnerability-disclosure-find-the-bugs-in-your-code-before-the-hackers-do/</loc>
		<lastmod>2024-08-23T19:45:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/cloud-native-applications-and-managing-their-dependencies/</loc>
		<lastmod>2024-08-23T19:35:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/log4shell-vulnerability-in-ruby-applications/</loc>
		<lastmod>2024-08-23T17:16:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/code.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/updating-npm-packages/</loc>
		<lastmod>2024-08-23T17:08:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/iot-security/</loc>
		<lastmod>2024-08-23T17:03:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzYwNTI1NDBiYmJjYWIucG5nJnZlcnNpb249MDAwMCZzaWc9N2UyOTM5OWQ5MzgwMTMzZDU5ZDBhZDAzNWIyZTE2MWU.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/the-top-6-most-vulnerable-open-source-projects/</loc>
		<lastmod>2024-08-23T16:13:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/top6-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/from-open-source-code-scanner-to-software-composition-analysis-tool/</loc>
		<lastmod>2024-08-23T16:04:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVjZDJhN2ExNjQ3ZTEuanBnJnZlcnNpb249MDAwMCZzaWc9NDg2NTUwZmFhODhhY2IxODFjZDNjYzQwMjJiOWQ4ZTk.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/white-hat-hacking/</loc>
		<lastmod>2024-08-23T15:51:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/spring4shell-vulnerability/</loc>
		<lastmod>2024-08-23T15:39:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/renovate-is-now-available-on-github-marketplace/</loc>
		<lastmod>2024-08-20T03:17:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/automated-dependency-updates-for-bitbucket-cloud/</loc>
		<lastmod>2024-08-20T03:14:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/ruby-bundler-support-in-renovate/</loc>
		<lastmod>2024-08-20T03:09:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/introducing-renovates-master-issue/</loc>
		<lastmod>2024-08-20T03:09:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/renovate-is-now-part-of-mend/</loc>
		<lastmod>2024-08-20T03:08:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/top-3-open-source-risks-and-how-to-overcome-them/</loc>
		<lastmod>2024-08-20T02:48:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/go-modules-vulnerability-disclosure/</loc>
		<lastmod>2024-08-20T02:05:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/security-license-compliance-azure-devops-pipelines/</loc>
		<lastmod>2024-08-20T02:03:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/black-hat-2024-ai-ai-and-everything-else/</loc>
		<lastmod>2024-08-16T21:16:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/08/blackhat24-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/08/blackhat24-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/08/blackhat24-3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/continuous-integration-vs-deployment-vs-delivery/</loc>
		<lastmod>2024-08-16T15:15:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/devsecops-agile-environment/</loc>
		<lastmod>2024-08-15T17:23:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/automated-software-supply-chain-attacks-should-you-be-worried/</loc>
		<lastmod>2024-08-15T17:21:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Screen-Shot-2022-04-03-at-10.51.52.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/5-open-source-vulnerabilities-top-5-projects-of-2018/</loc>
		<lastmod>2024-07-30T18:48:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/shift-left-testing/</loc>
		<lastmod>2024-07-26T21:56:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/blog1-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/why-is-cybersecurity-now-a-global-governmental-concern/</loc>
		<lastmod>2024-07-26T20:36:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/warning-poor-application-security-health-could-kill-you/</loc>
		<lastmod>2024-07-26T20:31:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/optimizing-appsec-by-enhancing-integration-with-jira/</loc>
		<lastmod>2024-07-26T20:30:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/why-open-source-license-management-matters/</loc>
		<lastmod>2024-07-26T20:29:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/to-use-rest_client-or-to-use-rest-client-that-is-the-question/</loc>
		<lastmod>2024-07-26T20:20:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/blog-RubyGemsOct1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/blog-RubyGemsOct2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/whitesource-is-now-mend/</loc>
		<lastmod>2024-07-26T20:09:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/introducing-mend-supply-chain-defender-integration-with-jfrog-artifactory/</loc>
		<lastmod>2024-07-26T20:04:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/fixing-log4j-with-whitesource-renovate/</loc>
		<lastmod>2024-07-26T20:03:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/log4j-vulnerability-cve-2021-44832/</loc>
		<lastmod>2024-07-26T20:03:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/benchmark-of-false-positives/</loc>
		<lastmod>2024-07-26T20:00:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/forrester-software-composition-analysis-2021-key-takeaways/</loc>
		<lastmod>2024-07-26T19:58:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/zero-trust-in-devsecops/</loc>
		<lastmod>2024-07-26T19:56:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/apache-struts-vulnerabilities/</loc>
		<lastmod>2024-07-26T19:42:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzViZjU0N2I4NjNmNjUuanBnJnZlcnNpb249MDAwMCZzaWc9M2ViNGM0MjU4ZjRlMDlkYWFmYmMwYmJiZWJkMWJiMWE.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzViZjU0OTA5NDFmZDUuanBnJnZlcnNpb249MDAwMCZzaWc9OWMxYmQ0NGYyMTA1MmJlZmM5ODBlYWUxNzI2MDI2NTI.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzViZjU0YWE3M2UyZTcuanBnJnZlcnNpb249MDAwMCZzaWc9MzMxNzU2OGNmMTY2NmRiMDI4NzA5ODM4OTdhYTM4YzU.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/cve-common-vulnerabilities-and-exposures/</loc>
		<lastmod>2024-07-26T19:41:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVjMzM1MDkzZTE3YTcuanBnJnZlcnNpb249MDAwMCZzaWc9MTAwNThkMDNmZjBlYTM3NTk2NjM3YzA5MjMxM2YxNmQ.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVjMzM1MTk1ZDBlNDUucG5nJnZlcnNpb249MDAwMCZzaWc9ZDJjZGJkMmEzZDJmYjJkZTZkNmY4ZTBkZTljZTg4NTU.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/software-supply-chain-attacks/</loc>
		<lastmod>2024-07-26T19:39:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzYwMmU1ODY0Y2E1YzMucG5nJnZlcnNpb249MDAwMCZzaWc9YmQ1ODZmZGIzYmM5MGVkODJhNzE5YjhkMjMxMmJiZWQ.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/vulnerability-management-policy/</loc>
		<lastmod>2024-07-26T19:38:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Ad6b-KwcHiNpzvASWet3qRadx8pDkh-oYnwemNpxf4jRGtzK1FCvayamv6aEYn8Ni_3xIjBbU3gKYxpwU57jGP0RBkCTBy_If0NSNFpkBHZVmSkv0v3uCxEk2MHf1G0OC0R_qN1d.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/open-source-attribution-reports/</loc>
		<lastmod>2024-07-26T19:38:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/eclipse-sw360/</loc>
		<lastmod>2024-07-26T19:33:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/b7cirYzfyO-MyEMJCRbDfoKpUq5TIepodkO81v3Z9tDbAuECofyt2zZDBvO2kjFo7J9DVzM-ivuAz_jQOMok4HCILFGgtor8H-WmETvQl-Md_dxEgUwD9CoWwXn4C2LhftLuwRyx.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/1pB4n_I7Xyy3ZVtexxoYt9_xp4286xZwJWIBrPJbVIPieK2lk9bNoAY7LoYFwQ8Kr1DPtsnX9VXkKxNIsGVHBd3BJ6TUQr_GnNjzn-ioD10vZfIqLbln-m_nU1t2dKpBpNhsm7i.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/gdpr-impact-open-source-security/</loc>
		<lastmod>2024-07-26T19:30:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/innersource-how-open-source-best-practices-help-dev-teams/</loc>
		<lastmod>2024-07-26T19:26:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/april-open-source-security-vulnerabilities-snapshot/</loc>
		<lastmod>2024-07-26T19:22:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVlOGM5ODFlZDM2ZGYucG5nJnZlcnNpb249MDAwMCZzaWc9MDI4NjljMzhjMzBkN2MxYWJiNmVmYjgyMjBhODNmOGQ.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVlOGM5ODNlM2I3YzcucG5nJnZlcnNpb249MDAwMCZzaWc9YzJmMjM1NzkwMzdjNjUzNTRhMmMyM2RiZWQ3NzVkOTk.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVlOGM5ODVmMGFkMzUucG5nJnZlcnNpb249MDAwMCZzaWc9NWNiODU2NDEwYTc4OGM2NTNmYTQ3YmE0MDE2NDc2MDM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVlOGM5ODg0NGY5MDgucG5nJnZlcnNpb249MDAwMCZzaWc9M2Y3NmVhNjExM2Y5NWYzOTZjMGY2ZTk5YzVmMTE1OTk.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/whitesource-advise-for-intellij-idea/</loc>
		<lastmod>2024-07-26T19:22:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/security-automation/</loc>
		<lastmod>2024-07-26T19:21:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/security-advisories/</loc>
		<lastmod>2024-07-26T19:21:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/welcome-to-whitesource-renovate/</loc>
		<lastmod>2024-07-26T19:19:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVkY2MwZmY1Yjg3YmYuUE5HJnZlcnNpb249MDAwMCZzaWc9YTNiOTI1ZWUzNDZlOGZkMjUxMjcwNWJhMDkyYjY1MDI.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/secops/</loc>
		<lastmod>2024-07-26T19:18:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/top-5-open-source-vulnerabilities-for-april-2019/</loc>
		<lastmod>2024-07-26T19:15:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/cvss-v3-is-still-missing-the-target-for-prioritization/</loc>
		<lastmod>2024-07-26T19:15:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/next-generation-devops/</loc>
		<lastmod>2024-07-26T19:13:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/zombies-top-5-open-source-vulnerabilities-that-refuse-to-die/</loc>
		<lastmod>2024-07-26T19:12:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/the-top-10-companies-contributing-to-open-source/</loc>
		<lastmod>2024-07-26T19:10:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/github1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/crowdsourcing-and-open-source-friends-or-foes/</loc>
		<lastmod>2024-07-26T19:04:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/tips-to-secure-single-page-application/</loc>
		<lastmod>2024-07-26T19:03:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/6-reason-serverless-computing-can-take-the-cloud-to-the-next-level/</loc>
		<lastmod>2024-07-26T18:39:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/what-risks-does-serverless-computing-pose-to-application-security/</loc>
		<lastmod>2024-07-26T18:38:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/the-equifax-breach-who-s-to-blame/</loc>
		<lastmod>2024-07-26T18:38:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/top6-1-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/facebook-react-relicensed-under-mit-open-source-license/</loc>
		<lastmod>2024-07-26T18:37:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/how-to-navigate-migrating-to-cloud-in-a-regulated-environment/</loc>
		<lastmod>2024-07-26T18:36:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/nist-800-171/</loc>
		<lastmod>2024-07-26T18:35:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/top-15-security-experts-to-follow-on-twitter/</loc>
		<lastmod>2024-07-26T18:35:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/The-Grugq.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/SwiftOnSecurity.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Kelsey-Hightowe.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Brian-Krebs-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Jessie-Frazelle.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Jeremiah-Grossman.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Troy-Hunt.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Window-Snyder.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Jack-Daniel.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Libby-Clark.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Tarjei-Mandt.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Parisa-Tabriz.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Martin-Mckeay.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Jeff-Atwood.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Paul-Irish.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/mifid-ii-reforms-and-their-impact-on-technology-and-security/</loc>
		<lastmod>2024-07-26T18:35:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/mifid_ii_blog_image1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/top-10-open-source-myths-busted/</loc>
		<lastmod>2024-07-26T18:34:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/preparing-for-an-m-a-5-tips-for-vp-of-engineering/</loc>
		<lastmod>2024-07-26T18:33:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/the-next-heartbleed-for-java-based-application/</loc>
		<lastmod>2024-07-26T18:31:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/Java-bug-table.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/critical-mysql-database-vulnerability-puts-your-data-at-risk/</loc>
		<lastmod>2024-07-26T18:28:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/dirty-cow-vulnerability-puts-all-linux-and-android-distributions-at-risk/</loc>
		<lastmod>2024-07-26T18:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/the-five-founding-fathers-of-open-source/</loc>
		<lastmod>2024-07-26T18:27:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/back-to-heartbleed-3-years-later/</loc>
		<lastmod>2024-07-26T18:26:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/tips-to-secure-your-proprietary-and-open-source-code/</loc>
		<lastmod>2024-07-26T18:24:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.mend.io/wp-content/uploads/2024/07/benefits_reducecost_01.jpg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.mend.io/blog/copy-and-paste-code/</loc>
		<lastmod>2024-07-26T11:16:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/vulnerability-patching/</loc>
		<lastmod>2024-07-26T11:13:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/cybersecurity-awareness-month-2023-five-reasons-you-need-automatic-software-updates-for-your-application-security/</loc>
		<lastmod>2024-07-26T11:02:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/five-key-application-security-best-practices-and-benefits-for-maintaining-up-to-date-dependencies/</loc>
		<lastmod>2024-07-10T23:02:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/rsa-conference-2023-key-takeaways-from-our-five-favorite-sessions/</loc>
		<lastmod>2024-07-10T23:01:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/mends-women-lead-the-way/</loc>
		<lastmod>2024-07-10T23:01:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/pride-2022-supporting-lgbtq-in-tech/</loc>
		<lastmod>2024-07-10T22:59:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.mend.io/blog/docker-container-monitoring/</loc>
		<lastmod>2024-07-10T22:53:34+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Rank Math SEO Plugin (c) Rank Math - rankmath.com -->