<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://blog.arrakis.security</loc>
<lastmod>2026-05-10T08:27:21.342Z</lastmod>
<changefreq>daily</changefreq>
<priority>1</priority>
</url>
<url>
<loc>https://blog.arrakis.security/glass-weight-how-weaponized-hugging-face-models-turned-mlops-into-a-deserialization-attack-surface</loc>
<lastmod>2026-05-06T06:44:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.arrakis.security/cicada-shell-how-sleeper-agents-evade-ai-safety-training</loc>
<lastmod>2026-05-06T13:34:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.arrakis.security/ghost-rider-how-attackers-burned-46-000-a-day-on-stolen-ai-compute</loc>
<lastmod>2026-05-06T13:34:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
</urlset>
