<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.pynt.io/community</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/blog</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/cookies-policy</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/solutions/developers-and-testers</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/blog/shift-left</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/blog/api-security</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/blog/api-era</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/blog/llm-security-blogs</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/blog/owasp-top-ten-blogs</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/privacy-policy</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/terms</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/api-testing-guides</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/api-security-guides</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/application-security-testing-guides</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/resources-hub</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/resources-hub/webinars</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/resources-hub/guides-and-reports</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/service-agreement</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/owasp-top-10-guides</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/trust-center</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/book-a-demo</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/get-free-api-pentest</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/application-security</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/devsecops</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/resources-hub/success-stories</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/burp-suite</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/product</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/careers</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/partnerships</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/referrals</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/contact-us</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/use-cases/fintech</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/company</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/use-cases/healthcare</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/use-cases/ecommerce</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/llm-security</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/penetration-testing-guides</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/product/llm-security</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/product/api-security-testing</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/compare/pynt-vs-burp</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/product/pynt-automated-pentest-report</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/compare/pynt-vs-dast</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/api-security-testing-guides</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/integrations</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/product/automated-api-discovery-pynt</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/product/sensitive-data-and-excessive-data-exposure</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/resources-hub/product-sheets</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/newsroom</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/newsroom/press-releases</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/newsroom/media-coverage</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/product/mcp-security</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/resources-hub/mcp-security-research-2025</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/product/business-logic-pynt</loc>
    </url>
    <url>
        <loc>https://www.pynt.io</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/product/behavior-based-discovery-and-testing</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/positions/sales-development-representative</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/positions/senior-full-stack-engineer</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/positions/senior-software-engineer</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/api-security-guide/10-api-security-standards-and-protocols-you-must-know</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/api-security-guide/4-steps-to-achieving-api-governance-in-your-organization</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/api-security-guide/api-attacks</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/api-security-guide/api-compliance-introduction-and-6-critical-best-practices</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/api-security-guide/api-discovery</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/api-security-guide/api-discovery-tools</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/api-security-guide/api-scanning</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/api-security-guide/api-security</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/api-security-guide/api-security-breaches-top-causes-real-examples-and-prevention</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/api-security-guide/api-security-checklist-10-steps-to-a-secure-api</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/api-security-guide/api-security-tools-threat-protection-vs-testing-8-tools-to-know</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/api-security-guide/api-sprawl-understanding-the-problem-5-ways-to-solve-it</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/api-security-guide/managing-api-exposure-risks-and-best-practices</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/api-security-guide/shadow-apis-understanding-the-risk-and-6-ways-to-reduce-it</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/api-security-guide/top-8-api-vulnerabilities-and-how-to-mitigate-them</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/api-security-guide/why-you-need-an-api-inventory-8-steps-to-building-one</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/blog/shift-left/pynt-advantages-why-it-beats-burp-and-zap-for-api-security-testing</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/blog/shift-left/why-avoiding-the-shift-left-for-api-security-is-like-wearing-your-underwear-backwards</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/blog/shift-left/why-developers-and-security-tools-just-dont-click</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/blog/api-security/api-security-incidents-in-2022-a-look-back</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/blog/api-security/api-tests-functionality-vs-security-spot-the-difference</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/blog/api-security/from-friction-to-flow-embedding-api-security-where-it-works</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/blog/api-security/how-api-security-became-the-biggest-security-challenge-in-2023</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/blog/api-security/unveiling-the-top-api-security-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/blog/api-security/why-traditional-security-tools-cant-solve-the-api-security-problem</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/blog/api-era/10-amazing-facts-about-the-api-revolution</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/blog/api-era/demystifying-mcp-model-context-protocol-3-common-misconceptions</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/blog/api-era/understanding-the-different-use-cases-of-apis</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/application-security-testing-guide/application-security-testing</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/application-security-testing-guide/complete-guide-to-iast-how-it-works-pros-cons-and-best-practices</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/application-security-testing-guide/dast-tools</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/application-security-testing-guide/dynamic-application-security-testing</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/application-security-testing-guide/iast-vs-dast-5-key-differences-pros-cons-how-to-choose</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/application-security-testing-guide/security-testing-tools</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/application-security-testing-guide/web-security-testing-approaches-tools-and-methodology</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/blog/owasp-top-ten-blogs/api-wars-the-battle-against-lack-of-resources-and-rate-limiting</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/blog/owasp-top-ten-blogs/bolalywood-a-desi-inspired-journey-through-broken-object-level-authorization</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/blog/owasp-top-ten-blogs/broken-authentication-a-guide-to-keeping-your-apis-safe</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/blog/owasp-top-ten-blogs/mass-assignment-the-iceberg-that-sinks-your-apis-security</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/blog/owasp-top-ten-blogs/mr-beans-guide-to-avoiding-security-misconfigurations-in-apis</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/blog/owasp-top-ten-blogs/recall-the-risks-protecting-against-injection-attacks-in-your-apis</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/blog/owasp-top-ten-blogs/saving-the-api-world-from-broken-function-level-authorization-an-action-packed-adventure</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/blog/owasp-top-ten-blogs/the-game-of-improper-asset-management-protecting-your-apis-from-the-seven-kingdoms-of-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/blog/owasp-top-ten-blogs/the-horror-of-excessive-data-exposure</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/blog/owasp-top-ten-blogs/the-matrix-chronicles-api-security-and-the-battle-for-sufficient-logging-and-monitoring</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/blog/owasp-top-ten-blogs/understanding-owasp-10-for-api-security</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/blog/llm-security-blogs/code-execution-through-email-how-i-used-claude-mcp-to-hack-itself</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/blog/llm-security-blogs/genai-application-security-report-overview</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/blog/llm-security-blogs/large-language-models-unlocking-exciting-capabilities-while-addressing-new-security-concerns</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/blog/llm-security-blogs/state-of-mcp-security</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/blog/llm-security-blogs/the-hidden-trade-off-of-genai-rewriting-the-rules-of-development</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/blog/llm-security-blogs/the-next-big-thing-in-appsec-llm-discovery-and-security-testing</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/api-testing-guide/10-api-testing-types-and-how-to-choose</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/api-testing-guide/api-test-automation-pros-cons-and-best-practices</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/api-testing-guide/api-testing-definition-examples-tools-and-best-practices</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/api-testing-guide/api-testing-tools</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/api-testing-guide/python-testing-with-pytest-the-basics-and-a-quick-tutorial</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/api-testing-guide/rest-assured-java-api-testing-made-easy-tutorial</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/api-testing-guide/top-10-api-testing-best-practices</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/api-testing-guide/top-10-api-testing-types</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/resources-hub/webinars/api-security-in-2025-threats-trends-resolutions</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/resources-hub/webinars/defending-against-llm-api-security-threats-real-life-stories</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/resources-hub/webinars/how-are-you-protecting-your-company-from-api-security-breaches</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/resources-hub/webinars/llm-as-an-attack-vector-owasp-llm-top-10-explained</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/resources-hub/webinars/mcps-exposed-what-281-ai-agents-taught-us</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/resources-hub/webinars/meets-appsec-how-to-align-your-security-strategy</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/resources-hub/webinars/pynt-vs-owasp</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/resources-hub/webinars/the-appsec-showdown-dast-vs-api-security-testing</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/resources-hub/webinars/the-bug-in-security-why-proactive-testing-is-your-best-defense</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/resources-hub/guides-and-reports/defending-against-llm-api-security-threats-real-life-stories</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/resources-hub/guides-and-reports/dora-compliance-guide-checklist</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/resources-hub/guides-and-reports/owasp-api-security-top-10-a-critical-view</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/resources-hub/guides-and-reports/pynt-vs-owasp-pynt-top-10-api-vulnerabilties</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/resources-hub/guides-and-reports/quantifying-risk-exposure-across-281-mcps</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/resources-hub/guides-and-reports/shift-left-adoption-benchmark-report-2025</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/resources-hub/guides-and-reports/the-ciso-guide-to-shift-left</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/resources-hub/guides-and-reports/the-gen-ai-application-security-report</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/owasp-top-10-guide/broken-authentication-in-apis-and-web-apps-risks-and-mitigations</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/owasp-top-10-guide/broken-function-level-authorization-how-it-works-and-4-preventive-measures</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/owasp-top-10-guide/broken-object-level-authorization-bola-impact-example-and-prevention</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/owasp-top-10-guide/business-logic-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/owasp-top-10-guide/mass-assignment-vulnerability-how-it-works-6-defensive-measures</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/owasp-top-10-guide/owasp-api-top-10</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/owasp-top-10-guide/owasp-top-10-cheat-sheet-threats-and-mitigations-in-brief</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/owasp-top-10-guide/sql-injection-types-examples-prevention-cheat-sheet</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/owasp-top-10-guide/understanding-owasp-10-for-api-security</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/owasp-top-10-guide/why-improper-asset-management-threatens-your-apis-and-how-to-fix-it</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/devsecops/18-devsecops-tools-to-know-in-2025</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/devsecops/devsecops-principles-tools-and-best-practices-2025-guide</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/devsecops/security-automation-what-you-should-automate-tools-tips</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/devsecops/shift-left-security-5-technologies-6-critical-best-practices</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/devsecops/shift-left-testing-principles-approaches-and-best-practices</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/application-security/10-application-security-vulnerabilities-and-how-to-mitigate-them</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/application-security/10-vulnerability-scanning-tools-to-know-in-2025</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/application-security/application-security-appsec-components-practices-strategies</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/application-security/csrf-vs-xss-key-differences-and-5-ways-to-protect-your-website</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/application-security/prompt-injection-example-types-mitigation-strategies</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/application-security/why-security-misconfigurations-matter-and-5-ways-to-prevent-them</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/resources-hub/success-story/how-halodoc-automates-api-security-testing-12x-faster-and-better</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/resources-hub/success-story/how-telefonica-scaled-development-efficiency-and-api-security-with-pynt</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/burp-suite-guides/8-burp-suite-alternatives-and-competitors</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/burp-suite-guides/api-testing-with-burp-suite-a-practical-guide</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/burp-suite-guides/burp-suite-solution-overview-tutorial-and-top-5-alternatives</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/burp-suite-guides/burp-suite-tutorial-intercepting-modifying-scanning-http-traffic</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/burp-suite-guides/burp-suite-vs-zap-features-key-differences-limitations</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/llm-security/10-llm-security-tools-to-know</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/llm-security/llm-owasp-top-10-security-risks-and-how-to-prevent-them</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/llm-security/llm-security-understanding-risks-tools-and-best-practices</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/llm-security/what-is-training-data-poisoning-in-llms-6-ways-to-prevent-it</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/penetration-testing-guides/10-pentesting-tools-to-know-in-2025</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/penetration-testing-guides/automated-penetration-testing-pros-cons-and-best-practices</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/penetration-testing-guides/penetration-testing-in-your-organization-complete-2025-guide</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/penetration-testing-guides/pentesting-reports-key-sections-and-5-tips-for-effective-reports</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/api-security-testing-guides/api-functional-testing</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/api-security-testing-guides/api-security-scanning-process-tools-and-best-practices</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/api-security-testing-guides/api-security-testing</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/learning-hub/api-security-testing-guides/api-security-testing-tools</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/resources-hub/product-sheets/about-pynt</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/resources-hub/product-sheets/pynt-innovation</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/resources-hub/product-sheets/pynts-automated-api-discovery</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/resources-hub/product-sheets/the-roi-case-for-pynt</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/newsrooms/announcement-pynt-successfully-attains-soc-2-type-ii-compliance</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/newsrooms/api-security-startup-pynt-appoints-sivan-michaeli-roimi-as-vp-of-marketing</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/newsrooms/api-security-startup-pynt-raises-6m</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/newsrooms/code-execution-through-email-how-i-used-claude-to-hack-itself</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/newsrooms/dast-is-broken-not-dead-dynamic-testing-must-evolve</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/newsrooms/emerging-agentic-ai-security-vulnerabilities-expose-enterprise-systems-to-widespread-identity-based-attacks</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/newsrooms/gmail-message-exploit-triggers-code-execution-in-claude-bypassing-protections</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/newsrooms/gmail-message-used-to-trigger-code-execution-in-claude-and-bypass-protections</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/newsrooms/interview-mcp-security-risks-multiply-with-each-new-agent-connection</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/newsrooms/mcp-stacks-have-a-92-exploit-probability-how-10-plugins-became-enterprise-securitys-biggest-blind-spot</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/newsrooms/pynt-and-postman-partner-to-bring-native-api-security-into-developers-daily-workflows</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/newsrooms/pynt-and-postman-partner-to-bring-native-api-security-into-developers-daily-workflows-2</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/newsrooms/pynt-benchmark-report-reveals-97-use-security-tools-but-struggle-to-shift-left-effectively</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/newsrooms/pynt-finds-98-of-organizations-are-integrating-genai-api-security-gaps-are-exploding</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/newsrooms/pynt-joins-microsoft-for-startups-pegasus-program-to-accelerate-enterprise-api-security-adoption</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/newsrooms/pynt-sounds-alarm-on-rising-security-risks-from-mcp-servers-in-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/newsrooms/pynt-unveils-industry-first-platform-to-automate-api-security-backed-by-6m-in-seed-funding-and-global-user-traction</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/newsrooms/researchers-uncover-ai-identity-merge-vulnerability</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/newsrooms/researchers-warn-ai-is-becoming-an-expert-in-deception</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/newsrooms/shift-left-strategy-creates-heavy-burden-for-developers</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/newsrooms/why-api-security-will-drive-appsec-in-2026-and-beyond</loc>
    </url>
    <url>
        <loc>https://www.pynt.io/newsrooms/why-model-context-protocols-are-the-next-ai-security-blind-spot</loc>
    </url>
</urlset>