<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.bluerock.io/company</loc>
    </url>
    <url>
        <loc>https://www.bluerock.io/request-early-access</loc>
    </url>
    <url>
        <loc>https://www.bluerock.io/privacy-policy</loc>
    </url>
    <url>
        <loc>https://www.bluerock.io/blog</loc>
    </url>
    <url>
        <loc>https://www.bluerock.io/threat-research</loc>
    </url>
    <url>
        <loc>https://www.bluerock.io/search</loc>
    </url>
    <url>
        <loc>https://www.bluerock.io/formal-methods</loc>
    </url>
    <url>
        <loc>https://www.bluerock.io/threat-research-submission</loc>
    </url>
    <url>
        <loc>https://www.bluerock.io/evc-sign-up</loc>
    </url>
    <url>
        <loc>https://www.bluerock.io/opensource</loc>
    </url>
    <url>
        <loc>https://www.bluerock.io/runtime-reachability-iq</loc>
    </url>
    <url>
        <loc>https://www.bluerock.io/home-slider-copy</loc>
    </url>
    <url>
        <loc>https://www.bluerock.io/old-home</loc>
    </url>
    <url>
        <loc>https://www.bluerock.io/aws-signup</loc>
    </url>
    <url>
        <loc>https://www.bluerock.io/bluerock-observability-enforcement</loc>
    </url>
    <url>
        <loc>https://www.bluerock.io/bluerock-reachability</loc>
    </url>
    <url>
        <loc>https://www.bluerock.io</loc>
    </url>
    <url>
        <loc>https://www.bluerock.io/trumpet-demo</loc>
    </url>
    <url>
        <loc>https://www.bluerock.io/post/ai-speed-attacks-demand-moving-from-figting-cyber-fires-to-preventing-them</loc>
    </url>
    <url>
        <loc>https://www.bluerock.io/post/bluerock-delivers-runtime-reachability-intelligence-rriq-that-saves-developers-time</loc>
    </url>
    <url>
        <loc>https://www.bluerock.io/post/bluerock-in-action-actively-preventing-lpe</loc>
    </url>
    <url>
        <loc>https://www.bluerock.io/post/bluerock-in-action-neutralizing-deserialization-attacks-against-ai-ml-workloads</loc>
    </url>
    <url>
        <loc>https://www.bluerock.io/post/bluerock-in-action-neutralizing-wormable-container-attacks</loc>
    </url>
    <url>
        <loc>https://www.bluerock.io/post/cve-2025-61765-bluerock-discovers-critical-rce-in-socket-io-ecosystem</loc>
    </url>
    <url>
        <loc>https://www.bluerock.io/post/cves-bluerock-evc</loc>
    </url>
    <url>
        <loc>https://www.bluerock.io/post/dirty-pagedirectory-cve-2024-1086-and-the-missing-pinnacle-of-the-pyramid-of-pain</loc>
    </url>
    <url>
        <loc>https://www.bluerock.io/post/ebpf---who-watches-the-watcher-and-what-is-the-cost</loc>
    </url>
    <url>
        <loc>https://www.bluerock.io/post/featured-in-forbes-real-time-prevention-strategies-for-enhanced-cloud-security</loc>
    </url>
    <url>
        <loc>https://www.bluerock.io/post/from-talk-to-action-the-fastest-most-secure-way-to-build-mcp-servers-on-aws-marketplace-for-free</loc>
    </url>
    <url>
        <loc>https://www.bluerock.io/post/open-source-software-and-the-terrible-horrible-no-good-very-bad-week</loc>
    </url>
    <url>
        <loc>https://www.bluerock.io/post/securing-both-known-and-unknown-vulnerabilities-with-chainguard-bluerock</loc>
    </url>
    <url>
        <loc>https://www.bluerock.io/post/the-day-cve-almost-died</loc>
    </url>
    <url>
        <loc>https://www.bluerock.io/post/the-quest-for-resilience-has-the-pendulum-swung-too-far-from-prevention</loc>
    </url>
    <url>
        <loc>https://www.bluerock.io/post/we-must-go-beyond-the-scan-patch-hamster-wheel</loc>
    </url>
    <url>
        <loc>https://www.bluerock.io/post/when-patching-and-hardening-arent-enough-the-case-for-outside-in-protection</loc>
    </url>
    <url>
        <loc>https://www.bluerock.io/threat-research/ambersquid-03a2c</loc>
    </url>
    <url>
        <loc>https://www.bluerock.io/threat-research/critical-cve-2025-32445-vulnerability-in-argo-events-scores-cvss-10-jye2K</loc>
    </url>
    <url>
        <loc>https://www.bluerock.io/threat-research/critical-ingress-nginx-controller-vulnerability-allows-rce-without-authentication-x5M8V</loc>
    </url>
    <url>
        <loc>https://www.bluerock.io/threat-research/critical-pytorch-vulnerability-cve-2025-32434-allows-remote-code-execution-zzLWI</loc>
    </url>
    <url>
        <loc>https://www.bluerock.io/threat-research/critical-remote-code-execution-vulnerability-in-vllm-via-mooncake-integration-MdsaP</loc>
    </url>
    <url>
        <loc>https://www.bluerock.io/threat-research/cve-2022-0847</loc>
    </url>
    <url>
        <loc>https://www.bluerock.io/threat-research/cve-2023-52447</loc>
    </url>
    <url>
        <loc>https://www.bluerock.io/threat-research/cve-2024-21626</loc>
    </url>
    <url>
        <loc>https://www.bluerock.io/threat-research/cve-2024-26581</loc>
    </url>
    <url>
        <loc>https://www.bluerock.io/threat-research/cve-2024-47208</loc>
    </url>
    <url>
        <loc>https://www.bluerock.io/threat-research/cve-2024-56614-cve-2024-56615-poc-exploits-released-for-severe-ebpf-vulnerabilities-in-linux-kernel</loc>
    </url>
    <url>
        <loc>https://www.bluerock.io/threat-research/cve-2025-27520-critical-bentoml-flaw-allows-full-remote-code-execution-exploit-available-BDMP8-fbf70</loc>
    </url>
    <url>
        <loc>https://www.bluerock.io/threat-research/cve-2025-31115-xz-utils-hit-again-with-high-severity-multithreaded-decoder-bug</loc>
    </url>
    <url>
        <loc>https://www.bluerock.io/threat-research/cve-2025-32444-cvss-10-critical-rce-flaw-in-vllm-s-mooncake-integration-exposes-ai-infrastructure-kQBlp</loc>
    </url>
    <url>
        <loc>https://www.bluerock.io/threat-research/dero-miner-zombies-biting-through-docker-apis-to-build-a-cryptojacking-horde</loc>
    </url>
    <url>
        <loc>https://www.bluerock.io/threat-research/earthestries</loc>
    </url>
    <url>
        <loc>https://www.bluerock.io/threat-research/gafgyt-22572</loc>
    </url>
    <url>
        <loc>https://www.bluerock.io/threat-research/gafgyt-malware-broadens-its-scope-in-recent-attacks</loc>
    </url>
    <url>
        <loc>https://www.bluerock.io/threat-research/huggingfacevulnerability</loc>
    </url>
    <url>
        <loc>https://www.bluerock.io/threat-research/io-uring-is-back-this-time-as-a-rootkit-59q1k</loc>
    </url>
    <url>
        <loc>https://www.bluerock.io/threat-research/keras-deep-learning-framework-vulnerability-cve-2025-1550-ZssWI</loc>
    </url>
    <url>
        <loc>https://www.bluerock.io/threat-research/metas-llama-framework-flaw-exposes-ai-systems-to-remote-code-execution-risks-10e08</loc>
    </url>
    <url>
        <loc>https://www.bluerock.io/threat-research/nvidia-tensorrt-llm-vulnerability-let-hackers-run-malicious-code-yZJ24</loc>
    </url>
    <url>
        <loc>https://www.bluerock.io/threat-research/perfctl</loc>
    </url>
    <url>
        <loc>https://www.bluerock.io/threat-research/perfctl-52a61</loc>
    </url>
    <url>
        <loc>https://www.bluerock.io/threat-research/redis-or-not---revealing-a-critical-vulnerability-in-argo-cd-kubernetes-controller</loc>
    </url>
    <url>
        <loc>https://www.bluerock.io/threat-research/scarleteel</loc>
    </url>
    <url>
        <loc>https://www.bluerock.io/threat-research/sedexp</loc>
    </url>
    <url>
        <loc>https://www.bluerock.io/threat-research/teamtnt</loc>
    </url>
    <url>
        <loc>https://www.bluerock.io/threat-research/teamtnt-d9bb1</loc>
    </url>
    <url>
        <loc>https://www.bluerock.io/threat-research/unc5174s-evolution-in-chinas-ongoing-cyber-warfare-from-snowlight-to-vshell</loc>
    </url>
    <url>
        <loc>https://www.bluerock.io/formal-methods-publications/a-formal-specification-of-the-nova-microhypervisor-abi</loc>
    </url>
    <url>
        <loc>https://www.bluerock.io/formal-methods-publications/developing-with-formal-methods-at-bedrock-systems</loc>
    </url>
    <url>
        <loc>https://www.bluerock.io/formal-methods-publications/modularizing-cpu-semantics-for-virtualization</loc>
    </url>
    <url>
        <loc>https://www.bluerock.io/formal-methods-publications/towards-modular-specification</loc>
    </url>
</urlset>