<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
	xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"
	xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
	xmlns:news="http://www.google.com/schemas/sitemap-news/0.9"
	xmlns:image="http://www.google.com/schemas/sitemap-image/1.1"
	>
<url><loc>https://socdfir.com/2026/04/05/cyber-pulse-technical-threat-deep-dives-on-active-cves-fortinet-ems-rce-under-active-exploitation/</loc><news:news><news:publication><news:name>Ramblings of a CyberSecurity Nerd</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-05T04:45:28+00:00</news:publication_date><news:title>Cyber Pulse: Technical Threat Deep Dives on Active CVEs — Fortinet EMS RCE Under Active Exploitation</news:title><news:keywords>security, cybersecurity, technology, cyber-security, incident-response, dfir, Threat Detection, soc, splunk, yara, sigma, suricata, rce, fortinet, cve-2026-35616, forticlientems, actively-exploited, cwe-284</news:keywords></news:news></url></urlset>