<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 4, 2026 at 12:42 am by All in One SEO v4.7.7 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://os.kaspersky.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>KasperskyOS</title>
		<link><![CDATA[https://os.kaspersky.com]]></link>
		<description><![CDATA[Cyber Immune approach to IT systems security]]></description>
		<lastBuildDate><![CDATA[Wed, 25 Mar 2026 10:53:28 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://os.kaspersky.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://os.kaspersky.com/material/os-with-a-high-level-of-security-guarantees/]]></guid>
			<link><![CDATA[https://os.kaspersky.com/material/os-with-a-high-level-of-security-guarantees/]]></link>
			<title>OS with a high level of security guarantees</title>
			<pubDate><![CDATA[Wed, 25 Mar 2026 10:53:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://os.kaspersky.com/material/design-and-principles-of-syber-immune-os/]]></guid>
			<link><![CDATA[https://os.kaspersky.com/material/design-and-principles-of-syber-immune-os/]]></link>
			<title>Design and principles of Сyber Immune OS</title>
			<pubDate><![CDATA[Wed, 25 Mar 2026 10:50:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://os.kaspersky.com/material/kaspersky-thin-client-in-phosagro/]]></guid>
			<link><![CDATA[https://os.kaspersky.com/material/kaspersky-thin-client-in-phosagro/]]></link>
			<title>Kaspersky Thin Client in PhosAgro</title>
			<pubDate><![CDATA[Tue, 24 Mar 2026 09:54:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://os.kaspersky.com/material/vdi-infrastructure-in-government-institutions/]]></guid>
			<link><![CDATA[https://os.kaspersky.com/material/vdi-infrastructure-in-government-institutions/]]></link>
			<title>VDI infrastructure in government institutions</title>
			<pubDate><![CDATA[Tue, 21 Oct 2025 11:31:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://os.kaspersky.com/]]></guid>
			<link><![CDATA[https://os.kaspersky.com/]]></link>
			<title>Home</title>
			<pubDate><![CDATA[Tue, 03 Feb 2026 15:10:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://os.kaspersky.com/events/cysat-asia-conference-2026/]]></guid>
			<link><![CDATA[https://os.kaspersky.com/events/cysat-asia-conference-2026/]]></link>
			<title>CYSAT ASIA Conference 2026</title>
			<pubDate><![CDATA[Tue, 03 Feb 2026 15:12:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://os.kaspersky.com/development/]]></guid>
			<link><![CDATA[https://os.kaspersky.com/development/]]></link>
			<title>Development with KasperskyOS</title>
			<pubDate><![CDATA[Thu, 26 Mar 2026 05:34:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://os.kaspersky.com/events/gitex-asia-2025/]]></guid>
			<link><![CDATA[https://os.kaspersky.com/events/gitex-asia-2025/]]></link>
			<title>GITEX Asia 2025 and Kaspersky Day</title>
			<pubDate><![CDATA[Thu, 30 Oct 2025 12:29:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://os.kaspersky.com/components/boringssl-b9232f9e/]]></guid>
			<link><![CDATA[https://os.kaspersky.com/components/boringssl-b9232f9e/]]></link>
			<title>BoringSSL 0.20250212.0</title>
			<pubDate><![CDATA[Thu, 19 Mar 2026 14:44:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://os.kaspersky.com/components/c-ares-1-17-2/]]></guid>
			<link><![CDATA[https://os.kaspersky.com/components/c-ares-1-17-2/]]></link>
			<title>C-ares 1.19.1</title>
			<pubDate><![CDATA[Thu, 19 Mar 2026 14:43:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://os.kaspersky.com/components/grpc-1-48-0/]]></guid>
			<link><![CDATA[https://os.kaspersky.com/components/grpc-1-48-0/]]></link>
			<title>gRPC 1.71.0</title>
			<pubDate><![CDATA[Thu, 19 Mar 2026 14:42:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://os.kaspersky.com/components/rabbitmq-c-amqp-0-13-0/]]></guid>
			<link><![CDATA[https://os.kaspersky.com/components/rabbitmq-c-amqp-0-13-0/]]></link>
			<title>RabbitMQ-C AMQP 0.15.0</title>
			<pubDate><![CDATA[Thu, 19 Mar 2026 14:42:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://os.kaspersky.com/components/json-web-token-4b66cf74/]]></guid>
			<link><![CDATA[https://os.kaspersky.com/components/json-web-token-4b66cf74/]]></link>
			<title>JSON Web Token 1.5</title>
			<pubDate><![CDATA[Thu, 19 Mar 2026 14:41:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://os.kaspersky.com/components/protobuf-3-19-4/]]></guid>
			<link><![CDATA[https://os.kaspersky.com/components/protobuf-3-19-4/]]></link>
			<title>protobuf 30.0</title>
			<pubDate><![CDATA[Thu, 19 Mar 2026 14:39:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://os.kaspersky.com/components/zxing-cpp-2-3-0/]]></guid>
			<link><![CDATA[https://os.kaspersky.com/components/zxing-cpp-2-3-0/]]></link>
			<title>zxing-cpp 2.3.0</title>
			<pubDate><![CDATA[Fri, 05 Dec 2025 10:40:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://os.kaspersky.com/components/skia-m112/]]></guid>
			<link><![CDATA[https://os.kaspersky.com/components/skia-m112/]]></link>
			<title>Skia m112</title>
			<pubDate><![CDATA[Fri, 05 Dec 2025 10:40:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://os.kaspersky.com/components/nuklear-4-12-7/]]></guid>
			<link><![CDATA[https://os.kaspersky.com/components/nuklear-4-12-7/]]></link>
			<title>Nuklear 4.12.7</title>
			<pubDate><![CDATA[Fri, 05 Dec 2025 10:39:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://os.kaspersky.com/components/libpcap-1-10-4/]]></guid>
			<link><![CDATA[https://os.kaspersky.com/components/libpcap-1-10-4/]]></link>
			<title>Libpcap 1.10.5</title>
			<pubDate><![CDATA[Fri, 05 Dec 2025 10:22:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://os.kaspersky.com/components/boost-1-78-0/]]></guid>
			<link><![CDATA[https://os.kaspersky.com/components/boost-1-78-0/]]></link>
			<title>Boost 1.85.0</title>
			<pubDate><![CDATA[Fri, 05 Dec 2025 09:51:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://os.kaspersky.com/components/libxml2-2-10-4/]]></guid>
			<link><![CDATA[https://os.kaspersky.com/components/libxml2-2-10-4/]]></link>
			<title>libxml2 2.12.10</title>
			<pubDate><![CDATA[Fri, 05 Dec 2025 09:51:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://os.kaspersky.com/components/re2-2022-02-01/]]></guid>
			<link><![CDATA[https://os.kaspersky.com/components/re2-2022-02-01/]]></link>
			<title>Re2 2022-04-01</title>
			<pubDate><![CDATA[Fri, 05 Dec 2025 09:48:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://os.kaspersky.com/components/iperf-3-10-1/]]></guid>
			<link><![CDATA[https://os.kaspersky.com/components/iperf-3-10-1/]]></link>
			<title>iperf 3.19.1</title>
			<pubDate><![CDATA[Fri, 05 Dec 2025 09:47:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://os.kaspersky.com/components/slang-17-0-6/]]></guid>
			<link><![CDATA[https://os.kaspersky.com/components/slang-17-0-6/]]></link>
			<title>Clang 19.1.0</title>
			<pubDate><![CDATA[Fri, 05 Dec 2025 09:47:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://os.kaspersky.com/blog/when-intuition-fails/]]></guid>
			<link><![CDATA[https://os.kaspersky.com/blog/when-intuition-fails/]]></link>
			<title>Every simple task has a simple wrong solution</title>
			<pubDate><![CDATA[Thu, 30 Oct 2025 12:28:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://os.kaspersky.com/components/arm-mbed-tls-3-3-0/]]></guid>
			<link><![CDATA[https://os.kaspersky.com/components/arm-mbed-tls-3-3-0/]]></link>
			<title>Arm Mbed TLS 3.6.4</title>
			<pubDate><![CDATA[Fri, 05 Dec 2025 10:23:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://os.kaspersky.com/blog/vulnerability-in-kia-car-remote-control-systems/]]></guid>
			<link><![CDATA[https://os.kaspersky.com/blog/vulnerability-in-kia-car-remote-control-systems/]]></link>
			<title>Vulnerability in remote control systems of KIA vehicle</title>
			<pubDate><![CDATA[Thu, 30 Oct 2025 12:27:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://os.kaspersky.com/blog/transformation-of-cyber-risks/]]></guid>
			<link><![CDATA[https://os.kaspersky.com/blog/transformation-of-cyber-risks/]]></link>
			<title>Transformation of cyber risks</title>
			<pubDate><![CDATA[Thu, 30 Oct 2025 12:26:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://os.kaspersky.com/blog/starting-point-for-creating-secure-bydesign-systems/]]></guid>
			<link><![CDATA[https://os.kaspersky.com/blog/starting-point-for-creating-secure-bydesign-systems/]]></link>
			<title>The starting point for creating Secure by Design systems</title>
			<pubDate><![CDATA[Thu, 30 Oct 2025 12:26:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://os.kaspersky.com/components/abseil-cpp-20220623-1/]]></guid>
			<link><![CDATA[https://os.kaspersky.com/components/abseil-cpp-20220623-1/]]></link>
			<title>Abseil-cpp 20250512.0</title>
			<pubDate><![CDATA[Thu, 19 Mar 2026 15:29:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://os.kaspersky.com/blog/security-challenges-of-modern-cybersystems/]]></guid>
			<link><![CDATA[https://os.kaspersky.com/blog/security-challenges-of-modern-cybersystems/]]></link>
			<title>Security challenges of modern cybersystems</title>
			<pubDate><![CDATA[Thu, 30 Oct 2025 12:24:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://os.kaspersky.com/blog/process-requirements-security-objectives-and-threat-modeling/]]></guid>
			<link><![CDATA[https://os.kaspersky.com/blog/process-requirements-security-objectives-and-threat-modeling/]]></link>
			<title>Process requirements: Security objectives and threat modeling</title>
			<pubDate><![CDATA[Thu, 30 Oct 2025 12:23:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://os.kaspersky.com/blog/process-requirements-creating-an-architecture-and-verifying-code-quality/]]></guid>
			<link><![CDATA[https://os.kaspersky.com/blog/process-requirements-creating-an-architecture-and-verifying-code-quality/]]></link>
			<title>Process requirements: Creating an architecture and verifying code quality</title>
			<pubDate><![CDATA[Thu, 30 Oct 2025 12:22:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://os.kaspersky.com/blog/llm-virus-obfuscation/]]></guid>
			<link><![CDATA[https://os.kaspersky.com/blog/llm-virus-obfuscation/]]></link>
			<title>How AI masks viruses</title>
			<pubDate><![CDATA[Thu, 30 Oct 2025 12:21:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://os.kaspersky.com/blog/information-security-news-in-the-transport-industry-august-2024/]]></guid>
			<link><![CDATA[https://os.kaspersky.com/blog/information-security-news-in-the-transport-industry-august-2024/]]></link>
			<title>Information security news in the transport industry – August 2024</title>
			<pubDate><![CDATA[Thu, 30 Oct 2025 12:19:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://os.kaspersky.com/blog/how-we-made-an-iot-controller-cyber-immune/]]></guid>
			<link><![CDATA[https://os.kaspersky.com/blog/how-we-made-an-iot-controller-cyber-immune/]]></link>
			<title>How we made an IoT controller Cyber Immune</title>
			<pubDate><![CDATA[Thu, 30 Oct 2025 12:18:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://os.kaspersky.com/blog/how-to-download-and-install-kasperskyos/]]></guid>
			<link><![CDATA[https://os.kaspersky.com/blog/how-to-download-and-install-kasperskyos/]]></link>
			<title>What is KasperskyOS and can I install it on my laptop?</title>
			<pubDate><![CDATA[Thu, 30 Oct 2025 12:16:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://os.kaspersky.com/blog/how-cyber-immunity-will-change-the-auto-industry/]]></guid>
			<link><![CDATA[https://os.kaspersky.com/blog/how-cyber-immunity-will-change-the-auto-industry/]]></link>
			<title>How Cyber Immunity Will Change the Auto Industry</title>
			<pubDate><![CDATA[Thu, 30 Oct 2025 12:11:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://os.kaspersky.com/blog/hacking-the-smart-vacuum-cleaner/]]></guid>
			<link><![CDATA[https://os.kaspersky.com/blog/hacking-the-smart-vacuum-cleaner/]]></link>
			<title>Hacking the Smart Vacuum Cleaner: How IoT Devices Are Being Targeted by Hackers</title>
			<pubDate><![CDATA[Thu, 30 Oct 2025 12:10:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://os.kaspersky.com/blog/eliminate-cyber-risks-once-and-for-all/]]></guid>
			<link><![CDATA[https://os.kaspersky.com/blog/eliminate-cyber-risks-once-and-for-all/]]></link>
			<title>Eliminate cyber risks once and for all</title>
			<pubDate><![CDATA[Thu, 30 Oct 2025 12:10:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://os.kaspersky.com/blog/elevator-exploit/]]></guid>
			<link><![CDATA[https://os.kaspersky.com/blog/elevator-exploit/]]></link>
			<title>Elevator Hacking via PLC: How to Prevent It?</title>
			<pubDate><![CDATA[Thu, 30 Oct 2025 12:09:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://os.kaspersky.com/blog/create-system-resistant-aggressive-environments/]]></guid>
			<link><![CDATA[https://os.kaspersky.com/blog/create-system-resistant-aggressive-environments/]]></link>
			<title>How do you create a system that’s resistant to aggressive environments without any additional protection?</title>
			<pubDate><![CDATA[Thu, 30 Oct 2025 12:04:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://os.kaspersky.com/news/kaspersky-thin-client-wins-international-security-innovation-award/]]></guid>
			<link><![CDATA[https://os.kaspersky.com/news/kaspersky-thin-client-wins-international-security-innovation-award/]]></link>
			<title>Kaspersky Thin Client Wins International Security Innovation Award</title>
			<pubDate><![CDATA[Tue, 28 Oct 2025 11:07:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://os.kaspersky.com/blog/create-secure-by-design-system/]]></guid>
			<link><![CDATA[https://os.kaspersky.com/blog/create-secure-by-design-system/]]></link>
			<title>How do you create a Secure by Design system without trying to make every component invulnerable?</title>
			<pubDate><![CDATA[Thu, 30 Oct 2025 12:01:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://os.kaspersky.com/material/kaspersky-thin-client-datasheet/]]></guid>
			<link><![CDATA[https://os.kaspersky.com/material/kaspersky-thin-client-datasheet/]]></link>
			<title>Kaspersky Thin Client Datasheet</title>
			<pubDate><![CDATA[Tue, 21 Oct 2025 14:30:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://os.kaspersky.com/material/cyber-immune-thin-clients-in-healthcare/]]></guid>
			<link><![CDATA[https://os.kaspersky.com/material/cyber-immune-thin-clients-in-healthcare/]]></link>
			<title>Cyber Immune thin clients in healthcare</title>
			<pubDate><![CDATA[Tue, 21 Oct 2025 14:22:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://os.kaspersky.com/material/cyber-immune-thin-clients-in-financial-institutions/]]></guid>
			<link><![CDATA[https://os.kaspersky.com/material/cyber-immune-thin-clients-in-financial-institutions/]]></link>
			<title>Cyber Immune thin clients in financial institutions</title>
			<pubDate><![CDATA[Tue, 21 Oct 2025 14:20:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://os.kaspersky.com/material/implementing-cyber-immune-thin-clients-at-the-orenburg-college-of-economics-and-informatics/]]></guid>
			<link><![CDATA[https://os.kaspersky.com/material/implementing-cyber-immune-thin-clients-at-the-orenburg-college-of-economics-and-informatics/]]></link>
			<title>Implementing Cyber Immune thin clients at the Orenburg College of Economics and Informatics</title>
			<pubDate><![CDATA[Tue, 21 Oct 2025 14:19:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://os.kaspersky.com/resources/cases/vdi-infrastructure-in-government-institutions/]]></guid>
			<link><![CDATA[https://os.kaspersky.com/resources/cases/vdi-infrastructure-in-government-institutions/]]></link>
			<title>VDI infrastructure in government institutions</title>
			<pubDate><![CDATA[Tue, 21 Oct 2025 11:35:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://os.kaspersky.com/blog/constructive-information-security-security-by-design/]]></guid>
			<link><![CDATA[https://os.kaspersky.com/blog/constructive-information-security-security-by-design/]]></link>
			<title>Constructive information security – Security by Design</title>
			<pubDate><![CDATA[Thu, 30 Oct 2025 11:40:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://os.kaspersky.com/blog/10-most-common-qa-about-mobile-devices-based-on-kasperskyos-for-mobile/]]></guid>
			<link><![CDATA[https://os.kaspersky.com/blog/10-most-common-qa-about-mobile-devices-based-on-kasperskyos-for-mobile/]]></link>
			<title>10 most common Q&amp;A about mobile devices based on KasperskyOS for Mobile</title>
			<pubDate><![CDATA[Thu, 30 Oct 2025 10:43:41 +0000]]></pubDate>
		</item>
				</channel>
</rss>
