<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1"><url><loc>https://websec.net/blog/mobile-pentesting-series-part-2-reversing-android-application-65aa3f2b79788762ba77e586</loc><lastmod>2026-04-29T21:21:47.698Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/mobile-pentesting-series-part-1-bypass-ssl-pinning-in-android-653bc5a197d6529e40f71f09</loc><lastmod>2026-04-29T21:21:47.703Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/stun-protocol-ip-exposure-tool-by-websec-64fef9588301f9197619dd51</loc><lastmod>2026-04-29T21:21:47.706Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/yara-rules-part-2-using-modules-649402237da6efd52bb85631</loc><lastmod>2026-04-29T21:21:47.711Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/yara-part-1-malware-analysis-for-detecting-iocs-6493fd057da6efd52bb8537f</loc><lastmod>2026-04-29T21:21:47.715Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/security-development-and-management-jobs-roles-and-responsibilities-647fa646da8f20aeb6846241</loc><lastmod>2026-04-29T21:21:47.720Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/defensive-security-jobs-roles-and-responsibilities-647fa5a5da8f20aeb68461f5</loc><lastmod>2026-04-29T21:21:47.725Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/offensive-security-job-titles-roles-and-responsibilities-647fa4b9da8f20aeb6846175</loc><lastmod>2026-04-29T21:21:47.731Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/malware-analysis-report-magicrat-lazarus-64549b81712404c1b66cc573</loc><lastmod>2026-04-29T21:21:47.739Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/pgp-encryption-practical-examples-6430fd3761dd339b5487568d</loc><lastmod>2026-04-29T21:21:47.746Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/static-malware-analysis-office-documents-63c04550f2581a058fc1b461</loc><lastmod>2026-04-29T21:21:47.754Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/classic-malware-carbanak-part-2-639e8a8ddece7abbe6b579f2</loc><lastmod>2026-04-29T21:21:47.758Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/malware-analysis-example-classic-case-stuxnet-part-2-639e3181dece7abbe6b55ead</loc><lastmod>2026-04-29T21:21:47.762Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/reverse-shells-and-cats-netcat-socat-639cc8d4dece7abbe6b4f3ff</loc><lastmod>2026-04-29T21:21:47.766Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/classic-malware-carbanak-639b6860dece7abbe6b48b8a</loc><lastmod>2026-04-29T21:21:47.771Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/malware-analysis-example-classic-case-stuxnet-639a1accdece7abbe6b405c6</loc><lastmod>2026-04-29T21:21:47.775Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/static-malware-analysis-of-pdf-files-6381044f46737a7c2f9ddd17</loc><lastmod>2026-04-29T21:21:47.779Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/intro-to-static-malware-analysis-636c51ba1e6769027a661c70</loc><lastmod>2026-04-29T21:21:47.788Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/what-is-dll-hijacking-and-how-does-it-work-636b76dfcc690ab343827516</loc><lastmod>2026-04-29T21:21:47.793Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/how-to-get-into-cybersecurity-63491602e504f067815a980f</loc><lastmod>2026-04-29T21:21:47.797Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/top-10-best-security-tools-for-pentesting-6311f24cbd0450b137d09bde</loc><lastmod>2026-04-29T21:21:47.801Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/5-major-types-of-phishing-attacks-62f00a63c662f0e7d84faecc</loc><lastmod>2026-04-29T21:21:47.805Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/what-is-phishing-how-it-works-and-how-to-prevent-attacks-629b7ab18bfa00d6ebd6f198</loc><lastmod>2026-04-29T21:21:47.811Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/what-is-code-review-and-why-is-it-important-625739d2ce485dee4cf34809</loc><lastmod>2026-04-29T21:21:47.817Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/red-teaming-what-it-is-why-it-matters-and-everything-you-need-to-know-62223242ffdc3946151e78f3</loc><lastmod>2026-04-29T21:21:47.821Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/what-is-employee-awareness-training-and-why-is-it-important-61fd85cdf8cf0f06a1fdf424</loc><lastmod>2026-04-29T21:21:47.826Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/what-is-penetration-testing-and-why-is-it-important-61efacad0a50003dff8ff13c</loc><lastmod>2026-04-29T21:21:47.831Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/how-to-enforce-cybersecurity-best-practices-in-the-remote-work-model-61e5a676e7c0c3e0f62e738d</loc><lastmod>2026-04-29T21:21:47.835Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/developing-a-remote-code-execution-exploit-for-a-popular-media-box-61b2b37a43a1155c848f3b08</loc><lastmod>2026-04-29T21:21:47.838Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/twitch-source-code-leaked-615d79f109a2ad03efdb57f8</loc><lastmod>2026-04-29T21:21:47.844Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/cve-report-august-2021-6127847280e759c7d31286d0</loc><lastmod>2026-04-29T21:21:47.848Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/dmcacom-hack-full-disclosure-with-proof-of-concept-606ecfec2f798a048269340e</loc><lastmod>2026-04-29T21:21:47.852Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/an-introductory-guide-to-pentesting-azure-part-1-66151556d3b77dface783b6c</loc><lastmod>2026-04-29T21:21:47.857Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/hack-zte-routers-admin-panel-66190e773cc251453bda7a0c</loc><lastmod>2026-04-29T21:21:47.860Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/an-introductory-guide-to-pentesting-azure-benefits-and-tools-part-2-661c326880f704dc4b2bbeca</loc><lastmod>2026-04-29T21:21:47.866Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/critical-idor-vulnerability-in-latepoint-plugin-exposes-sensitive-data-666b78446e63d6dcdb0f73bf</loc><lastmod>2026-04-29T21:21:47.870Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/how-to-prepare-for-the-eu-nis2-directive-part-1-6697b739fa7f20b3ca2b8de0</loc><lastmod>2026-04-29T21:21:47.884Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/attackforge-vs-plextrac-comparison-differences-similarities-and-alternatives-66ad088bac92a30c342d414f</loc><lastmod>2026-04-29T21:21:47.888Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/enhancing-vulnerability-management-under-nis2-through-coordinated-vulnerability-disclosure-part-2-6702fcda1828340ccbdd5ef6</loc><lastmod>2026-04-29T21:21:47.902Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/critical-vulnerability-in-vision-helpdesk-allows-unauthorized-session-access-67264646bde7fa99ea26446f</loc><lastmod>2026-04-29T21:21:47.906Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/the-most-dangerous-application-security-vulnerabilities-of-2024-67a9f7c962832cb4ba345f3a</loc><lastmod>2026-04-29T21:21:47.914Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/iot-firmware-what-is-it-and-how-does-it-help-you-hack-a-router-67abc9a062832cb4ba345f78</loc><lastmod>2026-04-29T21:21:47.919Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/research-on-zigbee-security-interference-and-sdr-based-attacks-689c15056dbf416ac56193c5</loc><lastmod>2026-04-29T21:21:47.936Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/a-deep-dive-into-microsoft-warbird-mss-kernel-mode-dynamic-packer-68ee2c87b251081f55ec8c31</loc><lastmod>2026-04-29T21:21:47.939Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/ophion-building-a-stealth-intel-vt-x-hypervisor-for-windows-69b62daa7462693131828c97</loc><lastmod>2026-04-29T21:21:47.951Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/cve-2026-29014-metinfo-cms-unauthenticated-php-code-injection-69cdc290c14a8a99e1f91b7a</loc><lastmod>2026-04-29T21:21:47.960Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/cve-2026-33032-unauthenticated-nginx-ui-mcp-takeover-69e1200f9fceb1f3fbe9c47f</loc><lastmod>2026-04-29T21:21:47.969Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/nis2-pentest-the-critical-burden-of-proof-under-the-cybersecurity-act-cbw-69ed0fc59fceb1f3fbe9c48d</loc><lastmod>2026-04-29T21:29:22.724Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url></urlset>