<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://newsletter.cyber-safety.co/</loc>
    <lastmod>2026-04-03T20:13:57+00:00</lastmod>
  </url>
  <url>
    <loc>https://newsletter.cyber-safety.co/subscribe</loc>
    <lastmod>2026-04-03T20:13:57+00:00</lastmod>
  </url>
      <url>
        <loc>https://newsletter.cyber-safety.co/authors</loc>
        <lastmod>2026-04-03T20:13:57+00:00</lastmod>
      </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/documentation-the-most-overlooked-security-tool</loc>
      <lastmod>2026-02-21</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/broken-defaults-misconfig-legacy-access-silent-permissions</loc>
      <lastmod>2025-10-27</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/zoho-s-ulaa-hacktivism-and-more</loc>
      <lastmod>2025-05-26</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/phishing-has-evolved-are-your-mobile-apps-prepared</loc>
      <lastmod>2025-10-16</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/after-the-breach-missed-steps-sync-drift-trust-fatigue</loc>
      <lastmod>2025-09-07</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/security-leaders-need-strategy-not-just-alerts</loc>
      <lastmod>2026-01-03</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/security-awareness-training-isn-t-enough</loc>
      <lastmod>2026-03-08</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/quantum-whispers-post-quantum-timing-crypto-upgrades</loc>
      <lastmod>2025-11-09</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/trust-hijacked-oauth-phishing-api-drips-legacy-forwarding</loc>
      <lastmod>2025-09-03</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/cyber-readiness-protecting-yourself-against-modern-threats</loc>
      <lastmod>2025-07-11</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/byod-helpdesks-hidden-gaps-the-soft-spots-of-access</loc>
      <lastmod>2025-09-11</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/the-mfa-illusion-why-it-s-not-a-silver-bullet</loc>
      <lastmod>2026-01-27</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/zero-trust-still-a-buzzword-or-finally-real</loc>
      <lastmod>2026-01-02</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/cloud-misconfigurations-still-the-1-breach-vector</loc>
      <lastmod>2026-01-23</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/cybersecurity-skills-gap-at-t-s-data-breach-more</loc>
      <lastmod>2025-05-28</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/hidden-in-plain-sight-pixels-calendars-overprivileged-connectors</loc>
      <lastmod>2025-10-03</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/ghost-ransomware-strikes-fbi-issues-urgent-backup-warning</loc>
      <lastmod>2025-02-22</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/adaptive-intrusion-ai-recon-pdf-macros-ghost-pipelines</loc>
      <lastmod>2025-10-01</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/finance-teams-high-trust-high-risk</loc>
      <lastmod>2026-02-18</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/biden-just-changed-the-game-for-ai-security-5-major-shifts</loc>
      <lastmod>2025-04-14</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/authentication-is-not-identity</loc>
      <lastmod>2026-03-03</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/security-metrics-measuring-what-actually-matters</loc>
      <lastmod>2026-02-24</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/wiping-the-evidence-how-attackers-erase-their-trail</loc>
      <lastmod>2025-12-26</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/ddos-defense-failing-misconfigurations-automation-gaps-exposed</loc>
      <lastmod>2025-03-25</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/access-reviews-the-control-everyone-delays-b7a7</loc>
      <lastmod>2026-03-27</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/march-14-firefox-update-zoom-s-critical-security-flaws</loc>
      <lastmod>2025-03-13</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/ai-in-the-crosshairs-model-abuse-prompt-risks-rogue-agents</loc>
      <lastmod>2025-10-06</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/the-danger-of-delayed-patching</loc>
      <lastmod>2026-04-02</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/ci-cd-pipelines-the-new-frontier-for-cyber-attacks</loc>
      <lastmod>2026-01-13</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/broken-discovery-why-asset-inventories-still-fail</loc>
      <lastmod>2025-11-18</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/misconfiguration-the-simplest-way-in</loc>
      <lastmod>2026-03-18</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/just-in-time-time-based-threats-print-queues-email-traps</loc>
      <lastmod>2025-09-06</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/active-directory-attacks-are-on-the-rise</loc>
      <lastmod>2025-09-25</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/automation-gone-dark-scripts-bots-identity-drift</loc>
      <lastmod>2025-10-19</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/third-party-integrations-the-invisible-risk</loc>
      <lastmod>2026-02-26</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/leaked-by-default-cloud-buckets-slack-bots-overshared-screens</loc>
      <lastmod>2025-09-19</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/recover-overlook-post-incident-missteps-resilience-gaps</loc>
      <lastmod>2025-10-21</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/shadow-tools-quiet-syncs-no-code-cloud-drift-side-channels</loc>
      <lastmod>2025-10-22</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/the-rubrik-roundup-quarterly-product-feature-releases</loc>
      <lastmod>2025-09-24</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/encryption-everywhere-but-who-holds-the-keys</loc>
      <lastmod>2026-01-05</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/cracks-in-the-core-vpn-weakness-iot-leaks-dataset-corruption</loc>
      <lastmod>2025-08-31</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/events-that-ll-rewrite-cybersecurity-in-2025</loc>
      <lastmod>2025-04-14</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/the-insider-threat-you-re-still-ignoring</loc>
      <lastmod>2026-01-20</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/leaked-by-ui-drag-drop-comments-metadata-exposure</loc>
      <lastmod>2025-10-29</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/default-configurations-are-default-insecurities</loc>
      <lastmod>2026-02-15</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/citrixbleed-2-exploited-salt-typhoon-breaches-us-national-guard-singapore-under-siege</loc>
      <lastmod>2025-07-19</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/3-4b-gone-ai-agents-crypto-scams</loc>
      <lastmod>2025-04-09</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/2-915-weekly-attacks-why-apac-businesses-must-stay-vigilant</loc>
      <lastmod>2025-02-20</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/rerouted-recorded-and-rewritten-new-fronts-in-cyber-exploitation</loc>
      <lastmod>2025-08-21</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/zero-trust-is-a-strategy-not-a-product</loc>
      <lastmod>2026-03-21</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/phishing-drills-ai-driven-security-market-fletch-acquisition</loc>
      <lastmod>2025-06-03</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/the-5-cyber-trends-to-watch</loc>
      <lastmod>2026-03-24</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/when-ai-becomes-insider-rogue-agents-prompt-exploits</loc>
      <lastmod>2025-10-14</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/marstech-malware-hunts-for-developer-wallets</loc>
      <lastmod>2025-02-15</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/end-of-year-debrief-what-2025-taught-us-about-cyber-risk</loc>
      <lastmod>2025-12-31</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/human-layer-risks-burnout-insider-surprise-access-decay-7749</loc>
      <lastmod>2025-11-30</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/shadow-ai-the-insider-model-threat</loc>
      <lastmod>2025-11-01</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/post-attack-hygiene-lessons-orphans-recovery-pitfalls</loc>
      <lastmod>2025-10-12</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/shadow-saas-apps-it-never-knew-about</loc>
      <lastmod>2025-12-11</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/ai-in-security-promise-hype-and-hidden-failure-points</loc>
      <lastmod>2025-12-05</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/ransomware-as-a-service-is-booming-here-s-what-that-means-for-you</loc>
      <lastmod>2025-08-08</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/api-abuse-the-attack-you-won-t-see-coming</loc>
      <lastmod>2026-03-22</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/mobile-devices-the-blind-spot-in-enterprise-security</loc>
      <lastmod>2025-11-29</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/fake-users-real-risk-bot-accounts-inside-your-org</loc>
      <lastmod>2025-12-13</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/insider-robotics-automation-scripts-identity-drift</loc>
      <lastmod>2025-10-10</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/attacks-on-m365-are-up-275</loc>
      <lastmod>2025-09-08</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/the-false-promise-of-air-gaps</loc>
      <lastmod>2025-11-20</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/laundry-bear-incyber-forum-veriti-s-aqcuisition</loc>
      <lastmod>2025-05-27</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/targeted-attacks-when-you-re-chosen-on-purpose</loc>
      <lastmod>2026-03-17</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/ransomware-has-evolved-have-you</loc>
      <lastmod>2026-03-06</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/mobile-devices-corporate-risk-byod-gone-wild</loc>
      <lastmod>2025-12-24</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/passive-risk-active-breaches-when-expired-deactivated</loc>
      <lastmod>2025-09-14</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/security-fatigue-when-teams-stop-caring</loc>
      <lastmod>2026-03-20</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/live-virtual-workshop-securing-vibe-coding-is-two-weeks-away</loc>
      <lastmod>2025-08-11</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/security-theater-controls-that-look-good-do-little</loc>
      <lastmod>2025-12-30</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/mirror-sites-missed-alerts-the-quiet-breach-playbook</loc>
      <lastmod>2025-09-09</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/defense-in-depth-layers-or-illusion</loc>
      <lastmod>2026-03-14</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/deepseek-r1-goes-public-next-gen-ai-now-on-azure-github</loc>
      <lastmod>2025-04-01</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/session-hijack-token-reuse-cookie-drift</loc>
      <lastmod>2025-10-24</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/the-mfa-gap-where-authentication-still-fails</loc>
      <lastmod>2025-12-02</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/patch-management-the-discipline-nobody-loves</loc>
      <lastmod>2026-03-15</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/from-xanthorox-to-interlock-the-threat-landscape-s-getting-personal</loc>
      <lastmod>2025-05-15</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/endpoint-detection-your-first-line-of-real-defense</loc>
      <lastmod>2026-03-26</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/silent-night-loud-breach-attacks-that-strike-on-holidays</loc>
      <lastmod>2025-12-25</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/slopsquatting-is-real-ai-is-suggesting-malicious-packages-to-devs</loc>
      <lastmod>2025-04-18</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/silent-drift-when-configurations-unsecure-themselves</loc>
      <lastmod>2025-11-23</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/automation-overload-when-bots-vendors-data-lakes-go-bad</loc>
      <lastmod>2025-08-12</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/email-still-breaches-the-biggest-names</loc>
      <lastmod>2026-02-27</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/adaptive-firewalls-network-camouflage</loc>
      <lastmod>2025-11-13</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/forgotten-but-dangerous-office-tech-ghost-rights-ai-errors</loc>
      <lastmod>2025-08-28</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/leaked-from-within-burnout-zoom-bombing-webhook-drift</loc>
      <lastmod>2025-08-29</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/invisible-phish-heat-attacks-the-new-web-vector</loc>
      <lastmod>2025-10-08</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/laptop-theft-is-still-a-data-breach</loc>
      <lastmod>2026-02-23</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/dns-the-silent-layer-you-re-not-securing</loc>
      <lastmod>2026-02-28</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/lateral-movement-how-attackers-spread-silently-aa7e</loc>
      <lastmod>2026-02-25</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/mobile-devices-the-soft-underbelly-of-enterprise-security</loc>
      <lastmod>2026-01-16</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/claude-s-dirty-work-ai-driven-political-bots-uncovered</loc>
      <lastmod>2025-05-01</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/insider-threats-intentional-accidental-invisible</loc>
      <lastmod>2025-12-08</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/the-post-windows-10-world-legacy-risk-rapid-exploitation</loc>
      <lastmod>2025-10-07</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/your-browser-extensions-could-be-spying-on-you</loc>
      <lastmod>2025-07-30</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/invisible-intrusions-fileless-living-off-the-land-attacks</loc>
      <lastmod>2025-11-05</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/stealth-malware-attacks-that-don-t-trigger-alarms</loc>
      <lastmod>2025-12-07</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/top-5-cybersecurity-trends-you-can-t-afford-to-ignore-in-2025</loc>
      <lastmod>2025-04-14</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/conversations-compromised-email-threads-screenshots-scripted-logins</loc>
      <lastmod>2025-09-18</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/collab-turned-crossover-slack-tokens-shared-docs-dlp-blind-spots</loc>
      <lastmod>2025-10-25</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/pentesting-without-fixing-is-just-theater</loc>
      <lastmod>2026-02-17</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/the-red-report-summary-for-busy-it-pros</loc>
      <lastmod>2025-03-08</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/unseen-exfil-silent-ways-data-walks-out-the-door</loc>
      <lastmod>2025-11-22</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/slash-your-mttr-from-6-hours-to-15-minutes</loc>
      <lastmod>2025-05-20</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/2025-s-biggest-cybersecurity-threats-is-ai-working-for-or-against-you</loc>
      <lastmod>2025-02-17</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/beware-fake-chrome-sites-might-be-targeting-you</loc>
      <lastmod>2025-04-14</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/resilience-or-routine-cisos-socs-the-false-sense-of-readiness</loc>
      <lastmod>2025-08-25</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/choicejacking-netbird-malware-adversarial-ai</loc>
      <lastmod>2025-05-29</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/the-human-patch-gap-security-isn-t-just-code</loc>
      <lastmod>2025-12-29</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/data-in-transit-the-forgotten-risk</loc>
      <lastmod>2026-01-30</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/when-your-domain-becomes-an-attack-vector</loc>
      <lastmod>2025-12-17</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/impersonation-attacks-are-getting-too-good</loc>
      <lastmod>2026-02-22</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/traveling-employees-traveling-threats</loc>
      <lastmod>2026-01-06</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/master-cyber-defense-skills-this-november-use-code-cyber-9ae7</loc>
      <lastmod>2025-09-22</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/ai-generated-code-a-productivity-boost-or-backdoor</loc>
      <lastmod>2026-01-22</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/lateral-movement-how-attackers-spread-silently</loc>
      <lastmod>2026-01-01</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/90-of-orgs-hit-by-identity-attacks-rubrik-shows-you-how-to-bounce-back</loc>
      <lastmod>2025-09-16</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/the-identity-mirage-when-iam-isn-t-enough</loc>
      <lastmod>2025-11-21</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/ai-in-cybersecurity-the-future-s-so-bright-we-might-need-sunglasses</loc>
      <lastmod>2025-04-14</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/ex-fbi-agent-90-of-cyber-attacks-succeed-because-of-this-one-thing</loc>
      <lastmod>2025-04-14</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/google-bug-hunters-reveal-critical-amd-zen-processor-vulnerability</loc>
      <lastmod>2025-03-10</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/akirabot-unleashed-26m-cyber-funding-smbs-in-the-line-of-fire</loc>
      <lastmod>2025-04-10</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/when-security-metrics-create-a-false-sense-of-safety</loc>
      <lastmod>2025-12-19</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/privileged-access-the-crown-jewel-most-exposed</loc>
      <lastmod>2025-12-22</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/deep-dive-ml-powered-apt-detection-cspm-misconfigs-ai-hidden-payloads</loc>
      <lastmod>2025-05-30</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/spoofed-trust-fake-status-pages-signatures-domain-manipulation</loc>
      <lastmod>2025-10-26</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/fallback-access-bypasses-when-systems-fail</loc>
      <lastmod>2025-10-28</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/the-patchwork-problem-fragmented-security-stacks</loc>
      <lastmod>2026-01-07</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/phishing-just-got-smarter-and-so-should-your-defense</loc>
      <lastmod>2025-07-27</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/shadow-it-is-quietly-undermining-your-security</loc>
      <lastmod>2025-08-06</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/linux-systems-at-risk-550-surge-in-ddos-attacks</loc>
      <lastmod>2025-02-27</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/complacency-the-most-dangerous-vulnerability</loc>
      <lastmod>2026-03-29</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/pure-crypter-evasion-2025-privacy-maze-google-apps-script-phishing</loc>
      <lastmod>2025-05-31</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/not-fooling-anyone-fake-decoys-mfa-reset-gaps-remote-metadata-risks</loc>
      <lastmod>2025-09-21</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/mfa-fatigue-attacks-are-back-here-s-how-to-stop-them</loc>
      <lastmod>2025-07-29</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/sharepoint-zero-day-echoleak-ai-vulnerability-pr-phishing-surge</loc>
      <lastmod>2025-07-23</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/botnets-in-the-cloud-modern-infrastructure-old-tactics</loc>
      <lastmod>2025-12-29</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/compliance-creep-blind-spots-in-regulation-audit</loc>
      <lastmod>2025-11-08</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/stolen-credentials-the-shortcut-into-your-systems</loc>
      <lastmod>2026-03-05</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/bypassed-by-design-broken-toggles-hidden-tokens-cert-trust-decay</loc>
      <lastmod>2025-10-04</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/compromised-apis-when-integration-becomes-infection</loc>
      <lastmod>2025-12-23</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/phish-evolution-live-chat-voice-qr-vectors</loc>
      <lastmod>2025-11-06</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/security-holes-in-physical-access-systems</loc>
      <lastmod>2025-12-16</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/kql-queries-waf-configs-and-token-hygiene</loc>
      <lastmod>2025-05-10</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/replay-reuse-when-old-sessions-become-new-threats</loc>
      <lastmod>2025-11-24</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/firewall-rules-are-not-a-strategy</loc>
      <lastmod>2026-02-23</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/remote-work-permanent-risk</loc>
      <lastmod>2026-03-04</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/new-post-6d00</loc>
      <lastmod>2025-06-25</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/data-retention-keeping-too-much-is-a-risk</loc>
      <lastmod>2026-03-11</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/the-forgotten-web-risks-hiding-in-your-public-presence</loc>
      <lastmod>2025-12-04</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/the-cyber-mirage-synthetic-ids-ai-bugs-gen-z-gaps</loc>
      <lastmod>2025-08-07</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/legacy-systems-modern-threats-managing-end-of-life-exposure</loc>
      <lastmod>2025-10-15</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/cyber-update-gamification-blacklock-breach-apple-malware-more</loc>
      <lastmod>2025-03-28</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/basic-backup-wasn-t-built-to-handle-billions-of-files</loc>
      <lastmod>2025-12-17</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/visibility-gaps-what-your-soc-can-t-see</loc>
      <lastmod>2026-03-16</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/exfiltration-techniques-that-bypass-your-dlp</loc>
      <lastmod>2025-12-23</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/security-burnout-the-hidden-breach-vector</loc>
      <lastmod>2025-12-20</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/ai-voice-scams-are-duping-cfos-here-s-how-to-detect-them</loc>
      <lastmod>2025-08-10</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/behavioral-biometrics-the-new-authentication-frontier</loc>
      <lastmod>2026-01-29</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/social-engineering-beats-tech-every-time</loc>
      <lastmod>2026-02-08</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/ai-phishing-surge-microsoft-teams-attack-vector-russia-eyes-african-satellites</loc>
      <lastmod>2025-07-21</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/geofencing-isn-t-a-security-strategy</loc>
      <lastmod>2026-02-27</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/snyk-s-devseccon-2025-keynote-speaker-announced</loc>
      <lastmod>2025-10-13</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/exclusive-how-dragonrank-malware-is-hijacking-your-web-traffic</loc>
      <lastmod>2025-04-14</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/encryption-is-not-a-silver-bullet</loc>
      <lastmod>2026-03-24</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/your-security-team-isn-t-too-small-your-email-security-tools-just-aren-t-good-enough</loc>
      <lastmod>2026-03-11</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/chaos-engineering-for-security-breaking-things-on-purpose</loc>
      <lastmod>2025-12-12</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/audit-logs-useless-unless-you-use-them</loc>
      <lastmod>2026-02-16</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/ai-is-exfiltrating-your-data-in-fragments-see-how-to-track-and-stop-it-on-feb-3</loc>
      <lastmod>2026-01-31</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/cracks-in-the-foundation-nested-shares-admin-tokens-legacy-devices</loc>
      <lastmod>2025-09-20</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/sonicwall-and-cisco-flaws-open-doors-to-root-level-exploits</loc>
      <lastmod>2025-05-08</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/holiday-mode-attackers-don-t-take-time-off</loc>
      <lastmod>2025-12-24</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/access-reviews-the-control-everyone-delays</loc>
      <lastmod>2026-03-27</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/printers-cameras-and-forgotten-iot-the-hidden-perimeter</loc>
      <lastmod>2026-01-19</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/incident-response-that-fails-quietly</loc>
      <lastmod>2025-11-27</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/familiar-dangerous-dark-mode-phish-admin-drift-contractor-creep</loc>
      <lastmod>2025-09-15</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/timing-is-everything-adaptive-phishing-behavioral-malware-sso-fakes</loc>
      <lastmod>2025-09-17</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/breach-blueprints-shadow-it-exploit-auctions-board-risk</loc>
      <lastmod>2025-08-09</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/broken-access-control-the-silent-breach-vector</loc>
      <lastmod>2026-02-26</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/could-your-iot-devices-be-part-of-the-eleven11-botnet-army</loc>
      <lastmod>2025-03-06</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/build-systems-are-a-new-attack-vector</loc>
      <lastmod>2026-02-13</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/the-68-day-blind-spot-how-attackers-live-undetected-in-your-network</loc>
      <lastmod>2025-03-01</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/the-api-attack-surface-nobody-sees</loc>
      <lastmod>2025-11-28</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/inside-cybersecurity-ai-risks-iot-defenses-global-regulations</loc>
      <lastmod>2025-07-25</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/the-illusion-of-being-too-small-to-hack</loc>
      <lastmod>2026-03-02</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/data-loss-a-2-5m-problem-you-can-prevent</loc>
      <lastmod>2025-05-14</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/captcha-attacks-hackers-are-now-using-verification-tests-to-drop-malware</loc>
      <lastmod>2025-03-22</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/your-essential-cybersecurity-intelligence-briefing-get-dark-reading-s-daily-newsletter</loc>
      <lastmod>2025-11-06</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/dlp-failures-when-data-loss-prevention-doesn-t-prevent-anything</loc>
      <lastmod>2025-11-25</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/backups-your-last-line-often-your-weakest</loc>
      <lastmod>2026-01-26</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/abandoned-accounts-credentials-without-owners</loc>
      <lastmod>2026-01-17</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/security-debt-the-hidden-cost-that-compounds</loc>
      <lastmod>2026-01-28</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/saas-supply-chains-hidden-risks-in-integrations</loc>
      <lastmod>2025-11-04</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/built-to-scale-breached-at-the-edge-5g-auto-infra-pivot-points</loc>
      <lastmod>2025-08-30</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/unlocked-api-abuse-badge-surfing-forgotten-machines</loc>
      <lastmod>2025-08-20</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/shadow-workflows-silent-syncs-when-automation-bypasses-oversight</loc>
      <lastmod>2025-09-23</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/the-quiet-danger-of-overconfidence-in-security-20d6</loc>
      <lastmod>2026-03-29</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/invisible-phishing-heat-redirect-chains-form-harvesting</loc>
      <lastmod>2025-10-17</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/qr-code-scams-are-exploding-stop-before-you-scan-f363</loc>
      <lastmod>2025-08-02</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/the-most-overlooked-breaches-of-2025</loc>
      <lastmod>2025-12-31</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/stop-the-data-chaos-protecting-billions-of-files-and-ensuring-cyber-resilience</loc>
      <lastmod>2025-12-15</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/live-virtual-workshop-securing-vibe-coding</loc>
      <lastmod>2025-08-04</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/decoys-are-dead-honeypots-deception-adaptive-threats</loc>
      <lastmod>2025-10-23</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/multi-cloud-complexity-more-flexibility-more-risk</loc>
      <lastmod>2026-03-09</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/gaming-networks-and-malware-the-overlooked-threat-vector</loc>
      <lastmod>2025-12-25</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/spoofed-by-familiar-fake-avs-exec-signatures-tab-traps</loc>
      <lastmod>2025-09-27</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/the-x-outage-autopsy-ddos-attack-attribution-and-security-implications</loc>
      <lastmod>2025-03-15</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/1-426-substack-domains-vulnerable-to-takeover</loc>
      <lastmod>2025-03-03</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/too-many-tools-not-enough-control-fatigue-overlap-blind-spots</loc>
      <lastmod>2025-09-02</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/cyber-frontiers-ai-clones-devsecops-digital-twin-risks</loc>
      <lastmod>2025-08-13</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/the-quiet-risk-of-overconfidence-in-automation</loc>
      <lastmod>2026-03-31</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/compliance-drift-when-good-security-slowly-erodes</loc>
      <lastmod>2026-03-12</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/security-through-obscurity-why-it-still-fails</loc>
      <lastmod>2026-01-18</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/control-plane-compromise-attacks-from-above</loc>
      <lastmod>2025-11-26</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/what-you-miss-when-you-only-monitor-logs</loc>
      <lastmod>2025-12-14</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/ship-faster-stay-secure-achieving-speed-and-security-in-mobile-app-development</loc>
      <lastmod>2025-11-11</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/the-hidden-dangers-of-mobile-app-proliferation</loc>
      <lastmod>2026-01-15</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/default-isn-t-safe-ai-leaks-cookie-reuse-fallback-flaws</loc>
      <lastmod>2025-09-29</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/the-security-gaps-you-missed-mfa-fatigue-orphaned-apps-data-backdoors</loc>
      <lastmod>2025-08-14</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/is-your-m365-data-at-risk-of-permanent-loss</loc>
      <lastmod>2025-10-30</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/supply-chain-attacks-breaching-you-through-your-vendors</loc>
      <lastmod>2026-01-24</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/ai-powered-attacks-automation-at-criminal-scale</loc>
      <lastmod>2026-03-10</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/executive-risk-when-leadership-becomes-the-target-77f5</loc>
      <lastmod>2025-12-01</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/silent-backdoors-from-npm-to-coffee-shop-wi-fi</loc>
      <lastmod>2025-08-15</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/venice-ai-critical-modsecurity-flaw-gitlab-vulnerabilities</loc>
      <lastmod>2025-05-23</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/internal-aftershocks-layoffs-oversight-targeted-csr-phish</loc>
      <lastmod>2025-09-13</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/incident-response-drills-train-like-you-ll-fight</loc>
      <lastmod>2026-01-31</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/what-vendors-don-t-show-you-hidden-loops-fake-notices-session-syncs</loc>
      <lastmod>2025-10-02</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/nothing-to-click-when-invisible-fields-sdks-bots-steal-data</loc>
      <lastmod>2025-09-05</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/patchwork-security-the-myth-of-coverage-through-tools</loc>
      <lastmod>2025-11-17</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/model-integrity-poisoning-inversion-inference-risks</loc>
      <lastmod>2025-11-12</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/clean-login-full-access-why-malware-isn-t-needed-anymore</loc>
      <lastmod>2025-09-01</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/the-risk-of-reuse-credentials-code-and-configs</loc>
      <lastmod>2026-01-09</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/hidden-in-the-noise-spoofed-dns-quiet-threads-ghost-accounts</loc>
      <lastmod>2025-09-30</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/exceptions-without-expiry-how-risk-becomes-policy</loc>
      <lastmod>2025-09-12</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/are-your-cloud-credentials-the-key-to-a-breach</loc>
      <lastmod>2026-03-09</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/workshop-unpack-owasp-top-10-llms-with-snyk-e0de</loc>
      <lastmod>2025-07-08</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/ai-powered-cybercrime-is-accelerating-here-s-what-you-can-do</loc>
      <lastmod>2025-07-26</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/red-teaming-is-useless-without-follow-through</loc>
      <lastmod>2026-01-25</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/cisco-alerts-backdoor-admin-account-used-in-ongoing-cyber-attacks</loc>
      <lastmod>2025-04-04</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/new-dns-armor-exposed-apis-siem-goes-big</loc>
      <lastmod>2025-06-05</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/supply-chain-exploits-the-breach-before-the-breach</loc>
      <lastmod>2025-12-06</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/ai-in-cars-deepfake-defense-a-github-meltdown</loc>
      <lastmod>2025-04-05</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/ux-as-a-weapon-qr-phishing-smart-tv-hacks-dark-desig</loc>
      <lastmod>2025-08-17</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/executive-risk-when-leadership-becomes-the-target</loc>
      <lastmod>2025-12-01</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/uncover-the-hidden-threats-are-your-data-practices-ready-for-the-next-big-cyber-storm</loc>
      <lastmod>2025-07-04</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/zero-day-exploits-when-there-is-no-patch</loc>
      <lastmod>2026-03-07</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/revived-black-basta-tactics-ddos-on-finance</loc>
      <lastmod>2025-06-11</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/zero-day-arms-races-on-legacy-gateways</loc>
      <lastmod>2025-11-02</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/the-leak-loop-when-your-data-never-really-leaves</loc>
      <lastmod>2025-12-15</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/modern-cybersecurity-challenges-deepfakes-unknown-vulnerabilities-and-ransomware-strategies</loc>
      <lastmod>2025-07-09</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/let-s-talk-cyber-careers-content</loc>
      <lastmod>2025-05-02</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/doge-big-balls-ransomware-microsoft-teams-hackers</loc>
      <lastmod>2025-04-15</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/dns-the-security-layer-everyone-forgets</loc>
      <lastmod>2026-01-10</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/latest-in-cybersecurity-deepfakes-network-security-and-data-privacy-essentials</loc>
      <lastmod>2025-06-27</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/synthetic-identities-fraud-that-looks-legit</loc>
      <lastmod>2025-12-18</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/the-2m-hack-paypal-never-saw-coming</loc>
      <lastmod>2025-04-15</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/inside-trump-s-cyber-advisory-board-shakeup</loc>
      <lastmod>2025-04-15</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/legacy-systems-breaches-waiting-to-happen</loc>
      <lastmod>2026-02-10</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/ot-ics-when-the-factory-floor-becomes-the-attack-surface</loc>
      <lastmod>2025-11-07</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/cisos-prepare-for-a-new-wave-of-digital-warfare</loc>
      <lastmod>2025-06-21</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/salesforce-what-most-teams-get-wrong-about-data-protection</loc>
      <lastmod>2025-04-23</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/every-39-seconds-the-numbers-that-keep-security-pros-awake</loc>
      <lastmod>2025-04-15</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/after-the-breach-missed-steps-sync-drift-trust-fatigue-a594</loc>
      <lastmod>2025-09-07</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/reclaimed-reused-retargeted-domains-docs-device-gaps</loc>
      <lastmod>2025-09-28</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/executive-accounts-high-value-high-exposure</loc>
      <lastmod>2026-03-25</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/the-biggest-security-joke-thinking-you-re-covered</loc>
      <lastmod>2026-04-01</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/report-70-of-cybercriminals-leveraging-ai</loc>
      <lastmod>2025-04-15</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/fake-brands-real-threats-the-rise-of-impersonation-domains</loc>
      <lastmod>2026-01-15</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/diy-leaks-silent-drift-logs-plugins-forgotten-accounts</loc>
      <lastmod>2025-09-04</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/shadow-admins-the-privileged-accounts-you-forgot</loc>
      <lastmod>2026-03-13</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/join-rubrik-jerry-rice-score-a-free-nfl-jersey</loc>
      <lastmod>2026-01-22</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/shadow-infrastructure-forgotten-assets-ghost-devices-expired-dns</loc>
      <lastmod>2025-11-10</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/is-your-identity-security-strategy-already-outdated</loc>
      <lastmod>2025-03-20</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/outdated-tech-modern-risk-legacy-systems-in-live-environments</loc>
      <lastmod>2025-12-27</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/the-quiet-danger-of-overconfidence-in-security</loc>
      <lastmod>2026-03-07</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/mobile-devices-your-most-overlooked-attack-surface</loc>
      <lastmod>2026-02-09</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/session-hijacking-stealing-trust-not-passwords</loc>
      <lastmod>2026-02-19</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/collateral-access-saas-drift-cloud-leaks-biometric-risks</loc>
      <lastmod>2025-08-19</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/beyond-the-perimeter-satellites-fileless-malware-ai-abuse</loc>
      <lastmod>2025-08-23</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/hacked-by-design-inside-the-new-digital-threat-stack</loc>
      <lastmod>2025-08-05</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/telemetry-the-double-edged-sword-of-visibility</loc>
      <lastmod>2026-02-15</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/physical-digital-edge-systems-under-siege</loc>
      <lastmod>2025-10-11</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/firewall-fatigue-why-perimeter-defenses-fall-short</loc>
      <lastmod>2025-12-28</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/cybersecurity-resolutions-what-to-fix-first-this-year</loc>
      <lastmod>2026-01-01</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/the-insider-threat-you-didn-t-see-coming</loc>
      <lastmod>2025-12-28</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/10-5t-hygiene-risks-npm-landmines-ai-red-teams</loc>
      <lastmod>2025-05-22</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/gmail-loopholes-cisco-malware-disguises</loc>
      <lastmod>2025-04-21</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/container-security-is-more-than-image-scanning</loc>
      <lastmod>2026-02-25</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/saas-sprawl-shadow-apps-in-the-enterprise</loc>
      <lastmod>2025-12-26</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/tokenbreak-oauth2-apache-tomcat-s-attack</loc>
      <lastmod>2025-06-13</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/1</loc>
      <lastmod>2025-02-24</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/logging-illusions-what-your-siem-doesn-t-see</loc>
      <lastmod>2025-11-16</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/supply-chain-revisited-rogue-dependencies-build-poisoning</loc>
      <lastmod>2025-10-09</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/supply-chain-in-the-crosshairs-dependency-poisoning-build-attacks</loc>
      <lastmod>2025-10-18</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/deepfakes-voice-cloning-the-next-phishing-frontier</loc>
      <lastmod>2025-12-09</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/proof-of-concept-to-payload-exploits-in-the-wild</loc>
      <lastmod>2025-12-27</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/workshop-unpack-owasp-top-10-llms-with-snyk</loc>
      <lastmod>2025-06-30</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/musk-s-former-employee-just-shocked-the-security-world</loc>
      <lastmod>2025-04-15</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/usb-drop-attacks-are-back-and-smarter-than-ever</loc>
      <lastmod>2025-08-03</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/incident-response-plans-written-or-tested</loc>
      <lastmod>2026-02-28</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/apis-the-new-favorite-target-for-attackers</loc>
      <lastmod>2026-01-21</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/weekend-risk-when-defenses-go-quiet</loc>
      <lastmod>2026-03-28</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/incident-replay-how-attackers-exploit-response-patterns</loc>
      <lastmod>2025-12-21</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/startup-smarts-your-first-24-months-in-the-cybersecurity-arena</loc>
      <lastmod>2025-05-17</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/looks-legit-isn-t-fake-mfa-wiki-leaks-pii-in-pixels</loc>
      <lastmod>2025-09-26</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/threat-intel-that-matters</loc>
      <lastmod>2026-03-20</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/social-engineering-gets-smarter-are-your-employees-ready</loc>
      <lastmod>2025-08-01</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/edge-breaches-smart-buildings-cameras-physical-digital-hybrid-attacks</loc>
      <lastmod>2025-12-22</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/unlock-exclusive-investment-opportunities-with-vincent</loc>
      <lastmod>2025-07-13</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/trust-abuse-when-legitimate-access-becomes-malicious</loc>
      <lastmod>2025-12-03</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/security-tools-don-t-replace-security-teams</loc>
      <lastmod>2026-02-12</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/ai-tax-scams-dns-misconfigs-fortinet-exploits</loc>
      <lastmod>2025-04-12</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/shadow-email-accounts-the-hidden-data-exfil-path</loc>
      <lastmod>2026-01-12</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/password-resets-the-backdoor-you-forgot</loc>
      <lastmod>2026-02-17</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/expand-your-cybersecurity-expertise</loc>
      <lastmod>2026-03-25</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/ai-red-teams-zoom-traps-compliance-roadblocks</loc>
      <lastmod>2025-04-19</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/data-exfiltration-the-quiet-endgame</loc>
      <lastmod>2026-03-03</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/recovery-that-strays-drift-orphans-overconfidence</loc>
      <lastmod>2025-11-15</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/assume-breach-the-mindset-that-changes-everything</loc>
      <lastmod>2026-03-01</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/security-is-a-business-function-not-an-it-problem</loc>
      <lastmod>2026-03-31</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/from-saas-to-cfos-six-ways-your-security-is-getting-skipped</loc>
      <lastmod>2025-08-22</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/internal-insecurity-when-ai-tools-oauth-and-push-alerts-backfire</loc>
      <lastmod>2025-08-16</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/security-incidents-start-small-always</loc>
      <lastmod>2026-02-20</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/clicks-you-didn-t-mean-shadow-logs-smartboard-trails-scripted-files</loc>
      <lastmod>2025-10-05</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/shadow-it-what-you-don-t-see-will-hurt-you</loc>
      <lastmod>2026-02-22</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/security-metrics-that-actually-matter-in-2026</loc>
      <lastmod>2026-01-04</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/cybersecurity-crisis-how-teams-are-adapting-fast-in-a-world-of-rapid-vulnerabilities</loc>
      <lastmod>2025-06-23</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/compliance-fatigue-when-checklists-replace-security</loc>
      <lastmod>2026-01-08</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/europe-blackouts-5-8m-recovered-from-hacker-new-ttps</loc>
      <lastmod>2025-04-28</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/impersonation-at-scale-deepfakes-spoofing-synthetic-fraud</loc>
      <lastmod>2026-01-11</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/prevent-cves-now</loc>
      <lastmod>2026-02-24</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/smarter-malware-weaker-defenses-why-legacy-tactics-fail-in-2025</loc>
      <lastmod>2025-08-26</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/the-hidden-cost-of-small-security-exceptions</loc>
      <lastmod>2026-03-01</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/quiet-export-internal-api-abuse-orphan-tokens-privileged-misuse</loc>
      <lastmod>2025-10-31</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/top-10-security-best-practices-you-need-now</loc>
      <lastmod>2025-04-15</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/signals-lost-detection-gaps-in-modern-environments</loc>
      <lastmod>2025-11-19</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/infostealer-malware-surges-28-among-mac-users</loc>
      <lastmod>2025-06-17</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/love-scams-malware-and-romance-engineering</loc>
      <lastmod>2026-02-14</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/exposed-telemetry-when-monitoring-tools-leak-data</loc>
      <lastmod>2026-01-14</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/stay-ahead-of-global-cyber-threats-dark-reading-s-daily-intelligence-briefing-for-security-leaders-w</loc>
      <lastmod>2025-11-24</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/insider-threats-the-risk-within</loc>
      <lastmod>2026-03-19</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/fake-software-updates-are-spreading-malware-don-t-get-tricked</loc>
      <lastmod>2025-07-28</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/email-forwarding-the-invisible-data-leak</loc>
      <lastmod>2025-12-30</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/security-debt-the-cost-of-deferred-risk</loc>
      <lastmod>2025-12-10</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/data-security-privacy-in-2025-strategies-for-it-leaders</loc>
      <lastmod>2025-07-16</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/rubrik-workshop-identity-resilience</loc>
      <lastmod>2025-10-20</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/misconfig-by-default-how-trust-gets-exploited-quietly</loc>
      <lastmod>2025-09-10</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/modern-attack-vectors-ai-misuse-api-chaos-smart-lock-flaws</loc>
      <lastmod>2025-08-18</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/credential-storms-mfa-failures-token-flooding</loc>
      <lastmod>2025-11-03</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/global-threats-local-impact-when-geo-doesn-t-protect</loc>
      <lastmod>2025-11-30</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/overlooked-overworked-the-security-cost-of-compliance-fatigue</loc>
      <lastmod>2025-08-24</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/tag-110-evolves-picus-s-new-feature-cyber-insurance-crunch</loc>
      <lastmod>2025-05-24</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/edge-ai-vulnerabilities-at-the-device-layer</loc>
      <lastmod>2025-11-14</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/slack-teams-and-chat-the-new-phishing-frontier</loc>
      <lastmod>2026-02-11</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/cyber-recovery-blueprint-demo</loc>
      <lastmod>2025-11-17</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/leaks-by-design-jailbroken-ai-prompt-logs-shared-calendars</loc>
      <lastmod>2025-08-27</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/fbi-warning-300-critical-infrastructure-victims-of-medusa-ransomware</loc>
      <lastmod>2025-03-17</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/2-cyber-stocks-that-could-shape-your-financial-future</loc>
      <lastmod>2025-04-15</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/logging-isn-t-monitoring</loc>
      <lastmod>2026-03-23</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://newsletter.cyber-safety.co/p/privilege-escalation-the-real-objective</loc>
      <lastmod>2026-03-02</lastmod>
      <priority>1.0</priority>
    </url>
</urlset>