<?xml version="1.0" encoding="utf-8" standalone="yes"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml"><url><loc>/</loc><lastmod>2026-05-14T18:54:33+00:00</lastmod></url><url><loc>/blog/ai-fatigue-is-real-and-we-are-all-living-it/</loc><lastmod>2026-05-14T18:54:33+00:00</lastmod></url><url><loc>/categories/</loc><lastmod>2026-05-14T18:54:33+00:00</lastmod></url><url><loc>/tags/ciso/</loc><lastmod>2026-05-14T18:54:33+00:00</lastmod></url><url><loc>/blog/</loc><lastmod>2026-05-14T18:54:33+00:00</lastmod></url><url><loc>/tags/opinion/</loc><lastmod>2026-05-14T18:54:33+00:00</lastmod></url><url><loc>/categories/perspectives/</loc><lastmod>2026-05-14T18:54:33+00:00</lastmod></url><url><loc>/tags/</loc><lastmod>2026-05-14T18:54:33+00:00</lastmod></url><url><loc>/blog/the-ai-security-maturity-model/</loc><lastmod>2026-05-04T21:16:22+00:00</lastmod></url><url><loc>/blog/a-multi-front-war-in-cyber-security/</loc><lastmod>2025-06-19T20:07:14+00:00</lastmod></url><url><loc>/tags/analysis/</loc><lastmod>2025-06-19T20:07:14+00:00</lastmod></url><url><loc>/tags/analyst/</loc><lastmod>2025-06-19T20:07:14+00:00</lastmod></url><url><loc>/categories/intelligence/</loc><lastmod>2025-06-19T20:07:14+00:00</lastmod></url><url><loc>/tags/ransomware/</loc><lastmod>2025-06-19T20:07:14+00:00</lastmod></url><url><loc>/tags/threat-intelligence/</loc><lastmod>2025-06-19T20:07:14+00:00</lastmod></url><url><loc>/blog/recent-cyber-security-events-that-may-affect-you-round-two/</loc><lastmod>2025-06-13T22:42:00+00:00</lastmod></url><url><loc>/blog/may-16-2025-cybersecurity-briefing-a-review-for-it-leaders-and-security-professionals/</loc><lastmod>2025-05-16T23:36:00+00:00</lastmod></url><url><loc>/categories/news/</loc><lastmod>2025-05-16T23:36:00+00:00</lastmod></url><url><loc>/tags/news/</loc><lastmod>2025-05-16T23:36:00+00:00</lastmod></url><url><loc>/blog/recent-cyber-security-events-that-may-affect-you/</loc><lastmod>2025-03-21T19:42:00+00:00</lastmod></url><url><loc>/tags/apt/</loc><lastmod>2025-03-11T18:33:36+00:00</lastmod></url><url><loc>/blog/large-scale-cyberattack-targets-internet-service-providers/</loc><lastmod>2025-03-11T18:33:36+00:00</lastmod></url><url><loc>/blog/vmware-esxi-vulnerabilities-fuel-ransomware-attacks/</loc><lastmod>2025-03-10T15:10:29+00:00</lastmod></url><url><loc>/blog/trending-story-brg-suffers-ransomware-attack-amidst-buyout/</loc><lastmod>2025-03-08T01:21:00+00:00</lastmod></url><url><loc>/blog/data-breaches-and-you-what-you-need-to-know/</loc><lastmod>2025-03-07T22:52:25+00:00</lastmod></url><url><loc>/blog/this-week-in-cybersecurity-a-critical-review-for-it-leaders-and-security-professionals/</loc><lastmod>2025-03-07T19:22:00+00:00</lastmod></url><url><loc>/blog/the-ai-powered-ransomware-surge-are-cybercriminals-getting-lazier-or-smarter/</loc><lastmod>2025-03-07T02:51:00+00:00</lastmod></url><url><loc>/blog/badbox-2-0-a-massive-botnet-infecting-millions-of-devices/</loc><lastmod>2025-03-06T02:18:00+00:00</lastmod></url><url><loc>/blog/cybersecurity-threats-protect-yourself-in-2025-and-beyond/</loc><lastmod>2025-03-06T00:49:16+00:00</lastmod></url><url><loc>/blog/examining-the-fallout-from-the-change-healthcare-cyberattack/</loc><lastmod>2025-03-05T00:23:00+00:00</lastmod></url><url><loc>/blog/cybersecurity-takes-center-stage-a-summary-of-top-trends/</loc><lastmod>2025-03-04T13:59:26+00:00</lastmod></url><url><loc>/blog/over-100-us-spies-fired-for-misuse-of-secure-communication-platforms/</loc><lastmod>2025-03-03T23:59:00+00:00</lastmod></url><url><loc>/blog/significant-security-events-for-the-week-of-feb-28th/</loc><lastmod>2025-02-28T12:19:36+00:00</lastmod></url><url><loc>/blog/a-deep-dive-into-the-latest-ransomware-scourge-ethan/</loc><lastmod>2025-02-28T11:31:00+00:00</lastmod></url><url><loc>/blog/the-lazarus-groups-record-breaking-crypto-heist-a-1-5-billion-blow-to-bybit/</loc><lastmod>2025-02-27T11:45:16+00:00</lastmod></url><url><loc>/blog/chinese-hacking-group-breached-the-rnc-communications-systems/</loc><lastmod>2025-02-26T14:22:00+00:00</lastmod></url><url><loc>/blog/gmail-security-upgrade-qr-codes-replace-sms-for-enhanced-authentication/</loc><lastmod>2025-02-25T19:30:28+00:00</lastmod></url><url><loc>/blog/dogecoin-hack-and-elon-musks-restricted-access/</loc><lastmod>2025-02-22T01:06:00+00:00</lastmod></url><url><loc>/blog/significant-cybersecurity-incidents-of-the-past-week/</loc><lastmod>2025-02-21T20:02:00+00:00</lastmod></url><url><loc>/blog/deepseek-cybersecurity-nightmare-for-individuals-and-enterprise/</loc><lastmod>2025-02-19T21:26:00+00:00</lastmod></url><url><loc>/blog/daily-driveby-feb-19-2025/</loc><lastmod>2025-02-19T00:12:00+00:00</lastmod></url><url><loc>/blog/us-coast-guard-data-breach-delayed-pay-for-hundreds/</loc><lastmod>2025-02-18T03:21:00+00:00</lastmod></url><url><loc>/blog/this-week-in-cybersecurity-a-critical-review-for-it-and-security-leaders/</loc><lastmod>2025-02-14T11:44:00+00:00</lastmod></url><url><loc>/blog/elon-musks-doge-a-cybersecurity-nightmare/</loc><lastmod>2025-02-14T01:22:00+00:00</lastmod></url><url><loc>/blog/ban-of-deepseek-by-taiwan-a-cybersecurity-wake-up-call/</loc><lastmod>2025-02-12T03:06:00+00:00</lastmod></url><url><loc>/blog/the-deepseek-ai-data-leak-and-its-global-fallout/</loc><lastmod>2025-02-10T21:58:00+00:00</lastmod></url><url><loc>/blog/zyxels-unpatched-zero-day-vulnerabilities-cybersecurity-crisis-in-the-making/</loc><lastmod>2025-02-09T03:40:03+00:00</lastmod></url><url><loc>/blog/a-weekly-analysis-for-it-leaders-and-cybersecurity-professionals/</loc><lastmod>2025-02-07T20:02:00+00:00</lastmod></url><url><loc>/blog/deepseek-malware-distributed-via-fake-packages-potential-cybersecurity-crisis/</loc><lastmod>2025-02-07T11:24:46+00:00</lastmod></url><url><loc>/blog/deepfakes-and-the-25-million-heist-a-new-era-of-cybercrime/</loc><lastmod>2025-02-06T18:16:00+00:00</lastmod></url><url><loc>/blog/the-fall-of-major-cybercrime-marketplaces/</loc><lastmod>2025-02-05T15:40:00+00:00</lastmod></url><url><loc>/blog/the-rise-of-ai-powered-attacks-and-the-urgent-need-for-enhanced-defenses/</loc><lastmod>2025-02-05T02:10:43+00:00</lastmod></url><url><loc>/blog/the-fallout-from-the-rahman-espionage-case/</loc><lastmod>2025-02-04T01:45:57+00:00</lastmod></url><url><loc>/blog/critical-cybersecurity-events-january-25th-31st-2025/</loc><lastmod>2025-01-31T23:02:00+00:00</lastmod></url><url><loc>/blog/linkedin-ai-training-lawsuit-cybersecurity-flashpoint/</loc><lastmod>2025-01-30T20:40:00+00:00</lastmod></url><url><loc>/blog/fbi-warning-disable-local-admin-accounts-thwart-north-korean-cyber-attacks/</loc><lastmod>2025-01-29T23:38:00+00:00</lastmod></url><url><loc>/blog/a-multi-pronged-attack-targeting-individuals-and-organizations/</loc><lastmod>2025-01-28T21:16:22+00:00</lastmod></url><url><loc>/tags/daily-cyber-news/</loc><lastmod>2025-01-28T21:16:22+00:00</lastmod></url><url><loc>/tags/best-practice/</loc><lastmod>2024-04-30T00:36:00+00:00</lastmod></url><url><loc>/tags/engineer/</loc><lastmod>2024-04-30T00:36:00+00:00</lastmod></url><url><loc>/categories/fundamentals/</loc><lastmod>2024-04-30T00:36:00+00:00</lastmod></url><url><loc>/blog/ubuntu-24-04-new-features-new-look-new-technology-but-is-it-worth-the-upgrade/</loc><lastmod>2024-04-30T00:36:00+00:00</lastmod></url><url><loc>/blog/fedora-40-first-impressions-of-a-debian-user/</loc><lastmod>2024-04-25T00:10:34+00:00</lastmod></url><url><loc>/categories/guides/</loc><lastmod>2023-06-09T02:45:52+00:00</lastmod></url><url><loc>/blog/pgp-what-is-it-and-how-to-use-it/</loc><lastmod>2023-06-09T02:45:52+00:00</lastmod></url><url><loc>/tags/tutorial/</loc><lastmod>2023-06-09T02:45:52+00:00</lastmod></url><url><loc>/blog/dns-tutorial-how-the-domain-name-system-works/</loc><lastmod>2023-05-29T16:01:24+00:00</lastmod></url><url><loc>/blog/lenovo-yoga-6-review-my-new-mobile-linux-machine/</loc><lastmod>2023-02-11T21:52:03+00:00</lastmod></url><url><loc>/categories/reviews/</loc><lastmod>2023-02-11T21:52:03+00:00</lastmod></url><url><loc>/tags/tool-comparison/</loc><lastmod>2023-02-11T21:52:03+00:00</lastmod></url><url><loc>/blog/quick-config-realtek-wireless-and-bluetooth-drivers-lenovo-yoga-6-ubuntu/</loc><lastmod>2023-02-11T13:46:14+00:00</lastmod></url><url><loc>/blog/quick-config-chronyd-will-not-start-in-lxd-containers/</loc><lastmod>2023-02-09T00:12:53+00:00</lastmod></url><url><loc>/blog/linux-is-it-right-for-me-and-how-to-install-it/</loc><lastmod>2023-02-07T01:10:48+00:00</lastmod></url><url><loc>/blog/pixel-buds-pro-a-brief-review/</loc><lastmod>2023-02-04T00:59:46+00:00</lastmod></url><url><loc>/blog/my-favorite-distos-and-why/</loc><lastmod>2023-02-01T21:10:00+00:00</lastmod></url><url><loc>/blog/ubuntu-22-04-ldap-kerberos-client-authentication/</loc><lastmod>2023-01-27T20:16:26+00:00</lastmod></url><url><loc>/blog/ubuntu-22-04-install-openldap-server/</loc><lastmod>2023-01-25T18:48:00+00:00</lastmod></url><url><loc>/blog/ubuntu-22-04-install-kerberos-server/</loc><lastmod>2023-01-18T19:27:54+00:00</lastmod></url><url><loc>/blog/ubuntu-22-04-install-bind-dns-server/</loc><lastmod>2023-01-10T13:50:47+00:00</lastmod></url><url><loc>/blog/pop_os-22-04-building-an-lxd-lab/</loc><lastmod>2023-01-09T23:06:00+00:00</lastmod></url><url><loc>/blog/pop-os-window-lag-when-moving-windows/</loc><lastmod>2022-09-19T14:46:00+00:00</lastmod></url><url><loc>/blog/chromebook-duet-5-first-impressions/</loc><lastmod>2022-05-08T14:44:36+00:00</lastmod></url><url><loc>/blog/kali-in-a-docker-container/</loc><lastmod>2022-01-07T15:57:08+00:00</lastmod></url><url><loc>/tags/ubuntu/</loc><lastmod>2022-01-07T15:57:08+00:00</lastmod></url><url><loc>/blog/personal-security-policy-protect-your-digital-life/</loc><lastmod>2021-07-06T23:50:00+00:00</lastmod></url><url><loc>/blog/change-default-raspberry-pi-password/</loc><lastmod>2020-10-02T19:24:51+00:00</lastmod></url><url><loc>/blog/patching-why-it-is-important-just-do-it/</loc><lastmod>2020-05-20T12:55:00+00:00</lastmod></url><url><loc>/blog/mfa-what-is-it-and-why-you-must-have-it/</loc><lastmod>2020-03-04T17:04:00+00:00</lastmod></url><url><loc>/blog/passwords-best-practice-and-hygene/</loc><lastmod>2020-02-07T05:46:00+00:00</lastmod></url><url><loc>/tags/security/</loc><lastmod>2020-02-07T05:46:00+00:00</lastmod></url><url><loc>/tags/linux/</loc><lastmod>2016-04-09T02:40:59+00:00</lastmod></url><url><loc>/blog/mod-security-atomicorp-rules-blocking-cloudflare/</loc><lastmod>2016-04-09T02:40:59+00:00</lastmod></url><url><loc>/blog/create-vmware-teplate-centos-6-5/</loc><lastmod>2015-06-12T17:57:09+00:00</lastmod></url><url><loc>/blog/create-a-vmware-template-ubuntu-12-04/</loc><lastmod>2015-03-04T15:10:09+00:00</lastmod></url><url><loc>/blog/manage-auto-start-services-on-centos/</loc><lastmod>2014-06-17T18:12:36+00:00</lastmod></url><url><loc>/tags/red-hat/</loc><lastmod>2014-06-17T18:12:36+00:00</lastmod></url><url><loc>/blog/configure-exchange-2010-autodiscover/</loc><lastmod>2014-02-27T14:01:17+00:00</lastmod></url><url><loc>/tags/windows/</loc><lastmod>2014-02-27T14:01:17+00:00</lastmod></url><url><loc>/blog/must-have-security-audit-tools/</loc><lastmod>2014-02-22T01:49:57+00:00</lastmod></url><url><loc>/tags/security-news/</loc><lastmod>2014-02-22T01:49:57+00:00</lastmod></url><url><loc>/blog/build-a-secure-ftp-server-with-centos-and-vsftpd/</loc><lastmod>2014-02-07T21:55:48+00:00</lastmod></url><url><loc>/blog/securing-an-ubuntudebian-lamp-server/</loc><lastmod>2014-01-16T02:20:14+00:00</lastmod></url><url><loc>/authors/</loc></url><url><loc>/contact/</loc></url><url><loc>/services/security-program-design/</loc></url><url><loc>/authors/jason-duff/</loc></url><url><loc>/about/</loc></url><url><loc>/pages/</loc></url><url><loc>/privacy-policy/</loc></url><url><loc>/sections/</loc></url><url><loc>/services/security-architecture/</loc></url><url><loc>/services/security-consulting/</loc></url><url><loc>/services/</loc></url></urlset>