<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <!-- This file was automatically generated by https://github.com/bartholomej/svelte-sitemap v2.6.0 -->
  <url>
    <loc>https://defusedcyber.com/about</loc>
  </url>
  <url>
    <loc>https://defusedcyber.com/backlog-crisis-at-nvd</loc>
  </url>
  <url>
    <loc>https://defusedcyber.com/blog</loc>
  </url>
  <url>
    <loc>https://defusedcyber.com/citrix-netscaler-cve-2026-3055-honeypot-telemetry</loc>
  </url>
  <url>
    <loc>https://defusedcyber.com/contact</loc>
  </url>
  <url>
    <loc>https://defusedcyber.com/cyber-deception-has-use-cases-youre-not-thinking-of</loc>
  </url>
  <url>
    <loc>https://defusedcyber.com/cyber-deception-vs-honeypots</loc>
  </url>
  <url>
    <loc>https://defusedcyber.com/deception-plays-a-large-role-in-nist-sp-800-160</loc>
  </url>
  <url>
    <loc>https://defusedcyber.com/defused</loc>
  </url>
  <url>
    <loc>https://defusedcyber.com/how-to-detect-vmware-esxi-exploitation</loc>
  </url>
  <url>
    <loc>https://defusedcyber.com</loc>
  </url>
  <url>
    <loc>https://defusedcyber.com/ivanti-epmm-sleeper-shells-403jsp</loc>
  </url>
  <url>
    <loc>https://defusedcyber.com/learnings-from-the-dispossessor-ransomware-leak</loc>
  </url>
  <url>
    <loc>https://defusedcyber.com/misconceptions-of-ai-driven-attacks-in-infosec</loc>
  </url>
  <url>
    <loc>https://defusedcyber.com/pricing</loc>
  </url>
  <url>
    <loc>https://defusedcyber.com/privacy</loc>
  </url>
  <url>
    <loc>https://defusedcyber.com/product</loc>
  </url>
  <url>
    <loc>https://defusedcyber.com/react2shell-exploitation-honeypot-analysis</loc>
  </url>
  <url>
    <loc>https://defusedcyber.com/revisiting-cve-2021-34527-printnightmare</loc>
  </url>
  <url>
    <loc>https://defusedcyber.com/sharepoint-exploit-intelligence-with-honeypots</loc>
  </url>
  <url>
    <loc>https://defusedcyber.com/starter</loc>
  </url>
  <url>
    <loc>https://defusedcyber.com/terms</loc>
  </url>
  <url>
    <loc>https://defusedcyber.com/threat-vectors-to-watch-for-h2-2024</loc>
  </url>
  <url>
    <loc>https://defusedcyber.com/uncovering-a-crypto-turfwar-with-cloud-decoys</loc>
  </url>
  <url>
    <loc>https://defusedcyber.com/vulnerabilities-long-tail</loc>
  </url>
  <url>
    <loc>https://defusedcyber.com/what-is-deception-technology</loc>
  </url>
  <url>
    <loc>https://defusedcyber.com/when-patching-doesnt-help-cve-2015-2291-bring-your-own-vulnerable-driver</loc>
  </url>
  <url>
    <loc>https://defusedcyber.com/zero-trust-and-deception</loc>
  </url>
  <url>
    <loc>https://defusedcyber.com/product/credential</loc>
  </url>
  <url>
    <loc>https://defusedcyber.com/product/external</loc>
  </url>
  <url>
    <loc>https://defusedcyber.com/product/internal</loc>
  </url>
  <url>
    <loc>https://defusedcyber.com/product/response</loc>
  </url>
</urlset>