<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://welearnsecurity.com/2023/08/09/millions-stolen-from-crypto-platforms-through-exploited-vyper-vulnerability/</loc><lastmod>2023-08-09T17:09:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://welearnsecurity.com/2023/08/09/owasp-top-10-for-large-language-model-applications/</loc><lastmod>2023-08-09T16:40:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://welearnsecurity.com/2023/07/26/iranian-hackers-sophisticated-malware-targets-windows-and-macos-users/</loc><lastmod>2023-07-26T16:52:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://welearnsecurity.com/2023/07/25/common-cyber-threat-intel-biases/</loc><lastmod>2023-07-25T20:02:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://welearnsecurity.com/2023/07/18/microsoft-edge-msdcpdf-javascript-addicon-type-confusion-vulnerability/</loc><lastmod>2023-07-18T07:10:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://welearnsecurity.com/2023/07/11/microsoft-unpatched-office-zero-day-exploited-in-nato-summit-attacks/</loc><lastmod>2023-07-11T18:41:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://welearnsecurity.com/2023/06/23/1510/</loc><lastmod>2023-07-07T10:09:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://welearnsecurity.com/2023/07/06/introducing-superalignment/</loc><lastmod>2023-07-06T19:27:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://welearnsecurity.com/2023/07/05/mitre-atlas/</loc><lastmod>2023-07-05T15:55:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://welearnsecurity.com/2023/07/04/russian-cyber-war-an-elite-russian-hacker-spells-out-his-vision-for-information-confrontation-in-world-politics/</loc><lastmod>2023-07-04T19:47:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://welearnsecurity.com/2023/07/02/how-a-shady-chinese-firms-encryption-chips-got-inside-the-us-navy-nato-and-nasa/</loc><lastmod>2023-07-02T20:42:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://welearnsecurity.com/2023/07/01/the-boom-the-bust-and-the-adjust/</loc><lastmod>2023-07-01T11:29:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://welearnsecurity.com/2023/07/01/hackers-claim-to-take-down-russian-satellite-communications-provider/</loc><lastmod>2023-07-01T11:23:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://welearnsecurity.com/2023/06/28/swiss-intelligence-warns-of-fallout-in-cyberspace-as-west-clamps-down-on-spies/</loc><lastmod>2023-06-28T20:00:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://welearnsecurity.com/2023/06/24/someone-is-posing-as-a-fake-security-company-to-create-malicious-github-repositories/</loc><lastmod>2023-06-24T20:08:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://welearnsecurity.com/2023/06/23/black-hat-toolswatch-sector-toronto-2023-first-arsenal-call-for-tools-open/</loc><lastmod>2023-06-23T18:44:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://welearnsecurity.com/2023/01/28/quantum-computing-and-it-security-implications/</loc><image:image><image:loc>https://welearnsecurity.com/wp-content/uploads/2023/01/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2023-01-28T16:54:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://welearnsecurity.com/2021/08/01/course-review-active-directory-pentesting-full-course-red-team-hacking/</loc><lastmod>2021-08-01T14:29:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://welearnsecurity.com/2020/08/26/softskills-cv-job-application-and-interviews/</loc><lastmod>2020-08-26T19:17:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://welearnsecurity.com/2019/06/15/review-portswigger-web-security-academy/</loc><lastmod>2020-08-20T09:29:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://welearnsecurity.com/2019/05/19/from-beginner-to-expert-as-penetration-tester/</loc><lastmod>2020-08-18T15:47:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://welearnsecurity.com/2020/08/11/softskills-networking-for-your-career/</loc><lastmod>2020-08-11T18:59:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://welearnsecurity.com/2020/08/07/career-path-red-teaming/</loc><lastmod>2020-08-07T10:09:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://welearnsecurity.com/links/</loc><lastmod>2020-08-01T23:43:04+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://welearnsecurity.com/2019/05/11/coursera-courses-for-free/</loc><lastmod>2020-05-07T20:08:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://welearnsecurity.com/2020/01/12/review-pentester-academy-and-attackdefense-labs/</loc><lastmod>2020-05-07T20:00:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://welearnsecurity.com/2019/05/28/working-at-a-cert-and-shifting-to-technical-lead/</loc><lastmod>2020-05-06T18:17:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://welearnsecurity.com/2020/04/22/review-effective-information-security-writing/</loc><lastmod>2020-04-22T19:06:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://welearnsecurity.com/2019/11/24/hackthebox-writeup/</loc><lastmod>2019-11-24T15:42:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://welearnsecurity.com/2019/09/16/book-review-real-world-bug-hunting/</loc><lastmod>2019-11-17T19:04:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://welearnsecurity.com/2019/07/16/career-path-security-researcher-bug-bounty/</loc><lastmod>2019-11-17T19:03:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://welearnsecurity.com/2019/07/05/book-review-the-hacker-playbook-3/</loc><lastmod>2019-11-17T19:03:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://welearnsecurity.com/2019/06/27/book-review-hands-on-bug-hunting-for-penetration-testers/</loc><lastmod>2019-11-17T19:03:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://welearnsecurity.com/2019/06/23/career-path-penetration-testing-basics/</loc><lastmod>2019-11-17T18:25:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://welearnsecurity.com/2019/06/15/career-path-security-basics/</loc><lastmod>2019-11-17T18:24:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://welearnsecurity.com/recommendations/</loc><lastmod>2019-11-17T18:21:17+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://welearnsecurity.com/2019/08/13/review-black-hat-defcon-2019/</loc><lastmod>2019-10-25T20:29:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://welearnsecurity.com/2019/09/24/usefull-add-ons-for-webapp-pentesting-and-bug-bounty/</loc><lastmod>2019-09-26T09:56:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://welearnsecurity.com/2019/09/11/review-threatcon-offensive-html-svg-css-other-browser-evil/</loc><lastmod>2019-09-11T21:34:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://welearnsecurity.com/2019/08/20/interview-with-christoph-haas/</loc><lastmod>2019-08-21T06:23:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://welearnsecurity.com/2019/07/19/more-free-pentesting-resources/</loc><lastmod>2019-07-19T22:05:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://welearnsecurity.com/2019/06/29/write-up-hackthebox-netmon/</loc><lastmod>2019-06-29T21:10:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://welearnsecurity.com/2019/06/13/certifications-pro-con/</loc><lastmod>2019-06-13T20:41:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://welearnsecurity.com/2019/06/08/review-wargames-over-the-wire/</loc><lastmod>2019-06-08T13:04:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://welearnsecurity.com/2019/05/04/start-a-penetration-tester-career/</loc><lastmod>2019-06-02T16:55:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://welearnsecurity.com/2019/05/31/getting-started-with-hackthebox/</loc><lastmod>2019-06-01T08:52:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://welearnsecurity.com/2019/05/11/edx-courses-for-free/</loc><lastmod>2019-05-18T08:55:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://welearnsecurity.com/2019/05/18/short-review-x33fcon/</loc><lastmod>2019-05-18T08:49:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://welearnsecurity.com/2019/03/04/edx-course-security-in-office-365-microsoft-cld245x/</loc><lastmod>2019-05-04T16:49:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://welearnsecurity.com/2018/07/08/review-cybrary-advanced-cyber-threat-intelligence/</loc><lastmod>2019-05-04T16:48:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://welearnsecurity.com/2018/06/30/review-udemy-certified-cyber-threat-intelligence-analyst/</loc><lastmod>2019-05-04T16:48:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://welearnsecurity.com/2018/06/20/review-udemy-certified-advanced-persistent-threat-analyst/</loc><lastmod>2019-05-04T16:47:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://welearnsecurity.com/2019/01/10/recommended-talks-for-the-new-year-mainly-35c3/</loc><lastmod>2019-05-04T16:44:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://welearnsecurity.com/2018/01/05/recommended-talks-for-the-new-year-34c3-bh/</loc><lastmod>2019-05-04T16:43:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://welearnsecurity.com/about/</loc><lastmod>2019-05-04T09:36:45+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://welearnsecurity.com/legal-notice/</loc><lastmod>2019-05-03T20:14:46+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://welearnsecurity.com/contact/</loc><image:image><image:loc>https://welearnsecurity.com/wp-content/uploads/2019/04/person-smartphone-office-table.jpeg</image:loc><image:title>Placeholder Image</image:title></image:image><lastmod>2019-04-29T15:58:07+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://welearnsecurity.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2023-08-09T17:09:12+00:00</lastmod></url></urlset>
