<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//attackiq.v11.site/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://attackiq.v11.site/blog/</loc>
		<lastmod>2025-08-04T21:58:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2016/06/21/why-every-ciso-should-learn-how-to-pick-locks/</loc>
		<lastmod>2016-06-21T12:00:48+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2017/05/ft-46.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2016/06/27/next-generation-security-teams-are-watching-the-game-plays-are-you/</loc>
		<lastmod>2016-06-27T12:00:40+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2017/05/ft-45.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2016/07/07/anatomy-of-a-ransomware-attack/</loc>
		<lastmod>2016-07-07T12:00:26+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2017/05/ft-44.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2016/09/29/why-we-are-releasing-a-free-firedrill-edition/</loc>
		<lastmod>2016-09-29T12:00:52+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2017/05/ft-43.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2016/10/19/gameon-security-challenge-submission-deadline-extended/</loc>
		<lastmod>2016-10-19T12:00:16+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2017/05/ft-42.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2017/05/15/wannacry-ransomware-lessons-learned/</loc>
		<lastmod>2017-05-15T12:00:46+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2017/05/ft-41.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2017/05/27/how-the-experian-data-breach-case-might-change-the-protection-of-breach-investigation-reports/</loc>
		<lastmod>2017-05-27T12:00:08+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2018/06/ft-40.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2017/08/17/offensive-defense/</loc>
		<lastmod>2017-08-17T12:00:33+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2018/06/ft-39.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2018/05/14/bypassing-uac-using-registry-keys/</loc>
		<lastmod>2018-05-14T12:00:06+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2018/06/ft-38.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2018/05/blog-bypassing-uac-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2018/05/blog-bypassing-uac-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2018/05/blog-bypassing-uac-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2018/05/blog-bypassing-uac-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2018/05/blog-bypassing-uac-05.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2018/05/blog-bypassing-uac-06.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2018/05/blog-bypassing-uac-07.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2018/05/21/application-whitelist-bypass/</loc>
		<lastmod>2018-05-21T12:00:30+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2018/06/ft-37.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2018/05/blog-app-whitelist-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2018/05/blog-app-whitelist-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2018/05/blog-app-whitelist-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2018/05/blog-app-whitelist-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2018/05/blog-app-whitelist-05.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2018/05/22/attackiq-new-product-feature-cyber-hunt-exercise-module/</loc>
		<lastmod>2018-05-22T12:00:55+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2018/06/ft-36.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2018/06/28/mitre-attck-module/</loc>
		<lastmod>2018-06-28T12:00:22+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2018/06/ft-35.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2018/06/blog-ma-mod-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2018/06/blog-ma-mod-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2018/06/blog-ma-mod-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2018/06/blog-ma-mod-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2018/06/blog-ma-mod-05.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2018/06/blog-ma-mod-06.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2018/06/29/automated-query-engine-full-scenario-coverage-no-need-to-write-queries/</loc>
		<lastmod>2018-06-29T12:00:54+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2018/06/ft-34.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2018/06/blog-aqe-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2018/06/blog-aqe-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2018/06/blog-aqe-03.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2018/10/11/is-your-gold-disk-putting-you-at-risk/</loc>
		<lastmod>2018-10-11T12:00:29+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2019/06/ft-33.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2018/10/blog-gold-disk-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2018/10/blog-gold-disk-02.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2019/02/25/tips-for-rsa-2019/</loc>
		<lastmod>2019-02-25T12:00:04+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2019/06/ft-32.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2019/03/13/rising-above-the-noise-at-rsa/</loc>
		<lastmod>2019-03-13T12:00:31+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2019/06/ft-31.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2019/03/24/the-evolution-of-malware-fileless-exploits/</loc>
		<lastmod>2019-03-24T12:00:51+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2019/06/ft-30.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2019/03/blog-evo-malware-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2019/03/31/mitre-attck-evaluations-of-cyber-security-products/</loc>
		<lastmod>2019-03-31T12:00:17+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2019/06/ft-29.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2019/03/blog-ma-eval-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2019/03/blog-ma-eval-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2019/03/blog-ma-eval-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2019/03/blog-ma-eval-04.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2019/04/14/locker-goga-the-2019-addition-to-the-ransomware-family/</loc>
		<lastmod>2019-04-14T12:00:40+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2019/06/ft-28.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2019/04/blog-locker-goga-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2019/04/blog-locker-goga-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2019/04/blog-locker-goga-03.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2019/04/28/open-source-vulnerability-management/</loc>
		<lastmod>2019-04-28T12:00:10+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2019/06/ft-27.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2019/04/blog-open-source-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2019/05/05/securing-your-supply-chain/</loc>
		<lastmod>2019-05-05T12:00:27+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2019/06/ft-26.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2019/05/blog-supply-change-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2019/05/12/why-is-container-security-important/</loc>
		<lastmod>2019-05-12T12:00:49+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2019/06/ft-25.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2019/05/blog-container-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2019/05/blog-container-02.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2019/06/05/the-5-keys-to-success-in-evaluating-a-security-validation-platform/</loc>
		<lastmod>2019-06-05T12:00:05+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2019/06/ft-24.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2019/06/11/improving-the-maturity-of-your-security-program/</loc>
		<lastmod>2019-06-11T12:00:27+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2019/06/ft-23.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2019/06/14/all-vulnerabilities-are-not-created-equal/</loc>
		<lastmod>2019-06-14T12:00:52+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2019/06/ft-22.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2019/06/blog-not-equal-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2019/06/blog-not-equal-02.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2019/06/blog-not-equal-03.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2019/06/blog-not-equal-04.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2019/06/17/attack-paths-and-kill-chains-attackiq-contributions-to-the-verizon-2019-dbir-report/</loc>
		<lastmod>2019-06-17T12:00:19+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2019/06/ft-21.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2019/06/17/indicators-of-compromise/</loc>
		<lastmod>2019-06-17T12:00:40+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2019/06/ft-20.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2019/06/blog-ind-comp-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2019/06/24/nasa-jpl-breaches-a-reminder-of-basic-cyber-security-hygiene/</loc>
		<lastmod>2019-06-24T12:00:03+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2019/06/ft-19.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2019/06/blog-jpl-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2019/06/25/case-study-when-threat-intelligence-and-red-team-get-married/</loc>
		<lastmod>2019-06-25T12:00:35+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2019/06/ft-18.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2019/06/28/predicting-attack-behavior-ransomware-patterns-strategic-leaders-need-to-be-aware-of/</loc>
		<lastmod>2019-06-28T12:00:17+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2019/06/ft-16.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2019/11/18/attackiqs-extreme-ownership-giving-back-to-our-community-through-research/</loc>
		<lastmod>2019-11-18T12:00:40+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/07/blog-ft-16.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2020/01/08/the-hornets-nest-was-just-kicked-whats-your-move-2/</loc>
		<lastmod>2020-01-08T23:08:38+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/07/blog-ft-15.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/01/blog-hornet-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/01/blog-hornet-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/01/blog-hornet-03.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2020/01/27/where-to-find-attackiq-at-rsa-2020/</loc>
		<lastmod>2020-01-27T12:00:08+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/07/blog-ft-14.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/01/blog-rsa-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/01/blog-rsa-02.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/01/blog-rsa-03.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2020/02/26/emulating-apt29-with-attackiq/</loc>
		<lastmod>2020-02-26T12:00:25+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/07/blog-ft-13.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/02/blog-apt29-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/02/blog-apt29-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/02/blog-apt29-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/02/blog-apt29-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/02/blog-apt29-05.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/02/blog-apt29-06.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/02/blog-apt29-07.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/02/blog-apt29-08.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/02/blog-apt29-09.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/02/blog-apt29-10.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2020/03/26/component-object-model-hijacking/</loc>
		<lastmod>2020-03-26T12:00:46+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/07/blog-ft-12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/03/blog-comp-obj-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/03/blog-comp-obj-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/03/blog-comp-obj-03.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/03/blog-comp-obj-04.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/03/blog-comp-obj-05.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/03/blog-comp-obj-06.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/03/blog-comp-obj-07.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/03/blog-comp-obj-08.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/03/blog-comp-obj-09.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/03/blog-comp-obj-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/03/blog-comp-obj-11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/03/blog-comp-obj-12.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2020/03/30/defeating-a-cloud-breach-part-1/</loc>
		<lastmod>2020-03-30T12:00:05+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/07/blog-ft-11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/03/blog-def-cloud-1-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/03/blog-def-cloud-1-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/03/blog-def-cloud-1-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/03/blog-def-cloud-1-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/03/blog-def-cloud-1-05.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/03/blog-def-cloud-1-06.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/03/blog-def-cloud-1-07.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/03/blog-def-cloud-1-08.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/03/blog-def-cloud-1-09.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/03/blog-def-cloud-1-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/03/blog-def-cloud-1-11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/03/blog-def-cloud-1-12.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2020/04/06/defeating-a-cloud-breach-part-2/</loc>
		<lastmod>2020-04-06T12:00:24+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/07/blog-ft-11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/04/blog-def-cloud-2-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/04/blog-def-cloud-2-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/04/blog-def-cloud-2-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/04/blog-def-cloud-2-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/04/blog-def-cloud-2-05.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/04/blog-def-cloud-2-06.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/04/blog-def-cloud-2-07.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/04/blog-def-cloud-2-08.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/04/blog-def-cloud-2-09.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2020/04/14/defeating-a-cloud-breach-part-3/</loc>
		<lastmod>2020-04-14T12:00:43+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/07/blog-ft-11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/04/blog-def-cloud-3-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/04/blog-def-cloud-3-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/04/blog-def-cloud-3-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/04/blog-def-cloud-3-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/04/blog-def-cloud-3-05.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/04/blog-def-cloud-3-06.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/04/blog-def-cloud-3-07.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/04/blog-def-cloud-3-08.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/04/blog-def-cloud-3-09.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/04/blog-def-cloud-3-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/04/blog-def-cloud-3-11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/04/blog-def-cloud-3-12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/04/blog-def-cloud-3-13.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/04/blog-def-cloud-3-14.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/04/blog-def-cloud-3-15.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/04/blog-def-cloud-3-16.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2020/04/20/fingerprinting-fin7/</loc>
		<lastmod>2020-04-20T12:00:59+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/07/blog-ft-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/04/blog-fin7-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/04/blog-fin7-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/04/blog-fin7-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/04/blog-fin7-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/04/blog-fin7-05.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/04/blog-fin7-06.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/04/blog-fin7-07.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2020/05/15/threat-informed-defense-and-purple-teaming-lessons-from-u-s-cyber-command/</loc>
		<lastmod>2020-05-15T12:00:22+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/07/blog-ft-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2020/05/18/why-i-joined-attackiq-compelling-mission-amazing-team/</loc>
		<lastmod>2020-05-18T12:00:41+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/07/blog-ft-09.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2020/05/20/2020-verizon-data-breach-investigations-report-analysis-findings-and-attackiq-commentary/</loc>
		<lastmod>2020-05-20T12:00:07+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/07/blog-ft-08.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2020/05/22/purple-teaming-chronicles-part-1/</loc>
		<lastmod>2020-05-22T12:00:26+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/07/blog-ft-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/05/blog-purple-team-1-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/05/blog-purple-team-1-02.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/05/blog-purple-team-1-03.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/05/blog-purple-team-1-04.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/07/Purple-Teaming-for-Dummies-Amplify.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2020/06/04/before-the-election-states-need-to-test-their-cybersecurity-continuously/</loc>
		<lastmod>2020-06-04T12:00:19+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/07/blog-ft-07.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2020/06/15/covid-19-is-forcing-hard-cybersecurity-choices/</loc>
		<lastmod>2020-06-15T12:00:38+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/07/blog-ft-06.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2020/06/15/think-bad-do-good-ep-2-how-to-achieve-cybersecurity-effectiveness/</loc>
		<lastmod>2020-06-15T12:00:53+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/07/blog-ft-03.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2020/06/16/australian-cyber-security-centre-acsc-attacker-trends-useful-information-from-the-government/</loc>
		<lastmod>2020-06-16T12:00:37+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/07/blog-ft-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/06/blog-acsc-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2020/06/30/purple-teaming-chronicles-ii-red-team-augmentation/</loc>
		<lastmod>2020-06-30T12:00:54+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/07/blog-ft-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/06/blog-purple-team-2-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/06/blog-purple-team-2-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/06/blog-purple-team-2-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/06/blog-purple-team-2-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/06/blog-purple-team-2-05.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/06/blog-purple-team-2-06.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/06/blog-purple-team-2-07.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/06/blog-purple-team-2-08.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/07/Purple-Teaming-for-Dummies-Amplify.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2020/07/07/attackiq-includes-mitre-attcks-new-sub-techniques-for-customers/</loc>
		<lastmod>2020-07-07T12:00:13+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/07/blog-ft-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/07/blog-aiq-ma-subtech-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2020/07/09/think-bad-do-good-podcast-episode-3-best-practices-in-threat-informed-defense/</loc>
		<lastmod>2020-07-09T12:00:39+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/07/blog-ft-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2020/07/23/what-security-teams-can-learn-from-the-attacks-on-twitter-and-covid-19-researchers/</loc>
		<lastmod>2020-07-23T21:24:29+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2019/06/ft-16.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2020/07/28/pilot-episode-1-apt29-and-threat-informed-defense/</loc>
		<lastmod>2020-07-29T04:43:57+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/07/ft-think-bad-do-good.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2020/07/30/episode-2-how-to-achieve-cybersecurity-effectiveness/</loc>
		<lastmod>2020-07-31T04:43:23+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/07/ft-think-bad-do-good.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2020/08/01/episode-3-best-practices-in-threat-informed-defense/</loc>
		<lastmod>2020-08-02T04:42:48+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/07/ft-think-bad-do-good.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2020/08/03/attackiqs-business-is-not-security-testing/</loc>
		<lastmod>2020-08-03T12:05:40+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/08/col-blg-not-security-testing.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2020/08/19/countering-ransomware-with-attackiqs-security-optimization-platform/</loc>
		<lastmod>2020-08-20T00:15:16+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/08/blog-ransomware-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/08/Navigator-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2020/09/15/episode-4-fin6-mitre-emulation-plan/</loc>
		<lastmod>2020-09-15T12:30:47+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/07/ft-think-bad-do-good.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2020/09/15/an-historic-plan-built-for-the-public/</loc>
		<lastmod>2020-09-15T12:30:59+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/09/col-blg-fin6.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2020/09/23/this-election-year-the-health-of-the-union-depends-on-how-we-safeguard-our-information/</loc>
		<lastmod>2020-09-23T12:30:12+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/09/Screen-Shot-2020-09-21-at-11.54.54-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2020/10/05/time-to-prepare-for-increased-u-s-china-tensions-in-cyberspace/</loc>
		<lastmod>2020-10-05T23:00:01+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/10/China-Dragon.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2020/10/16/attackiq-named-one-of-the-2020-best-small-medium-workplaces-by-great-place-to-work-and-fortune/</loc>
		<lastmod>2020-10-16T12:09:21+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/10/GPTW-Web-Thumbnail.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2020/10/26/attackiq-threat-informed-defense-vol-3/</loc>
		<lastmod>2020-10-26T17:33:34+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/08/col-ns-threat-informed-defense-newsletter.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2020/11/12/five-ways-to-lock-down-security-control-validation/</loc>
		<lastmod>2020-11-12T19:28:45+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/12/Security-Control-Lockdown-v-2.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2020/12/01/innovating-during-covid-19-to-improve-security-effectiveness/</loc>
		<lastmod>2020-12-01T19:54:43+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/12/col-rs-blog-ciso-award-covid.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2020/12/15/grandpas-new-shoes-or-how-compliance-learned-to-love-adversary-emulation/</loc>
		<lastmod>2020-12-15T15:45:47+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/12/NIST-Blog-RS.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2020/12/16/in-god-we-trust-all-others-must-bring-data/</loc>
		<lastmod>2020-12-16T18:15:40+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/12/CMMC-Blog-RS.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/12/DoD-CMMC-Assessment.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/12/rs-blg-cmmc-figure-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2020/12/23/lions-and-tigers-and-a-december-full-of-adversary-activity-oh-my/</loc>
		<lastmod>2020-12-23T18:02:14+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/12/tigers.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/12/unc2452-supply-chain-compromise-ttps.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/12/unc2452-supply-chain-compromise-ioc.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/12/red-team-toolkit-theft.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2021/01/11/risky-biz-soap-box-mapping-nist-800-53-to-mitre-attck/</loc>
		<lastmod>2021-01-11T15:53:24+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/01/col-rs-pod-risky-biz-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2021/01/12/attackiqs-automated-threat-informed-defense-approach-is-transforming-cybersecurity/</loc>
		<lastmod>2021-01-12T15:44:41+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/01/Credit_Suisse_Award_Website_Thumbnail_January2021.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2021/02/08/gao-finds-gaps-in-cyberdefenses-highlights-importance-of-breach-and-attack-simulation-tools/</loc>
		<lastmod>2021-02-08T18:19:56+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/02/gao-image.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2021/02/16/data-obfuscation-an-image-is-worth-a-thousand-lines-of-malware/</loc>
		<lastmod>2021-02-16T23:36:56+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/02/Data-Obfuscation-2.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/02/image3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/02/image1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/02/image2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/02/image4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2021/02/23/attackiq-announces-new-automated-adversary-emulation-plan-for-menupass-a-threat-group-reportedly-of-chinese-origin/</loc>
		<lastmod>2021-02-23T23:20:32+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/02/hikmet-colak-VLmU0U7BrPM-unsplash-scaled-e1614124699104.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2021/03/23/a-next-step-on-the-road-to-security-optimization/</loc>
		<lastmod>2021-03-23T13:00:23+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/03/tom-gainor-JMvWx-qEK8-unsplash-scaled-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2021/04/04/dsa-lpe-erlang-win/</loc>
		<lastmod>2021-04-04T15:07:13+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/07/ft-4.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/04/2-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/04/1-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/04/4-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/04/5-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/04/7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/04/8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/04/9.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2021/04/06/deepsurface-2-0/</loc>
		<lastmod>2021-04-06T15:03:47+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/07/ft-3.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2021/04/06/breach-and-attack-simulation-unlike-shoulder-pads-mullets-and-parachute-pants-is-a-trend-that-is-here-to-stay/</loc>
		<lastmod>2021-04-06T16:00:47+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/04/gartner-trends-80s.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2021/04/09/the-u-s-government-needs-to-overhaul-cybersecurity-heres-how/</loc>
		<lastmod>2021-04-09T18:00:31+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/04/zero-trust-walls-2-scaled-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2021/04/13/dsa-lpe-octopus-deploy-win/</loc>
		<lastmod>2021-04-13T15:23:10+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/07/ft-3.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/04/1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/04/2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/04/3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/04/4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2021/04/26/gaining-greater-visibility-into-cybersecurity-effectiveness/</loc>
		<lastmod>2021-04-27T00:38:18+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/04/jan-huber-U0cgrZQzCPk-unsplash-scaled-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2021/04/30/deepsurface-2-1/</loc>
		<lastmod>2021-04-30T15:01:28+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/07/ft-2.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2021/04/30/cyber-criminals-target-weakest-link-in-the-supply-chain-as-european-firms-accelerate-digitisation-strategies/</loc>
		<lastmod>2021-04-30T19:57:16+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/04/col-blg-telstra-ventures.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2021/05/25/building-a-stronger-community-for-threat-informed-defense/</loc>
		<lastmod>2021-05-25T17:48:55+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/05/col-blg-partner-academy-shim.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2021/06/01/deepsurface-2-2/</loc>
		<lastmod>2021-06-01T14:54:26+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/07/ft-4.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2021/06/02/dsa-lpe-confluence-win/</loc>
		<lastmod>2021-06-02T14:57:29+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/07/ft-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/06/image-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2021/06/09/dsa-lpe-rabbitmq-win/</loc>
		<lastmod>2021-06-09T15:12:32+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/07/ft-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/06/image-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/06/image-2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/06/image-3-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/06/image-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2021/06/22/10-ways-to-apply-the-mitre-attack-framework-in-your-cybersecurity-strategy/</loc>
		<lastmod>2021-06-22T15:00:12+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/06/col-blog-10-ways-ma.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2021/06/22/put-mitre-attck-to-work-through-workbench/</loc>
		<lastmod>2021-06-22T17:21:10+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/06/workbench-scaled-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2021/06/24/purple-hats-2021-it-was-an-event-brimming-with-cybersecurity-goodness/</loc>
		<lastmod>2021-06-24T15:00:06+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/06/col-blog-purple-hats-2021.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/07/Purple-Teaming-for-Dummies-Amplify.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2021/07/02/dsa-lpe-node-js-win/</loc>
		<lastmod>2021-07-02T14:50:29+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/07/ft-3.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2021/07/09/how-to-pitch-your-cfo-on-automated-security-control-validation/</loc>
		<lastmod>2021-07-09T14:55:08+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/07/col-blg-how-to-pitch-your-cfo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/07/cfo-pitch-results.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2021/07/13/the-kaseya-vsa-revil-ransomware-supply-chain-attack-how-it-happened-how-it-could-have-been-avoided/</loc>
		<lastmod>2021-07-13T16:02:19+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/07/col-blg-revil.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/07/blog-revil-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/07/blog-revil-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/07/blog-revil-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/07/blog-revil-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/07/blog-revil-05.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2021/07/16/educating-the-world-about-purple-team-operations-for-free/</loc>
		<lastmod>2021-07-16T14:49:58+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/07/ramon-salinero-vEE00Hx5d0Q-unsplash-scaled-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2021/07/29/purple-teaming-for-cybersecurity-effectiveness-10-lessons/</loc>
		<lastmod>2021-07-29T10:00:07+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/07/col-blg-pt-10-lessons.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/07/purple-teaming-for-dummies-front-cover-lp.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/08/sub-techniques.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/07/atc-screen.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2021/08/09/healthcare-under-siege-should-hospitals-pay-hackers-ransom/</loc>
		<lastmod>2021-08-09T16:00:27+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/08/col-blg-healthcare-under-siege.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/08/CISOs-Guide-to-MITRE-ATTCK-in-Healthcare-Organic.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2021/08/13/deepsurface-2-4/</loc>
		<lastmod>2021-08-13T14:22:10+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/07/ft-3.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/08/pdf-report-builder.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/08/setting-page-reorganization.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/08/smtp-settings.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2021/08/13/teamwork-making-the-dream-work/</loc>
		<lastmod>2021-08-13T16:00:28+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/08/col-blg-fortune-bptw-2021.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/08/col-blg-fortune-2021-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/08/col-blg-fortune-2021-02.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2021/08/16/standing-up-for-our-principles-attackiq-signs-the-respect-in-security/</loc>
		<lastmod>2021-08-16T16:00:12+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/08/col-blg-respect-in-security.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2021/08/23/azure-security-stack-mappings-the-top-native-security-controls-for-ransomware/</loc>
		<lastmod>2021-08-23T16:00:32+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/08/col-blg-ransomeware-revealed.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/08/col-blg-rr-01-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/08/col-blg-rr-01-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/08/col-blg-rr-01-03.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/08/col-blg-rr-01-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2021/08/24/20000-strong-for-attackiq-academy-and-its-just-the-beginning/</loc>
		<lastmod>2021-08-24T15:30:03+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/08/col-blg-20k-academy-ft.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/08/col-blg-20k-academy.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/08/col-blg-academy-live.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2021/08/24/is-your-healthcare-organization-following-these-four-ransomware-best-practices/</loc>
		<lastmod>2021-08-24T16:24:14+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/08/cyberattack-healthcare.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2021/09/16/dsa-lpe-adobe-reader/</loc>
		<lastmod>2021-09-16T14:25:40+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/07/ft-4.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/09/image-16.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2021/09/22/cloud-platforms-can-stop-adversaries-heres-how/</loc>
		<lastmod>2021-09-22T21:32:22+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/09/dallas-reedy-H83_BXx3ChY-unsplash-scaled-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2021/09/23/ransomware-and-targeted-attacks-in-the-healthcare-sector/</loc>
		<lastmod>2021-09-23T12:39:01+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/08/col-blg-ransomeware-revealed.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/09/col-blog-rr-table-sm.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2021/09/28/dsa-lpe-firefox-win/</loc>
		<lastmod>2021-09-28T14:29:22+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/07/ft-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/09/image-10.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2021/09/30/meet-attackiq-vanguard-helping-security-teams-identify-control-gaps-before-the-adversary-does/</loc>
		<lastmod>2021-09-30T13:00:10+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/09/col-blg-vanguard.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2021/10/04/zero-trust-but-validate/</loc>
		<lastmod>2021-10-04T21:24:18+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/10/maximalfocus-CYLr5am4aWY-unsplash-scaled-1-e1752177338105.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/10/Screen-Shot-2021-10-04-at-2.26.41-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2021/10/06/our-message-to-cybersecurity-teams-weve-got-your-six/</loc>
		<lastmod>2021-10-06T13:00:05+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/10/col-blg-wgys-ct.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2021/10/15/what-to-do-in-the-case-of-brand-reputation-impersonation/</loc>
		<lastmod>2021-10-15T23:14:09+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/10/col-blg-brand-impresonation.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/10/Webupdates_%E2%80%94_RIPE_Network_Coordination_Centre.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/10/image-17-scaled.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/10/image-18-scaled.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/10/image-19.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2021/10/21/dont-treat-cybersecurity-hygiene-like-your-car-engine-light/</loc>
		<lastmod>2021-10-21T17:00:58+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/10/sigmund-TnEe6BdBC2M-unsplash-scaled-e1635189908550.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/10/col-blg-esg-shpms-2021-chart-1.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/10/col-blg-esg-shpms-2021-chart-2.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/10/col-blg-esg-shpms-2021-chart-3.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/10/col-blg-esg-shpms-2021-chart-4.svg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2021/10/27/10-things-you-may-not-know-about-purple-teaming/</loc>
		<lastmod>2021-10-27T21:30:14+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/10/10-things-purple-teaming-sm.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2021/10/29/the-days-of-being-overwhelmed-by-your-vulnerabilities-are-coming-to-an-end/</loc>
		<lastmod>2021-10-29T22:37:59+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/10/CVE-Resources-Thumbnail.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/10/corrected-PNG-.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2021/11/16/deepsurface-2-6/</loc>
		<lastmod>2021-11-16T15:33:12+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/07/ft-2.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2021/11/29/a-view-of-printnightmare/</loc>
		<lastmod>2021-11-29T15:36:18+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/07/ft-3.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2021/12/13/validate-your-cyberdefenses-against-log4shell-with-mitre-attack/</loc>
		<lastmod>2021-12-14T01:48:48+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/12/col-blg-log4j-vulnerability.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/12/log4j-scenario-desc.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/12/Attack-Graph.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2021/12/15/deepsurface-2-7/</loc>
		<lastmod>2021-12-15T15:39:01+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/07/ft-4.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/12/create-containers-1024x481-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/12/fill-containers-1024x482-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/12/reorganize-widgets-1024x485-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/12/screen-shot-2021-12-07-at-3.44.02-pm.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/12/screen-shot-2021-12-07-at-3.51.34-pm.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/12/screen-shot-2021-12-07-at-3.25.54-pm.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/12/pasted-image-0.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2021/12/20/getting-ahead-of-log4shell-enabled-cyberattacks-new-attack-scenarios-and-technical-recommendations/</loc>
		<lastmod>2021-12-20T16:58:36+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/12/getting-ahead-of-log4shell.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/12/pictogram.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/12/Example-Attack-Graph.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/12/firepower-evaluation-pic-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/12/Log4shell-pic-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/12/Log4shell-pic-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2022/01/13/the-boardroom-isnt-ready-for-the-next-solarwinds/</loc>
		<lastmod>2022-01-13T21:35:24+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/01/Agenda-Byline-ai.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2022/01/19/the-trick-to-handling-ransomware-prepare/</loc>
		<lastmod>2022-01-20T00:14:37+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/01/ransomware.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/01/WannaCry-Attack-Flow-1-scaled.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/01/Screen-Shot-2022-01-04-at-6.19.13-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2022/02/08/compliance-and-cyber-security-risk-reduction/</loc>
		<lastmod>2022-02-08T16:31:01+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/07/ft-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/02/paths-2048x1000-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/02/risk-2048x587-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2022/02/09/the-center-for-threat-informed-defense-impacting-the-public-good/</loc>
		<lastmod>2022-02-10T02:26:50+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/02/Screen-Shot-2022-02-09-at-6.13.13-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/02/Screen-Shot-2022-02-09-at-4.01.46-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/02/Screen-Shot-2022-02-09-at-4.03.47-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/02/Screen-Shot-2022-02-09-at-4.04.27-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/02/Screen-Shot-2022-02-09-at-4.05.45-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2022/03/08/preparing-for-known-russia-based-cyberthreats-using-mitre-attck-and-attackiq/</loc>
		<lastmod>2022-03-09T00:33:22+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/03/russia-ukraine-prepare.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/03/image-25.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/03/commandshell.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/03/runkeys.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2022/03/11/testing-with-realism-attack-flows-and-attackiq-attack-graphs/</loc>
		<lastmod>2022-03-12T06:12:30+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/03/image.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/03/Attack-Flow-Fig-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/03/Attack-Graph-russia-blog-scaled-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2022/03/29/testing-network-security-controls-against-russian-malware/</loc>
		<lastmod>2022-03-29T12:42:21+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/03/sajad-nori-21mJd5NUGZU-unsplash-scaled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2021/03/ss-ncvm.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2022/04/11/5-reasons-you-dont-want-to-miss-purple-hats-conference-2022/</loc>
		<lastmod>2022-04-11T22:03:03+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/03/ph-bg.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2022/04/18/integrations-vectra/</loc>
		<lastmod>2022-04-18T08:01:31+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/04/vectra-bg.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/04/Vectra-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/04/Vectra-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/04/Vectra-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/04/Vectra-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/04/Vectra-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/04/Vectra-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/04/Vectra-9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/04/Vectra-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/04/Vectra-11.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2022/05/23/quantifying-risks-of-remote-workers/</loc>
		<lastmod>2022-05-23T14:44:38+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/07/ft-1.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2022/05/23/computing-context-is-everything/</loc>
		<lastmod>2022-05-23T14:47:48+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/07/ft-2.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2022/05/25/idcs-top-insights-around-purple-teaming/</loc>
		<lastmod>2022-05-25T21:23:38+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/05/RSA-GartnerSRM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2022/05/31/mitre-attck-at-seven-the-seven-biggest-milestones/</loc>
		<lastmod>2022-05-31T18:07:42+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2020/08/col-ds-mitre-attack-and-attackiq.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2022/06/02/testing-your-defenses-against-cve-2022-30190-msdt-follina-0-day/</loc>
		<lastmod>2022-06-02T16:00:59+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/06/adi-goldstein-EUsVwEOsblE-unsplash-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/06/follina-msdt.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2022/06/03/attack-graph-response-to-us-cert-aa22-152a-karakurt-data-extortion-group/</loc>
		<lastmod>2022-06-03T20:08:05+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/06/US-CERT-Template-1200-%C3%97-800-px.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/06/US-Cert-AA152-AG-cropped-1.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/06/US-Cert-AA152-AG-1-initial-access.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/06/US-Cert-AA152-AG-2-cred-access.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/06/US-Cert-AA152-AG-3-discovery.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/06/US-Cert-AA152-AG-4-exfiltration.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2022/07/11/oilrig-attack-graphs-emulating-the-iranian-threat-actors-global-campaigns/</loc>
		<lastmod>2022-07-11T23:29:52+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/07/1-3-Discovery-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/07/0-0-AttackGraph.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/07/0-1-Delivery.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/07/0-2-Discovery.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/07/0-3-Exfil.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/07/0-4-Passwords.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/07/0-5-Final.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/07/1-0-AttackGraph-scaled.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/07/1-1-Delivery.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/07/1-2-C2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/07/1-3-Discovery.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2022/07/29/leveraging-the-mitre-attck-framework-to-build-a-threat-informed-defense/</loc>
		<lastmod>2022-07-29T20:50:47+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/07/Paychex.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2023/03/17/attack-graph-response-to-aa23-074a/</loc>
		<lastmod>2023-03-17T17:06:45+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/col-blg-flex-telerik-bg.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/aa23-074a-00-attack-graph.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/aa23-074a-01-initial-access.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/aa23-074a-02-reverse-shell.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/aa23-074a-03-discovery.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/aa23-074a-04-exfiltration.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2024/08/27/hello-world/</loc>
		<lastmod>2025-04-02T19:02:00+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/08/col-blg-salt-typhoon-bg.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2019/06/26/emulating-attacker-activities-and-the-pyramid-of-pain/</loc>
		<lastmod>2025-06-03T22:20:59+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2019/06/ft-17.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2019/06/blog-pyramid-pain-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2025/04/09/emulating-catb-ransomware/</loc>
		<lastmod>2025-07-21T16:35:10+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/04/col-blg-catb-ransomware-bg.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2025/04/17/emulating-strelastealer/</loc>
		<lastmod>2025-07-21T20:08:33+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/04/col-blg-strelastealer-bg.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/04/col-blg-ss-lse-00.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/04/col-blg-ss-lse-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/04/col-blg-ss-lse-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/04/col-blg-ss-jfl-00.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/04/col-blg-ss-jfl-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/04/col-blg-ss-jfl-02.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2025/04/02/emulating-seashell-blizzard/</loc>
		<lastmod>2025-07-21T20:27:25+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/04/col-blg-seashell-blizzard-bg.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2025/03/19/emulating-salt-typhoon/</loc>
		<lastmod>2025-07-21T20:28:43+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/03/col-blg-salt-typhoon-bg.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2025/03/13/cisa-advisory-aa25-071a/</loc>
		<lastmod>2025-07-21T20:29:05+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/03/col-blg-medusa-aa25-071a-bg.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2024/11/13/response-to-cisa-advisory-aa24-317a/</loc>
		<lastmod>2025-07-21T20:29:10+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/11/col-blg-aa24-317a-tn.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2025/03/06/emulating-ransomhub/</loc>
		<lastmod>2025-07-21T20:30:10+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/03/col-blg-ransomhub-bg.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2025/02/26/emulating-akira-ransomware/</loc>
		<lastmod>2025-07-21T20:30:29+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/02/col-blg-akira-bg.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2025/02/20/cisa-aa25-050a-ghost-cring-ransomware/</loc>
		<lastmod>2025-07-21T20:30:48+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/02/col-blg-aa25-050a-bg.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2025/02/14/emulating-fin7-part-2/</loc>
		<lastmod>2025-07-21T20:32:10+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/02/col-blg-fin7-part-2-bg.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2025/01/27/emulating-the-splintered-hunters/</loc>
		<lastmod>2025-07-21T20:33:11+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/01/col-blg-aa25-022a-bg-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/01/col-blg-splinter-hunters-00.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/01/col-blg-splinter-hunters-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/01/col-blg-splinter-hunters-02.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2025/01/24/response-to-cisa-advisory-aa25-022a/</loc>
		<lastmod>2025-07-21T20:35:02+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/01/col-blg-aa25-022a-bg.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2025/01/16/updated-response-to-cisa-advisory-aa23-136a/</loc>
		<lastmod>2025-07-21T20:35:49+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/01/col-blg-update-aa23-136a-bg.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/01/col-blg-bianlian-00-hd.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/01/col-blg-bianlian-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/01/col-blg-bianlian-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/01/col-blg-bianlian-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/01/col-blg-bianlian-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/01/col-blg-bianlian-05-update.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/01/col-blg-bianlian-06.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/01/col-blg-bianlian-07.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2025/01/09/emulating-ako-ransomware/</loc>
		<lastmod>2025-07-21T20:37:03+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/01/col-blg-ako-bg.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2024/12/12/emulating-fin7-part-1/</loc>
		<lastmod>2025-07-21T20:37:25+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/12/col-blg-fin7-pt-1-bg.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/12/col-fin7-msiz-00.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/12/col-fin7-msiz-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/12/col-fin7-msiz-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/12/col-fin7-msiz-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/12/col-fin7-powertrash-00.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/12/col-fin7-powertrash-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/12/col-fin7-powertrash-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/12/col-fin7-powertrash-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/12/col-fin7-powertrash-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2024/12/03/introducing-flex-3/</loc>
		<lastmod>2025-07-21T20:38:25+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/12/col-blg-ft-flex-3.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/12/flex-3.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2024/11/22/response-to-cisa-advisory-aa24-326a/</loc>
		<lastmod>2025-07-21T20:40:06+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/11/col-blg-aa24-326a-tn.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2024/11/12/emulating-whispergate-malware/</loc>
		<lastmod>2025-07-21T20:42:05+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/11/col-blg-whispergate-tn.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2024/10/21/testing-security-controls-in-the-indo-pacific/</loc>
		<lastmod>2025-07-21T20:44:49+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/10/technet-indo-pacific-2024-feature.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2024/10/18/human-assisted-intelligent-agents/</loc>
		<lastmod>2025-07-21T20:46:38+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/10/attackcon-feature.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2024/10/17/response-to-cisa-advisory-aa24-290a/</loc>
		<lastmod>2025-07-21T20:46:53+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/10/col-blg-aa24-290a-bg.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2024/10/15/emulating-lumma-stealer/</loc>
		<lastmod>2025-07-21T20:47:15+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/10/col-blg-lumma-stealer-bg.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2024/10/03/emulating-hadooken-malware/</loc>
		<lastmod>2025-07-21T20:48:23+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/10/col-blg-hadooken-bg.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2024/09/19/emulating-medusa-ransomware/</loc>
		<lastmod>2025-07-21T20:49:14+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/09/col-blg-medusa-bg.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/09/col-blg-medusa-00.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/09/col-blg-medusa-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/09/col-blg-medusa-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/09/col-blg-medusa-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/09/col-blg-medusa-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2024/09/12/emulating-ebury-malware/</loc>
		<lastmod>2025-07-21T20:49:32+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/09/col-blg-ebury-malware-bg.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/09/col-blg-ebury-00.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/09/col-blg-ebury-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/09/col-blg-ebury-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/09/col-blg-ebury-03.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2024/09/10/response-to-cisa-advisory-aa24-249a/</loc>
		<lastmod>2025-07-21T20:49:50+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/09/col-blg-aa24-249a-bg.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2024/09/05/response-to-cisa-advisory-aa24-242a/</loc>
		<lastmod>2025-07-21T20:50:17+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/09/col-blg-aa24-242a-bg.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2024/08/30/emulating-mallox-ransomware/</loc>
		<lastmod>2025-07-21T20:50:49+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/08/col-blg-mallox-bg.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/08/col-blg-mallox-00.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/08/col-blg-mallox-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/08/col-blg-mallox-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/08/col-blg-mallox-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/08/col-blg-mallox-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/08/col-blg-mallox-05.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2024/08/29/response-to-cisa-advisory-aa24-241a/</loc>
		<lastmod>2025-07-21T20:51:15+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/08/col-blg-aa24-241a-bg-1.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2024/08/23/response-to-cisa-advisory-aa24-234a/</loc>
		<lastmod>2025-07-21T20:53:47+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/08/col-blg-cisa-advisory-aa24-234a-bg.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2024/08/08/attackiq-nist-csf-automated-assessments/</loc>
		<lastmod>2025-07-21T20:57:27+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/08/col-blg-nist-csf-bg.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/08/csf-wheel-revamp-final-white-1-scaled.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2024/08/02/emulating-sandworms-prestige-ransomware/</loc>
		<lastmod>2025-07-21T20:58:15+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/08/col-blg-sandworm-prestige-bg.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/08/col-blg-sandworm-prestige-00.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/08/col-blg-sandworm-prestige-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/08/col-blg-sandworm-prestige-02.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2024/08/01/democratizing-defense/</loc>
		<lastmod>2025-07-21T20:59:13+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/08/col-blg-flex-2-bg.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2024/08/01/emulate-asyncrat/</loc>
		<lastmod>2025-07-21T21:00:32+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/08/col-blg-flex-asyncrat-bg.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2024/07/31/emulating-andariel/</loc>
		<lastmod>2025-07-21T21:02:35+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/07/col-blg-andariel-bg.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/07/col-blg-andariel-00.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/07/col-blg-andariel-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/07/col-blg-andariel-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/07/col-blg-andariel-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/07/col-blg-andariel-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2024/07/26/response-to-cisa-advisory-aa24-207a/</loc>
		<lastmod>2025-07-21T21:02:59+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/07/col-blg-aa24-207a-bg.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2024/07/25/emulating-prickly-cactus/</loc>
		<lastmod>2025-07-21T21:04:52+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/07/col-blg-prickly-cactus-ransomware-bg.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/07/col-blg-prickly-cactus-00.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/07/col-blg-prickly-cactus-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/07/col-blg-prickly-cactus-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/07/col-blg-prickly-cactus-03.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2024/07/15/response-to-cisa-advisory-aa24-193a/</loc>
		<lastmod>2025-07-21T21:05:11+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/07/col-blg-aa24-193a-bg.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2024/07/11/emulating-nefilim-ransomware/</loc>
		<lastmod>2025-07-21T21:05:30+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/07/col-blg-nefilim-bg-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/07/col-blg-nefilim-00.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/07/col-blg-nefilim-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/07/col-blg-nefilim-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/07/col-blg-nefilim-03.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2024/07/09/attackiq-mission-control/</loc>
		<lastmod>2025-07-21T21:06:18+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/07/mission-control-smg-bg.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2024/07/03/emulating-sandworm-2/</loc>
		<lastmod>2025-07-21T21:07:28+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/07/col-blg-sandworm-2-bg-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/07/col-blg-ag-sandworm-hermetic-00.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/07/col-blg-ag-sandworm-hermetic-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/07/col-blg-ag-sandworm-hermetic-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/07/col-blg-ag-sandworm-hermetic-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/07/col-blg-ag-sandworm-powershell-00.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/07/col-blg-ag-sandworm-powershell-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/07/col-blg-ag-sandworm-powershell-02.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2024/06/25/attackiq-can-bolster-cora-compliance/</loc>
		<lastmod>2025-07-21T21:07:55+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/06/cora-bg.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2024/06/20/emulating-winnti/</loc>
		<lastmod>2025-07-21T21:08:26+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/06/col-blg-winnti-bg.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/06/col-blg-winnti-cuckoobees-00.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/06/col-blg-winnti-cuckoobees-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/06/col-blg-winnti-cuckoobees-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/06/col-blg-winnti-cuckoobees-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/06/col-blg-winnti-cuckoobees-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/06/col-blg-winnti-cuckoobees-05.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/06/col-blg-winnti-harvest-00.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/06/col-blg-winnti-harvest-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/06/col-blg-winnti-harvest-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/06/col-blg-winnti-harvest-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/06/col-blg-winnti-harvest-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/06/col-blg-winnti-sri-lanka-00.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/06/col-blg-winnti-sri-lanka-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/06/col-blg-winnti-sri-lanka-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/06/col-blg-winnti-sri-lanka-03.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2024/06/05/response-to-cisa-advisory-aa24-060a-phobos/</loc>
		<lastmod>2025-07-21T21:08:57+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/06/col-blg-aa24-060a-2-bg.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/06/col-blg-aa24-060a-variants-00.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/06/col-blg-aa24-060a-variants-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/06/col-blg-aa24-060a-variants-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/06/col-blg-aa24-060a-variants-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/06/col-blg-aa24-060a-variants-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/06/col-blg-aa24-060a-variants-05.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2024/05/29/testing-against-qakbot-and-black-basta/</loc>
		<lastmod>2025-07-21T21:13:13+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/05/col-blg-flex-qakbot-black-basta-bg.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2024/05/24/emulating-asyncrat/</loc>
		<lastmod>2025-07-21T21:13:28+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/05/col-blg-asyncrat-bg-3.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/05/col-blg-asycnrat-onenote-00.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/05/col-blg-asycnrat-onenote-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/05/col-blg-asycnrat-onenote-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/05/col-blg-asycnrat-smuggling-00.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/05/col-blg-asycnrat-smuggling-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/05/col-blg-asycnrat-smuggling-02.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2024/05/17/response-to-cisa-advisory-aa24-131a/</loc>
		<lastmod>2025-07-21T21:14:19+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/05/col-blg-black-basta-bg.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/05/aa24-131a-00.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/05/aa24-131a-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/05/aa24-131a-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/05/aa24-131a-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/05/aa24-131a-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2024/05/03/navigating-container-security/</loc>
		<lastmod>2025-07-21T21:14:36+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/05/col-blg-container-security-bg.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2024/05/01/gootloader-attacks-healthcare-down-under/</loc>
		<lastmod>2025-07-21T21:15:00+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/04/col-blg-flex-gootloader-infection-chain-bg.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2024/04/22/response-to-cisa-advisory-aa24-109a-stopransomware-akira-ransomware/</loc>
		<lastmod>2025-07-21T21:17:17+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/04/col-blg-akira-bg.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/04/col-blg-aa24-109a-full.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/04/col-blg-aa24-109a-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/04/col-blg-aa24-109a-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/04/col-blg-aa24-109a-03.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2024/04/17/operation-sharpshooter/</loc>
		<lastmod>2025-07-21T21:18:03+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/04/col-blg-flex-lazarus-sharpshooter-bg.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2024/04/16/emulating-oceanlotus/</loc>
		<lastmod>2025-07-21T21:18:44+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/04/col-blg-oceanlotus-bg.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/04/col-blg-oceanstorm-full.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/04/col-blg-oceanstorm-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/04/col-blg-oceanstorm-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/04/col-blg-oceanstorm-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/04/col-blg-beachhead-full.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/04/col-blg-beachhead-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/04/col-blg-beachhead-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/04/col-blg-winendpoint-full.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/04/col-blg-winendpoint-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/04/col-blg-winendpoint-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/04/col-blg-linendpoint-full.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2024/04/10/intercept-the-adversary/</loc>
		<lastmod>2025-07-21T21:19:15+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/04/col-blg-flex-lazarus-interception-bg.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2024/04/04/cyber-sorcery/</loc>
		<lastmod>2025-07-21T21:19:45+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/04/col-blg-flex-lazarus-mrtr-bg.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2024/03/28/windows-service-permissions-and-dll-sideloading/</loc>
		<lastmod>2025-07-21T21:22:06+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/07/ft-2.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/03/download.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/03/download-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2024/03/27/beneath-the-shadows-darkgate/</loc>
		<lastmod>2025-07-21T21:22:25+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/03/col-blg-flex-darkgate-bg.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2024/03/08/response-to-screenconnects-zero-day-vulnerability/</loc>
		<lastmod>2025-07-21T21:22:45+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/03/col-blg-slashandgrab-bg.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2024/03/07/emulating-alphv-blackcat/</loc>
		<lastmod>2025-07-21T21:23:05+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/03/col-blg-blackcat-bg.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/03/col-blg-blackcat-ag.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2024/03/06/emulating-sandworm/</loc>
		<lastmod>2025-07-21T21:23:30+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/03/col-blg-sandworm-bg-a.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2024/03/04/response-to-cisa-advisory-aa24-060b/</loc>
		<lastmod>2025-07-21T21:24:14+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/03/col-blg-aa24-060b-bg.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2024/03/01/response-to-cisa-advisory-aa24-060a/</loc>
		<lastmod>2025-07-21T21:25:30+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/03/col-blg-aa24-060a-bg.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2024/02/27/response-to-cisa-advisory-aa24-057a/</loc>
		<lastmod>2025-07-21T21:26:51+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/02/col-blg-aa24-057a-bg.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2024/02/16/response-to-an-unknown-threat-actor-who-leveraged-a-compromised-account-to-access-state-government-organization/</loc>
		<lastmod>2025-07-21T21:28:10+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/02/CISO-advisory-AA24-046A-featured-image.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2024/02/14/emulating-darkgate/</loc>
		<lastmod>2025-07-21T21:29:31+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/02/col-blg-darkgate-bg.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/02/col-bg-darkgate-ag1-0.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/02/col-bg-darkgate-ag1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/02/col-bg-darkgate-ag1-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/02/col-bg-darkgate-ag1-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/02/col-bg-darkgate-ag1-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/02/col-bg-darkgate-ag1-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/02/col-bg-darkgate-ag2-0.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/02/col-bg-darkgate-ag2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/02/col-bg-darkgate-ag2-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/02/col-bg-darkgate-ag2-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/02/col-bg-darkgate-ag2-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/02/col-bg-darkgate-ag3-0.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/02/col-bg-darkgate-ag3-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/02/col-bg-darkgate-ag3-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/02/col-bg-darkgate-ag3-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/02/col-bg-darkgate-ag3-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/02/col-bg-darkgate-ag3-5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2024/02/09/response-to-cisa-advisory-aa24-038a/</loc>
		<lastmod>2025-07-21T21:30:35+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/02/col-blg-aa24-038a-bg.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/02/col-blg-aa24-038a-00.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/02/col-blg-aa24-038a-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/02/col-blg-aa24-038a-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/02/col-blg-aa24-038a-03.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2024/02/07/the-shape-shifting-cameleon-qakbot/</loc>
		<lastmod>2025-07-21T21:31:06+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/02/col-blg-flex-qakbot-bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2024/02/07/response-to-ivantis-zero-day-vulnerability-exploitation/</loc>
		<lastmod>2025-07-21T21:31:47+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/02/col-blg-ivanti-zdv-bg.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2024/01/31/dream-job-or-is-it/</loc>
		<lastmod>2025-07-21T21:32:52+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/01/col-blg-flex-operation-dream-job-bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2024/01/24/in-the-cyber-jungle/</loc>
		<lastmod>2025-07-21T21:33:13+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/01/col-blg-flex-mustang-panda-bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2024/01/19/response-to-cisa-advisory-aa24-016a/</loc>
		<lastmod>2025-07-21T21:33:35+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/01/col-blg-aa24-016a-bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2024/01/17/gootloader-unloaded/</loc>
		<lastmod>2025-07-21T21:34:13+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/01/col-blg-gootloader-bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2024/01/10/sigmaiq-attackiqs-latest-innovation-for-actionable-detections/</loc>
		<lastmod>2025-07-21T21:36:49+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/01/col-blg-sigmaaiq-bg.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/01/col-blg-sigma-code.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/01/col-blg-sigma-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/01/col-blg-sigma-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/01/col-blg-sigma-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/01/col-blg-sigma-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/01/col-blg-sigma-05.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/01/col-blg-sigma-06.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/01/col-blg-sigma-07.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/01/col-blg-sigma-08.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/01/col-blg-sigma-09.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2024/01/04/elevating-cybersecurity-standards/</loc>
		<lastmod>2025-07-21T21:37:19+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/01/col-blog-23-yir-smg.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/01/col-blg-flex.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/01/col-blg-ready.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/01/col-blg-enterprise.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2023/12/29/response-to-cisa-advisory-aa23-353a/</loc>
		<lastmod>2025-07-21T21:37:39+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/12/col-blg-aa23-353a-bg.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/12/aa23-353a-00.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/12/aa23-353a-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/12/aa23-353a-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/12/aa23-353a-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/12/aa23-353a-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2023/12/27/holiday-gift-from-attackiq/</loc>
		<lastmod>2025-07-21T21:38:23+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/12/col-blg-flex-holiday-gift-bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2023/12/23/response-to-cisa-advisory-aa23-352a/</loc>
		<lastmod>2025-07-21T21:39:04+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/12/col-blg-aa23-347a-bg-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/02/col-blg-aa23-352a-00.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/02/col-blg-aa23-352a-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/02/col-blg-aa23-352a-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/02/col-blg-aa23-352a-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/02/col-blg-aa23-352a-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/02/col-blg-aa23-352a-05.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2023/12/22/response-to-cisa-advisory-aa23-349a/</loc>
		<lastmod>2025-07-21T21:39:59+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/12/col-blg-aa23-349a-bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2023/12/21/response-to-cisa-advisory-aa23-347a/</loc>
		<lastmod>2025-07-21T21:40:17+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/12/col-blg-aa23-347a-bg.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/12/aa23-347a-full.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/12/aa23-347a-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/12/aa23-347a-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/12/aa23-347a-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/12/aa23-347a-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2023/12/20/rhysidas-ruthless-ransomware-regime/</loc>
		<lastmod>2025-07-21T21:40:35+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/12/col-blg-flex-rhysida-bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2023/12/12/tackling-the-nsa-and-cisa-top-10-misconfigurations/</loc>
		<lastmod>2025-07-21T21:41:26+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/12/col-blg-cisa-nsa-bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2023/12/07/response-to-cisa-advisory-aa23-339a/</loc>
		<lastmod>2025-07-21T21:43:05+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/12/col-blg-aa23-339a-bg.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/12/General_339A_1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/12/First_339A_1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/12/Second_339A_1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/12/General_339A_2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/12/First_339A_2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/12/Second_339A_2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2023/11/30/regulatory-revolution/</loc>
		<lastmod>2025-07-21T21:43:25+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/11/col-blg-regulatory-revolution-bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2023/11/27/response-to-cisa-advisory-aa23-325a/</loc>
		<lastmod>2025-07-21T21:44:14+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/11/col-blg-aa23-325a-bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2023/11/21/response-to-cisa-advisory-aa23-320a/</loc>
		<lastmod>2025-07-21T21:45:06+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/11/col-blg-aa23-3120-bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2023/11/20/tainted-defenses/</loc>
		<lastmod>2025-07-21T21:45:35+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/11/col-blg-flex-gallium-bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2023/11/20/attack-graph-response-to-cisa-advisory-aa23-319a/</loc>
		<lastmod>2025-07-21T21:46:11+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/11/col-blg-aa23-319a-bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2023/11/08/fortify-your-network-with-flex-network-security-testing/</loc>
		<lastmod>2025-07-21T21:46:40+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/11/col0blg-flex-pcap-bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2023/11/07/free-adversary-emulation-and-security-control-testing-with-flex/</loc>
		<lastmod>2025-07-21T21:47:52+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/11/flex-pr.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2023/11/02/combatting-kimsuky/</loc>
		<lastmod>2025-07-21T21:48:40+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/11/col-blg-flex-kimsuky-bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2023/11/01/avoslocker-ransomware/</loc>
		<lastmod>2025-07-21T21:50:30+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/11/col-blog-aa23-284a-bg.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/11/col-blg-avoslocker-00.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/11/col-blg-avoslocker-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/11/col-blg-avoslocker-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/11/col-blg-avoslocker-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/11/col-blg-avoslocker-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/11/col-blg-avoslocker-05.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2023/10/26/emulating-sogu-plugx-the-sophistication-of-malware-behaviors/</loc>
		<lastmod>2025-07-21T21:50:57+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/10/col-blg-sogu-bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2023/10/18/content-filtering/</loc>
		<lastmod>2025-07-21T21:52:00+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/10/col-blg-content-filter-bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2023/10/11/the-resilience-of-endpoint-antivirus/</loc>
		<lastmod>2025-07-21T21:54:01+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/10/col-blg-flex-endpoint-antivirus-bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2023/10/09/emulating-gootloader/</loc>
		<lastmod>2025-07-21T21:55:08+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/10/col-blg-gootloader-bg.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/10/col-blg-gl-australia-00.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/10/col-blg-gl-australia-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/10/col-blg-gl-australia-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/10/col-blg-gl-australia-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/10/col-blg-gl-australia-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/10/col-blg-gl-australia-05.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/10/col-blg-gl-australia-06.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/10/col-blg-gl-bokbot-00.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/10/col-blg-gl-bokbot-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/10/col-blg-gl-bokbot-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/10/col-blg-gl-bokbot-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/10/col-blg-gl-seo-00.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/10/col-blg-gl-seo-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/10/col-blg-gl-seo-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/10/col-blg-gl-seo-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/10/col-blg-gl-seo-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/10/col-blg-gl-seo-05.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/10/col-blg-gl-seo-06.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2023/10/04/attack-graph-response-to-cisa-advisory-aa23-263a/</loc>
		<lastmod>2025-07-21T21:56:04+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/10/col-blg-aa23-263a-bg.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/10/col-blg-aa23-263a-00.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/10/col-blg-aa23-263a-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/10/col-blg-aa23-263a-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/10/col-blg-aa23-263a-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/10/col-blg-aa23-263a-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/10/col-blg-aa23-263a-05.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/10/col-blg-aa23-263a-06.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2023/10/04/enhancing-cybersecurity-resilience/</loc>
		<lastmod>2025-07-21T21:57:16+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/10/col-blg-flex-endpoint-edr-bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2023/09/27/put-your-defenses-to-the-test/</loc>
		<lastmod>2025-07-21T21:57:40+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/09/col-blg-lazarus-bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2023/09/25/response-to-cisa-advisory-aa23-250a/</loc>
		<lastmod>2025-07-21T21:58:37+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/09/col-blg-aa23-250a-bg.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/09/col-blg-aa23-250a-00.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/09/col-blg-aa23-250a-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/09/col-blg-aa23-250a-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/09/col-blg-aa23-250a-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/09/col-blg-aa23-250a-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2023/09/20/emulating-rhysida/</loc>
		<lastmod>2025-07-21T22:00:15+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/09/col-blg-rhysida-bg.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/09/col-blg-rhysida-systembc-00.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/09/col-blg-rhysida-systembc-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/09/col-blg-rhysida-systembc-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/09/col-blg-rhysida-systembc-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/09/col-blg-rhysida-systembc-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/09/col-blg-rhysida-systembc-05.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/09/col-blg-cobaltstrike-00.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/09/col-blg-cobaltstrike-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/09/col-blg-cobaltstrike-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/09/col-blg-cobaltstrike-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/09/col-blg-cobaltstrike-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/09/col-blg-cobaltstrike-05.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2023/09/19/uncharted-waters-of-cloud-security-optimization/</loc>
		<lastmod>2025-07-21T22:10:36+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/09/col-blg-cloud-security-bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2023/09/07/securing-remote-networks-with-attackiq-flex/</loc>
		<lastmod>2025-07-21T22:11:53+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/04/col-blg-oilrig-bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2023/08/31/enhancing-ma-security-control-validation-with-attackiq-flex/</loc>
		<lastmod>2025-07-21T22:12:03+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/05/col-blg-nobelium-bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2023/08/23/how-does-your-security-stack-up/</loc>
		<lastmod>2025-07-21T22:12:32+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/08/Flex-Turla-BG-1200x675-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/08/col-blg-turla-flex-package.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2023/08/18/emulating-apt35/</loc>
		<lastmod>2025-07-21T22:13:13+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/08/col-blg-apt35-bg-0.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/08/ag-apt35-00.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/08/ag-apt35-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/08/ag-apt35-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/08/ag-apt35-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/08/ag-apt35-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/08/ag-apt35-05.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2023/08/03/testing-for-everyone/</loc>
		<lastmod>2025-07-21T22:17:23+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/08/testing-for-everyone.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2023/07/28/emulating-gallium/</loc>
		<lastmod>2025-07-21T22:18:30+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/07/col-blg-gallium-bg.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/07/ag-soft-cell-full.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/07/ag-soft-cell-00.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/07/ag-soft-cell-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/07/ag-soft-cell-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/07/ag-soft-cell-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/07/ag-tainted-love-full.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/07/ag-tainted-love-00.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/07/ag-tainted-love-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2023/07/10/response-to-aa23-187a/</loc>
		<lastmod>2025-07-21T22:20:12+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/07/col-blg-aa23-187a-bg.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/07/aa23-187a-00.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/07/aa23-187a-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/07/aa23-187a-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/07/aa23-187a-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/07/aa23-187a-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/07/aa23-187a-05.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2023/06/27/emulating-apt36/</loc>
		<lastmod>2025-07-21T22:21:47+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/06/col-blg-apt29-bg.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/06/apt36_0.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/06/apt36_1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/06/apt36_2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/06/apt36_3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/06/apt36_4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2023/06/14/response-to-cisa-advisory-aa23-165a/</loc>
		<lastmod>2025-07-21T22:23:36+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/06/col-blg-aa23-165a-bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2023/06/09/response-to-aa23-158a/</loc>
		<lastmod>2025-07-21T22:28:09+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/06/col-blg-aa23-158a-bg.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/06/00-full-graph.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/06/01-stage-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/06/02-stage-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/06/03-stage-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/06/04-stage-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/06/05-stage-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/06/06-stage-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/06/07-stage-7.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2023/05/25/response-to-cisa-advisory-aa23-144a/</loc>
		<lastmod>2025-07-21T22:29:51+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/05/col-blg-aa23-144a-bg-rev.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2023/05/18/attack-graph-response-to-cisa-advisory-aa23-136a-stopransomware-bianlian-ransomware-group/</loc>
		<lastmod>2025-07-21T22:31:49+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/05/feature.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/05/00-attack-graph-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/05/01-stage-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/05/02-stage-2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/05/03-stage-3-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/05/04-stage-4-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/05/05-stage-5-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/05/06-stage-6-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2023/05/12/response-to-cisa-advisory-aa23-131a/</loc>
		<lastmod>2025-07-21T22:33:28+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/05/col-blg-aa23-131a-bg.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/05/00-login-button.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/05/01-enable-scripting.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/05/02-script-execution.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2023/05/10/attack-graph-response-to-cisa-advisory-aa23-129a-hunting-russian-intelligence-snake-malware/</loc>
		<lastmod>2025-07-21T22:34:54+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/08/Flex-Turla-BG-1200x675-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/05/AA23-129-image1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/05/AA23-129image2.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/05/AA23-129image3.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/05/AA23-129image4.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/05/AA23-129image5.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/05/AA23-129image6.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/05/AA23-129image7.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/05/AA23-129image8.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/05/AA23-129image9.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/05/AA23-129image10.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/05/AA23-129image11.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/08/col-blg-turla-flex-package.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2023/05/04/emulating-nobelium-apt29/</loc>
		<lastmod>2025-07-21T22:36:41+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/05/col-blg-nobelium-bg.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/05/00-attack-graph.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/05/01-stage-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/05/02-stage-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/05/03-stage-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/08/col-blg-flex-nobelium.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2023/04/26/emulating-kimsukys-espionage-operations/</loc>
		<lastmod>2025-07-21T22:37:49+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/04/col-blg-kimsuky-bg.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/04/00-00-attack-graph.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/04/00-01-stage-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/04/00-02-stage-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/04/01-00-attack-graph.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/04/01-01-stage-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/04/01-02-stage-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/04/01-03-stage-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/04/02-00-attack-graph.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/04/02-01-stage-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/04/02-02-stage-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/04/02-03-stage-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/04/03-00-attack-graph.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/04/03-01-stage-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/04/03-02-stage-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/04/03-03-stage-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2023/04/26/defend-as-one/</loc>
		<lastmod>2025-07-21T22:38:35+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/04/col-bg-dao-2-bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2023/04/14/response-to-lazarus-3cx-supply-chain-compromise/</loc>
		<lastmod>2025-07-21T22:39:03+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/09/col-blg-lazarus-bg.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/04/3cx-ag-general-view-scaled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/04/3cx-ag-first-stage.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/04/3cx-ag-second-stage.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/04/3cx-ag-third-stage-scaled-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2023/04/04/emulating-oilrig/</loc>
		<lastmod>2025-07-21T22:39:48+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/04/col-blg-oilrig-bg.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/04/00-full-attack-graph.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/04/01-stage-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/04/02-stage-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/04/03-stage-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/04/04-stage-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/04/05-stage-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/08/col-blg-turla-flex-package.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2023/03/23/emulating-the-politically-motivated-chinese-apt-mustang-panda/</loc>
		<lastmod>2025-07-21T22:40:54+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/col-blg-mustang-panda-bg.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/00-00-Full-Graph-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/00-01-Stage-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/00-02-Stage-2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/00-03-Stage-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/01-00-Full-Graph-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/01-01-Stage-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/01-02-Stage-2-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2023/03/23/emulating-the-infamous-modular-banking-trojan-bokbot/</loc>
		<lastmod>2025-07-21T22:42:53+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/col-blg-bokbot-bg.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/00-00-Full-Graph.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/00-01-Stage-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/00-02-Stage-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/00-03-Final-Stage.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/01-00-Full-Graph.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/01-01-Stage-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/01-02-Stage-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/01-03-BokBot.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2023/03/17/attack-graph-response-to-cisa-advisory-aa23-075a-stopransomware-lockbit-3-0/</loc>
		<lastmod>2025-07-21T22:44:59+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/col-blg-aa23-075a-bg.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/aa23-075a-00-attack-graph.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/aa23-075a-01-lockbit-delivery.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/aa23-075a-02-persistence.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/aa23-075a-03-discovery.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/aa23-075a-04-group-policy.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/aa23-075a-05-encryption.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2023/03/16/hiding-in-plain-sight/</loc>
		<lastmod>2025-07-21T22:49:57+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/col-blg-lolbins-bg.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/image-20230224-134601.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/image-20230223-182943.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/image-20230224-144100.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/image-20230224-143206.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/image-20230224-175600.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/image-20230224-160739.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/image-20230224-185402.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/image-20230224-185252.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/image-20230224-192849.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/image-20230224-192431.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/image-20230224-195953.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/image-20230224-195913.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/image-20230227-135114.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/image-20230227-134429.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/image-20230227-134745.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/image-20230227-134257.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/image-20230227-142405.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/image-20230227-142328.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/image-20230227-145103.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/image-20230227-145039.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/image-20230227-145918.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/image-20230227-150037.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/image-20230227-152956.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/image-20230227-153054.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/image-20230227-174134.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/image-20230227-174110.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/image-20230227-180253.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/image-20230227-180228.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/image-20230227-181625.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/image-20230227-181806.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/image-20230227-184132.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/image-20230227-184113.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/image-20230301-122411.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/image-20230301-130825.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/image-20230301-130152.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/image-20230301-133946.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/image-20230301-133713.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/image-20230301-140432.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/image-20230301-143909.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/image-20230301-143815.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/image-20230301-144427.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/image-20230301-144934.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/image-20230301-150102.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/image-20230301-145823.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/image-20230301-151816.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/image-20230301-151908.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/image-20230301-153851.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/image-20230301-153837.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/image-20230301-191239.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/image-20230301-191210.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/image-20230301-185953.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/image-20230301-185925.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/image-20230301-190438.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/image-20230301-190450.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/image-20230301-201706.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/image-20230301-201820.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/image-20230301-202919.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/image-20230307-151948.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/imagen-20230303-180644.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/image-20230302-192549.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/image-20230302-192324.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/image-20230302-195447.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/image-20230302-195237.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/image-20230302-200352.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/image-20230302-200550.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/image-20230302-201306.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/image-20230302-201413.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2023/03/03/attack-graph-response-to-cisa-advisory-aa23-061a-stopransomware-royal-ransomware/</loc>
		<lastmod>2025-07-21T22:52:00+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/DALL%C2%B7E-2023-03-06-12.59.02-a-flowing-helix-of-a-cyberattack-unfolding-digital-art-.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/00-full-graph-600x596.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/01-stage-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/02-stage-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/03-stage-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/04-stage-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/05-stage-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/06-stage-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/07-stage-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/08-stage-8.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2023/03/03/emulating-the-cybercriminal-initial-access-broker-ta551/</loc>
		<lastmod>2025-07-21T22:52:56+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/col-blg-ta551-bg.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/Screenshot-2023-03-03-at-08.41.44.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/Screenshot-2023-03-03-at-08.41.48.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/Screenshot-2023-03-03-at-08.41.55.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/03/Screenshot-2023-03-03-at-08.42.03.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2023/02/27/applied-research-in-threat-informed-defense/</loc>
		<lastmod>2025-07-21T22:56:56+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/02/col-blg-ctid-bg.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/02/col-blg-impact-ctid-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/02/col-blg-impact-ctid-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/02/col-blg-impact-ctid-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/02/col-blg-impact-ctid-05.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/02/col-blg-impact-ctid-07.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/02/col-blg-impact-ctid-08.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/02/col-blg-impact-ctid-09.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/02/col-blg-impact-ctid-10.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2023/02/17/emulating-emotet/</loc>
		<lastmod>2025-07-21T22:58:01+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/02/col-blg-emotet-bg.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/02/00-00-attack-graph.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/02/00-01-stage-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/02/00-02-stage-2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/02/00-03-stage-3-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/02/00-04-stage-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/02/01-00-attack-graph.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/02/01-01-stage-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/02/01-02-stage-2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/02/01-03-stage-3-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/02/01-04-stage-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2023/02/14/democratizing-the-practice-of-adversary-emulation/</loc>
		<lastmod>2025-07-21T22:59:43+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/02/Screen-Shot-2023-02-14-at-3.49.18-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/02/Screen-Shot-2023-02-14-at-3.02.03-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/02/Screen-Shot-2023-02-14-at-1.13.08-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/02/Screen-Shot-2023-02-14-at-1.11.33-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2023/02/03/emulating-bumblebee/</loc>
		<lastmod>2025-07-21T23:00:46+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/02/col-blg-bumblebee-bg.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/02/00-00-full-graph.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/02/00-01-stage-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/02/00-02-stage-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/02/00-03-stage-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/02/01-00-full-graph.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/02/01-01-stage-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/02/01-02-stage-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/02/01-03-stage-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2023/01/25/emulating-qakbot/</loc>
		<lastmod>2025-07-21T23:04:26+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/01/col-blg-qakbot-bg.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/01/00-00-Full-Graph.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/01/00-01-Stage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/01/00-02-Stage-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/01/00-03-Stage-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/01/00-04-Stage-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/01/01-00-Full-Graph.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/01/01-01-Stage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/01/01-02-Stage-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/01/01-03-Stage-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/01/01-04-Stage-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/01/02-00-Full-Graph-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/01/02-01-Stage-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/01/02-02-Stage-02.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2023/01/05/emulating-the-highly-sophisticated-north-korean-adversary-lazarus-group/</loc>
		<lastmod>2025-07-21T23:07:09+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/01/col-blg-lazarus-bg.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/01/02-00-Full-Graph.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/01/02-01-First-Stage.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/01/02-02-Credentials.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/01/03-00-Full-Graph.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/01/03-01-First-Stage.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/01/03-02-SAM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/01/04-00-Full-Graph.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/01/04-00-Full-Graph.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/01/04-01-First-Stage.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/01/04-02-Tunnel.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/01/05-00-Full-Graph.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/01/05-01-Stage-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/01/05-02-Exfiltration.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/01/05-03-Port-Scan.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/01/05-04-TigerRAT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/01/05-05-Exfil.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2022/12/22/emulating-the-politically-motivated-north-korean-adversary-andariel/</loc>
		<lastmod>2025-07-21T23:07:59+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/12/col-blg-andariel-bg.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/12/00-00-full-graph-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/12/00-01-initial-access.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/12/00-02-akdoor.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/12/00-03-Maui.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/12/01-00-full-graph-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/12/01-01-stage-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/12/01-02-ransomware.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/12/02-00-full-graph-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/12/02-01-discovery.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/12/02-02-tigerrat.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2022/12/19/attack-graph-response-to-apt36-targeted-attacks-against-indian-governmental-organizations/</loc>
		<lastmod>2025-07-21T23:08:55+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/12/col-blg-apt39-bg.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/12/00-full-attack-graph.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/12/01-data-stage.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/12/02-Screen-Capture.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/12/03-Exfil.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2022/12/14/emulating-the-financially-motivated-north-korean-adversary-bluenoroff/</loc>
		<lastmod>2025-07-21T23:10:21+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/12/col-blg-bluenoroff-bg.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/12/02-01-initial-access.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/12/02-02-backdoor.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/12/02-03-exfiltration.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/12/03-00-full-graph.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/12/03-01-mshta.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/12/03-02-discovery.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/12/03-03-passwords.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2022/12/13/limits-exist-on-what-chatgpt-will-tell-you-about-warfare-and-thats-a-good-thing/</loc>
		<lastmod>2025-07-21T23:11:25+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/12/kevin-clyde-berbano-eN9ICLeDlZI-unsplash-scaled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/12/Screen-Shot-2022-12-13-at-4.36.11-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/12/Screen-Shot-2022-12-13-at-4.59.50-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/12/Screen-Shot-2022-12-13-at-5.18.49-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2022/12/12/a-post-about-bas-written-in-the-voice-of-langston-hughes-by-openais-chatgpt/</loc>
		<lastmod>2025-07-21T23:12:03+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/12/Screen-Shot-2022-12-12-at-4.26.36-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2022/12/08/looking-back-at-2022-adoption-at-scale-research-and-validated-industry-analysis/</loc>
		<lastmod>2025-07-21T23:15:29+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/12/sid-suratia-KzoTvAgIckI-unsplash-scaled-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2022/12/03/attack-graph-response-to-us-cert-alert-aa22-335a-stopransomware-cuba-ransomware/</loc>
		<lastmod>2025-07-21T23:16:13+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2023/05/feature.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/12/00-full-graph.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/12/01-hancitor.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/12/02-credentials.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/12/03-romcom-scaled.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/12/04-cuba.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2022/11/18/attack-graph-response-to-us-cert-alert-aa22-321a/</loc>
		<lastmod>2025-07-21T23:20:50+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/11/aa22-321a-bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2022/11/17/attack-graph-response-to-us-cert-alert-aa22-320a/</loc>
		<lastmod>2025-07-22T00:09:28+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/11/blog-aa22-320a-bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2022/11/03/customizing-attackiq-scenarios-to-validate-text4shell-protections/</loc>
		<lastmod>2025-07-22T00:10:11+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/11/blog-text4shell-bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2022/10/31/the-lessons-ash-carter-taught-me/</loc>
		<lastmod>2025-07-22T00:10:32+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/10/ash-carter-2016.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2022/10/24/riskanalyzer-3-0/</loc>
		<lastmod>2025-07-22T00:10:50+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/07/ft-4.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/10/1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/10/2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/10/3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/10/4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/10/5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2022/10/06/attack-graph-response-to-us-cert-alert-aa22-277a/</loc>
		<lastmod>2025-07-22T00:11:56+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/10/blog-aa22-277a-top-10-hd.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2022/09/27/purple-hats-2022-customer-awards/</loc>
		<lastmod>2025-07-22T00:14:12+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/09/col-blg-customer-awards.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/09/col-blg-chris-frenz.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/09/col-blg-uma-mahesh.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/09/col-blg-nathan-morelli.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/09/col-blg-bupa.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/09/col-blg-ge.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/09/col-blg-neil-bridges.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/09/col-blg-david-das-neves.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/09/col-blg-sylvia-worlali-azumah.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2022/09/23/attack-graph-response-to-us-cert-alert-aa22-264a-iranian-state-actors-conduct-cyber-operations-against-the-government-of-albania/</loc>
		<lastmod>2025-07-22T00:15:13+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/09/ft-aa22-264a.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2022/09/21/emulating-the-sophisticated-russian-adversary-apt28/</loc>
		<lastmod>2025-07-22T00:16:10+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/09/ft-bg-ag-apt28.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2022/09/16/attack-graph-response-to-us-cert-alert-aa22-257a-iranian-islamic-revolutionary-guard-corps-affiliated-cyber-actors-exploiting-vulnerabilities-for-ransom-operations/</loc>
		<lastmod>2025-07-22T00:17:02+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/09/00-full-graph-1-scaled.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/09/00-full-graph-scaled.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/09/01-discovery-scaled.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/09/02-network-discovery-scaled.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/09/03-admin-access-scaled.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/09/04-lsass-scaled.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/09/05-encrypt-1-scaled.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2022/09/08/attack-graph-response-to-us-cert-alert-aa22-249a-stopransomware-vice-society/</loc>
		<lastmod>2025-07-22T00:18:03+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/09/adi-goldstein-EUsVwEOsblE-unsplash-2-scaled-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2022/08/11/response-to-us-cert-alert-aa22-223a-testing-security-controls-against-zeppelin-ransomware/</loc>
		<lastmod>2025-07-22T00:18:37+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/08/biblioteca-valenciana-nicolau-primitiu-QOPkIw4e52k-unsplash.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2022/08/10/response-to-us-cert-alert-aa22-216a-testing-security-controls-against-2021s-top-malware-strains/</loc>
		<lastmod>2025-07-22T00:19:05+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/08/col-blg-aa22-216A-bg.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2022/08/04/how-to-test-your-defenses-against-personalized-top-10-mitre-attck-techniques/</loc>
		<lastmod>2025-07-22T00:21:41+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/08/ft-ma-top-10-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2022/08/02/malware-emulation-attack-graph-for-sysjokers-linux-variant/</loc>
		<lastmod>2025-07-22T00:22:08+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/08/SysJoker-3-Cron.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2022/07/29/idc-study-finds-organizations-using-attackiq-significantly-reduced-risk-and-cost-of-security-breaches-while-improving-soc-efficiency/</loc>
		<lastmod>2025-07-22T00:26:42+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/07/IDC-Study-The-Business-Value-of-AttackIQ-22-1200x627-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/07/attackiq-idc-business-value-snapshot.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2022/07/27/why-moving-beyond-cvss-scores/</loc>
		<lastmod>2025-07-22T00:27:18+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/07/ft-2.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2022/07/13/4-signs/</loc>
		<lastmod>2025-07-22T00:27:45+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/07/ft-1.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2022/06/28/attack-graph-response-to-us-cert-alert-aa22-174a-malicious-cyber-actors-continue-to-exploit-log4shell-in-vmware-horizon-systems/</loc>
		<lastmod>2025-07-22T00:29:07+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/06/victim_1_1_save_recon.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/06/victim_2_1_lat_movement.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2022/06/24/response-to-us-cert-alert-aa22-174a-malicious-cyber-actors-continue-to-exploit-log4shell-in-vmware-horizon-systems/</loc>
		<lastmod>2025-07-22T00:30:18+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/06/artem-bryzgalov-r2CAjGQ0gSI-unsplash-scaled-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2022/06/15/attack-graph-emulating-the-conti-ransomware-teams-behaviors/</loc>
		<lastmod>2025-07-22T00:38:05+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/06/Credentials-scaled.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2022/06/02/response-to-us-cert-alert-aa22-152a-karakurt-data-extortion-group/</loc>
		<lastmod>2025-07-22T00:40:29+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/06/col-blg-us-cert-alert-aa22-152a.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2022/05/26/announcing-attackiqs-malware-emulation-attack-graphs/</loc>
		<lastmod>2025-07-22T00:42:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2022/05/10/attack-graph-response-to-us-cert-aa22-108a-north-korean-targeting-of-blockchain-companies/</loc>
		<lastmod>2025-07-22T00:43:44+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/05/blockchain-g5b6717494_1920.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2022/04/29/attack-graph-response-to-unc1151-continued-targeting-of-ukraine/</loc>
		<lastmod>2025-07-22T00:44:33+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/04/col-blg-unc1151.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2022/04/01/attack-graph-response-to-us-cert-aa22-083a-historical-russia-based-actors-targeting-the-energy-sector/</loc>
		<lastmod>2025-07-22T00:45:57+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/04/maximalfocus-HakTxidk36I-unsplash-1-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/04/US-CERT-AA22-083A-Attack-Graph.png-scaled-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2022/03/18/attack-graph-response-to-us-cert-aa22-0740-russia-based-actors-disabling-multi-factor-authentication-mfa/</loc>
		<lastmod>2025-07-22T00:47:14+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/03/Authentication.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/03/AA22-074A-scaled.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2022/02/24/preparing-for-russian-state-sponsored-cyberthreats-to-u-s-and-allied-critical-infrastructure/</loc>
		<lastmod>2025-07-22T00:48:35+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2022/02/Prepare.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2025/04/24/emulating-helldown-ransomware-2/</loc>
		<lastmod>2025-07-22T14:57:49+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/04/col-blg-helldown-bg.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2025/04/03/response-to-cisa-advisory-aa25-093a/</loc>
		<lastmod>2025-07-25T22:11:34+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/04/col-blg-fast-flux-aa25-093a-bg.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2025/06/12/updated-response-to-cisa-advisory-aa23-352a/</loc>
		<lastmod>2025-07-25T22:59:59+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/06/col-blg-aa23-352a-bg-1.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2025/07/25/cisa-aa25-203a-interlock/</loc>
		<lastmod>2025-07-29T15:19:02+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/07/col-blg-aa25-203a-bg.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/07/col-blg-aa25-203a-interlock-00.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/07/col-blg-aa25-203a-interlock-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/07/col-blg-aa25-203a-interlock-02.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2025/07/22/ransom-tales-1/</loc>
		<lastmod>2025-07-29T15:20:26+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/07/col-blg-rt-01a-bg.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2025/06/23/iranian-cyber-threat-escalation/</loc>
		<lastmod>2025-07-29T15:22:45+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/06/col-blg-icte-bg.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2025/06/16/response-to-cisa-advisory-aa25-163a/</loc>
		<lastmod>2025-07-29T15:25:11+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/06/col-blg-aa25-163a-bg.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2025/06/03/ready-3/</loc>
		<lastmod>2025-07-29T15:28:13+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/06/ready-3-1200x628-bg.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2025/05/29/emulating-scattered-spider/</loc>
		<lastmod>2025-07-29T15:31:05+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/05/col-blg-scattered-spider-bg.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2025/05/22/response-to-cisa-advisory-aa25-141b/</loc>
		<lastmod>2025-07-29T15:32:49+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/05/col-blg-aa25-141b-bg.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2025/05/21/response-to-cisa-advisory-aa25-141a/</loc>
		<lastmod>2025-07-29T15:34:04+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/05/col-blg-aa25-141a-bg.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2025/05/15/emulating-vanhelsing-ransomware/</loc>
		<lastmod>2025-07-29T15:35:19+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/05/col-blg-vanhelsing-bg.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2025/05/08/emulating-termite-ransomware/</loc>
		<lastmod>2025-07-29T15:36:17+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/05/col-blg-termite-bg.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2025/04/24/academy-enterprise/</loc>
		<lastmod>2025-07-29T15:38:14+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/04/bg-attackiq-academy-enterprise.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2025/05/23/emulating-dragonforce-ransomware/</loc>
		<lastmod>2025-07-29T18:38:15+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2025/05/col-blg-dragonforce-bg.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://attackiq.v11.site/2024/08/06/attackiq-dora-automated-assessments/</loc>
		<lastmod>2025-08-04T21:58:05+00:00</lastmod>
		<image:image>
			<image:loc>https://attackiq.v11.site/wp-content/uploads/2024/08/col-blg-dora-bg.webp</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->