<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://securityblog.info/2023/06/15/DarkReading-AD-Security.html</loc>
<lastmod>2023-06-15T17:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblog.info/2023/06/17/who-owns-your-hybrid-activedirectory.html</loc>
<lastmod>2023-06-17T10:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblog.info/2023/06/17/MITRE-T1649.html</loc>
<lastmod>2023-06-17T17:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblog.info/2023/06/18/MisconfiguredTemplates.html</loc>
<lastmod>2023-06-18T17:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblog.info/2023/07/01/ThreatHuntingM365.html</loc>
<lastmod>2023-07-01T17:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblog.info/2023/07/10/ModernAttackpaths.html</loc>
<lastmod>2023-07-10T17:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblog.info/2023/07/11/CVE-2022-26923.html</loc>
<lastmod>2023-07-11T17:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblog.info/2023/07/17/HuntingMindMap.html</loc>
<lastmod>2023-07-17T17:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblog.info/2023/08/04/CredentialScan.html</loc>
<lastmod>2023-08-04T17:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblog.info/2023/08/06/vSphereattacks.html</loc>
<lastmod>2023-08-06T17:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblog.info/2023/08/06/vSphereDefense.html</loc>
<lastmod>2023-08-06T19:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblog.info/2023/08/11/API.html</loc>
<lastmod>2023-08-11T17:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblog.info/2023/08/12/teamviewer.html</loc>
<lastmod>2023-08-12T17:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblog.info/2023/08/13/Anydesk.html</loc>
<lastmod>2023-08-13T17:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblog.info/2024/12/06/Abusing-Powerautomate-Flows.html</loc>
<lastmod>2024-12-06T17:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblog.info/2024/12/08/WindowsThreatHunting-Part1.html</loc>
<lastmod>2024-12-08T04:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblog.info/2024/12/08/Threat-Modeling-Application-Protection-Policy.html</loc>
<lastmod>2024-12-08T21:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblog.info/AboutMe/</loc>
</url>
<url>
<loc>https://securityblog.info/</loc>
</url>
<url>
<loc>https://securityblog.info/posts/</loc>
</url>
<url>
<loc>https://securityblog.info/talks/</loc>
</url>
<url>
<loc>https://securityblog.info/page2/</loc>
</url>
<url>
<loc>https://securityblog.info/resources/raw/2021BSides-SG_Attacking_And_Defending_ActiveDirectory.pdf</loc>
<lastmod>2025-09-21T08:38:20+00:00</lastmod>
</url>
<url>
<loc>https://securityblog.info/resources/raw/2021_BlackHat_Asia_Threat_Hunting_In_Active_Directory_Environment.pdf</loc>
<lastmod>2025-09-21T08:38:20+00:00</lastmod>
</url>
<url>
<loc>https://securityblog.info/resources/raw/2021_SANS_TH_Summit_Hunting_Backdoors_in_AD.pdf</loc>
<lastmod>2025-09-21T08:38:20+00:00</lastmod>
</url>
<url>
<loc>https://securityblog.info/resources/raw/2021_Virus_Bulletin_Who_Owns_Your_Hybrid_Active_Directory.pdf</loc>
<lastmod>2025-09-21T08:38:20+00:00</lastmod>
</url>
<url>
<loc>https://securityblog.info/resources/raw/2022AVAR_ThreatHunting_in_M365.pdf</loc>
<lastmod>2025-09-21T08:38:20+00:00</lastmod>
</url>
<url>
<loc>https://securityblog.info/resources/raw/2022VietnamSBC_Ransomware_is_Knocking_at_your_Door.pdf</loc>
<lastmod>2025-09-21T08:38:20+00:00</lastmod>
</url>
<url>
<loc>https://securityblog.info/resources/raw/2022_SANS_DFIR_Threat_Hunting_In_M365_Environment.pdf</loc>
<lastmod>2025-09-21T08:38:20+00:00</lastmod>
</url>
<url>
<loc>https://securityblog.info/resources/raw/2023SANSDFIR_DefendingandInvestigatingHypervisors.pdf</loc>
<lastmod>2025-09-21T08:38:20+00:00</lastmod>
</url>
</urlset>
