<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//socjournal.com/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://socjournal.com/active-scanning-reconnaissance-analysis-t1595-port-scan-service-enumeration/</loc>
		<lastmod>2026-03-09T19:48:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://socjournal.com/wi-fi-networks-attack-analysis-t1669-rogue-access-point-evil-twin/</loc>
		<lastmod>2026-01-29T07:32:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://socjournal.com/valid-accounts-attack-analysis-t1078-default-credentials-on-iot-devices/</loc>
		<lastmod>2026-01-29T07:26:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://socjournal.com/trusted-relationship-attack-analysis-t1199-compromised-contractor-credentials/</loc>
		<lastmod>2026-01-29T07:19:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://socjournal.com/supply-chain-compromise-analysis-t1195-compromised-software-update/</loc>
		<lastmod>2026-01-29T07:10:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://socjournal.com/soc-incident-report-replication-through-removable-media-t1091/</loc>
		<lastmod>2026-01-29T07:01:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://socjournal.com/phishing-incident-analysis-user-reported-via-phishme/</loc>
		<lastmod>2026-01-29T06:53:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://socjournal.com/phishing-incident-report-user-reported-email-analysis/</loc>
		<lastmod>2026-01-29T06:52:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://socjournal.com/hardware-additions-attack-t1200/</loc>
		<lastmod>2026-01-25T18:31:02+00:00</lastmod>
		<image:image>
			<image:loc>https://socjournal.com/wp-content/uploads/2026/01/Screenshot-2026-01-26-000019.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socjournal.com/external-remote-services-t1133-incident/</loc>
		<lastmod>2026-01-25T17:55:09+00:00</lastmod>
		<image:image>
			<image:loc>https://socjournal.com/wp-content/uploads/2026/01/Screenshot-2026-01-25-232107.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socjournal.com/exploit-public-facing-application-incident/</loc>
		<lastmod>2026-01-25T17:42:34+00:00</lastmod>
		<image:image>
			<image:loc>https://socjournal.com/wp-content/uploads/2026/01/Screenshot-2026-01-25-230320.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socjournal.com/drive-by-compromise-incident/</loc>
		<lastmod>2026-01-25T17:29:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://socjournal.com/phishing-email/</loc>
		<lastmod>2026-01-25T16:47:05+00:00</lastmod>
		<image:image>
			<image:loc>https://socjournal.com/wp-content/uploads/2026/01/images-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socjournal.com/the-incident-reported-email/</loc>
		<lastmod>2026-01-25T16:39:00+00:00</lastmod>
		<image:image>
			<image:loc>https://socjournal.com/wp-content/uploads/2026/01/images.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socjournal.com/global-cybersecurity-outlook-2026-geopolitics-as-the-new-attack-surface/</loc>
		<lastmod>2026-01-25T12:32:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://socjournal.com/cybersecurity-2026-zero-trust-vs-the-quantum-horizon/</loc>
		<lastmod>2026-01-24T11:04:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://socjournal.com/top-10-cybersecurity-trends-2026/</loc>
		<lastmod>2026-01-24T09:41:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://socjournal.com/the-signal-and-the-noise-alert-fatigue-in-security-operations-2026/</loc>
		<lastmod>2026-01-23T16:00:42+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Rank Math SEO Plugin (c) Rank Math - rankmath.com -->