<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1"><url><loc>https://www.cyberseccafe.com/archive</loc><changefreq>daily</changefreq></url><url><loc>https://www.cyberseccafe.com/about</loc><changefreq>weekly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/detections-as-code-in-datadog-pt</loc><lastmod>2025-11-04</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/how-to-run-a-table-top-exercise-for</loc><lastmod>2025-10-21</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/how-to-improve-your-security-posture</loc><lastmod>2025-10-15</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/just-figure-it-out</loc><lastmod>2025-10-15</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/acronyms-suck-but-heres-your-cybersecurity</loc><lastmod>2025-09-30</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/security-engineer-starter-guide-cloud</loc><lastmod>2025-09-23</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/soft-skills-in-cybersecurity</loc><lastmod>2025-09-16</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/lack-of-soar-and-ai-agents-isnt-killing</loc><lastmod>2025-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/detections-as-code-in-datadog-how</loc><lastmod>2025-10-20</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/you-should-prioritize-writing-as</loc><lastmod>2025-10-16</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/40-cybersecurity-tips-for-everyday</loc><lastmod>2025-08-19</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/your-soc-is-not-an-it-helpdesk-so</loc><lastmod>2025-08-12</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/i-wish-i-knew-this-when-i-started</loc><lastmod>2025-08-05</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/cybersecurity-is-data-collect-analyze</loc><lastmod>2025-07-29</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/the-cybersec-cafe-discord-community</loc><lastmod>2025-07-29</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/day-in-the-life-of-a-security-engineer</loc><lastmod>2025-07-15</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/understanding-the-full-spectrum-of</loc><lastmod>2025-07-08</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/cloud-security-fundamentals-iam-rbac</loc><lastmod>2025-07-01</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/how-to-actually-leverage-the-mitre</loc><lastmod>2025-06-26</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/the-playbook-for-playbooks</loc><lastmod>2025-06-17</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/tuning-detections-isnt-hard-unless</loc><lastmod>2025-06-10</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/security-engineer-starter-guide-security</loc><lastmod>2025-06-03</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/5-lessons-learned-as-incident-commander</loc><lastmod>2025-05-27</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/my-log-source-agnostic-methodology</loc><lastmod>2025-05-20</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/cyber-chat-page-glave</loc><lastmod>2025-05-13</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/email-security-the-basics-of-protecting</loc><lastmod>2025-05-06</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/how-to-leverage-ai-as-a-security</loc><lastmod>2025-04-29</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/this-is-what-id-tell-every-junior</loc><lastmod>2025-04-22</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/application-security-checklist-from</loc><lastmod>2025-04-17</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/threat-hunting-explained-what-it</loc><lastmod>2025-04-15</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/my-siem-agnostic-creative-process</loc><lastmod>2025-10-26</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/reimagining-the-soc-analyst-role</loc><lastmod>2025-03-25</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/cyber-chat-day-johnson</loc><lastmod>2025-03-18</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/how-to-build-a-cybersecurity-resume</loc><lastmod>2025-03-17</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/how-to-solve-your-cybersecurity-tech</loc><lastmod>2025-03-07</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/how-to-prepare-for-your-cybersecurity</loc><lastmod>2025-02-25</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/cyber-chat-rs0n</loc><lastmod>2025-02-18</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/why-slack-is-bad-from-a-security</loc><lastmod>2025-02-11</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/security-engineer-starter-guide-incident</loc><lastmod>2025-02-04</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/why-knowing-how-to-query-is-an-essential</loc><lastmod>2025-01-28</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/5-keys-to-fortifying-your-personal</loc><lastmod>2025-01-21</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/cybersec-os-your-cybersecurity-knowledge</loc><lastmod>2025-03-11</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/how-to-create-incident-response-documentation</loc><lastmod>2025-01-14</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/how-to-actually-get-an-entry-level</loc><lastmod>2025-01-07</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/2024-wrapped</loc><lastmod>2024-12-31</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/typosquatting-in-github-actions</loc><lastmod>2024-12-24</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/idor-who-what-where-when-why-how</loc><lastmod>2024-12-17</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/security-engineer-starter-guide-detection</loc><lastmod>2024-12-13</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/what-makes-a-good-detection</loc><lastmod>2024-12-13</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/exploiting-xss-to-steal-cookies</loc><lastmod>2024-12-13</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/why-exceptions-as-code-just-makes</loc><lastmod>2024-12-13</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/blind-os-command-injection-with-output</loc><lastmod>2025-01-13</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/python-for-security-engineers</loc><lastmod>2024-12-13</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/exploiting-sqli-to-query-database</loc><lastmod>2024-12-13</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/how-i-created-an-ai-soc-analyst</loc><lastmod>2024-12-13</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/sponsors</loc><lastmod>2025-07-29</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/blind-xxe-with-oob-interaction-via</loc><lastmod>2024-12-20</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/scaling-the-soc-the-right-way</loc><lastmod>2024-12-13</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/web-shell-upload-via-extension-blacklist-056</loc><lastmod>2024-12-13</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/how-to-threat-model-a-guide-to-effectively</loc><lastmod>2024-12-13</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/web-shell-upload-via-extension-blacklist</loc><lastmod>2024-12-13</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/http-request-smuggling-wwwwwh-cybersec</loc><lastmod>2024-12-13</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/server-side-template-injection-in</loc><lastmod>2024-12-13</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/detection-engineering-the-soc-building</loc><lastmod>2025-01-13</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/multi-step-process-with-no-access</loc><lastmod>2025-07-24</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/detection-engineering-the-soc-designing</loc><lastmod>2024-12-13</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/insufficient-workflow-validation</loc><lastmod>2024-12-13</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/detection-engineering-the-soc-writing</loc><lastmod>2024-12-13</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/file-path-traversal-sequences-stripped</loc><lastmod>2024-12-13</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/web-cache-poisoning-wwwwwh-cybersec</loc><lastmod>2024-12-13</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/ssrf-via-flawed-request-parsing-cybersec</loc><lastmod>2024-12-13</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/a-new-siem-architecture-it-depends</loc><lastmod>2025-01-13</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/cors-vulnerability-with-trusted-insecure</loc><lastmod>2024-12-13</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/what-is-detection-engineering-and</loc><lastmod>2024-12-13</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/web-cache-poisoning-with-multiple</loc><lastmod>2024-12-13</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/mapping-on-premises-networks-for</loc><lastmod>2024-12-13</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/dom-xss-using-web-messages-and-a</loc><lastmod>2024-12-13</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/sql-injection-sqli-wwwwwh-cybersec</loc><lastmod>2024-12-13</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/using-application-functionality-to</loc><lastmod>2025-01-13</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/creating-a-data-driven-detection</loc><lastmod>2024-12-13</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/csrf-where-token-validation-depends</loc><lastmod>2024-12-13</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/apple-is-better-than-android</loc><lastmod>2024-12-13</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/reflected-cross-site-scripting-xss</loc><lastmod>2024-12-13</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/navigating-ai-risk-in-software-development</loc><lastmod>2024-12-13</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/ssrf-with-filter-bypass-via-open</loc><lastmod>2024-12-13</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/dont-clone-that-repo-cybersec-cafe</loc><lastmod>2024-12-13</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/cybersec-cafe-7-thursday-deep-dive</loc><lastmod>2024-12-13</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/cybersec-cafe-6-tuesday-i-learned</loc><lastmod>2024-12-13</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/cybersec-cafe-5-methodology-monday</loc><lastmod>2024-12-13</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/cybersec-cafe-4-weekly-roundup</loc><lastmod>2024-12-13</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/fighting-alert-fatigue</loc><lastmod>2024-12-13</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/tuesday-i-learned-til</loc><lastmod>2025-01-13</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/methodology-monday-4124</loc><lastmod>2025-01-13</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.cyberseccafe.com/p/coming-soon</loc><lastmod>2024-03-27</lastmod><changefreq>monthly</changefreq></url></urlset>