<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url><loc>https://cipherssecurity.com/glossary/</loc><changefreq>monthly</changefreq><priority>0.8</priority></url>
  <url><loc>https://cipherssecurity.com/glossary/phishing/</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://cipherssecurity.com/glossary/ransomware/</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://cipherssecurity.com/glossary/malware/</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://cipherssecurity.com/glossary/zero-day/</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://cipherssecurity.com/glossary/ddos/</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://cipherssecurity.com/glossary/sql-injection/</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://cipherssecurity.com/glossary/cross-site-scripting/</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://cipherssecurity.com/glossary/csrf/</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://cipherssecurity.com/glossary/ssrf/</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://cipherssecurity.com/glossary/man-in-the-middle/</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://cipherssecurity.com/glossary/brute-force-attack/</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://cipherssecurity.com/glossary/social-engineering/</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://cipherssecurity.com/glossary/botnet/</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://cipherssecurity.com/glossary/trojan/</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://cipherssecurity.com/glossary/rootkit/</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://cipherssecurity.com/glossary/keylogger/</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://cipherssecurity.com/glossary/spyware/</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://cipherssecurity.com/glossary/computer-worm/</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://cipherssecurity.com/glossary/backdoor/</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://cipherssecurity.com/glossary/advanced-persistent-threat/</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://cipherssecurity.com/glossary/command-and-control/</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://cipherssecurity.com/glossary/data-exfiltration/</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://cipherssecurity.com/glossary/lateral-movement/</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://cipherssecurity.com/glossary/privilege-escalation/</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://cipherssecurity.com/glossary/remote-code-execution/</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://cipherssecurity.com/glossary/indicator-of-compromise/</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://cipherssecurity.com/glossary/siem/</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://cipherssecurity.com/glossary/edr/</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://cipherssecurity.com/glossary/firewall/</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://cipherssecurity.com/glossary/vpn/</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://cipherssecurity.com/glossary/encryption/</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://cipherssecurity.com/glossary/hashing/</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://cipherssecurity.com/glossary/mfa/</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://cipherssecurity.com/glossary/tls/</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://cipherssecurity.com/glossary/sandbox/</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://cipherssecurity.com/glossary/honeypot/</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://cipherssecurity.com/glossary/threat-intelligence/</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://cipherssecurity.com/glossary/penetration-testing/</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://cipherssecurity.com/glossary/vulnerability/</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://cipherssecurity.com/glossary/exploit/</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://cipherssecurity.com/glossary/payload/</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://cipherssecurity.com/glossary/credential-stuffing/</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://cipherssecurity.com/glossary/password-spraying/</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://cipherssecurity.com/glossary/supply-chain-attack/</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://cipherssecurity.com/glossary/cryptojacking/</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://cipherssecurity.com/glossary/fileless-malware/</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://cipherssecurity.com/glossary/data-breach/</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://cipherssecurity.com/glossary/zero-trust/</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://cipherssecurity.com/glossary/waf/</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
</urlset>