<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="/wp-content/plugins/squirrly-seo/view/assets/css/sitemap.xsl"?>
<!-- generated-on="2026-01-12T23:34:44+00:00" -->
<!-- generator="Squirrly SEO Sitemap" -->
<!-- generator-url="https://wordpress.org/plugins/squirrly-seo/" -->

<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" >
	<url>
		<loc>https://zerotak.com/blog/tracking-c2-backdoors-in-open-source-projects/</loc>
		<lastmod>2025-11-21T10:42:16+00:00</lastmod>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://zerotak.com/wp-content/uploads/2025/11/tracking-c2-backdoors-in-open-source.png</image:loc>
			<image:title>tracking c2 backdoors in open source</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://zerotak.com/blog/cyber-jungle-intelligence-series/</loc>
		<lastmod>2025-11-19T07:58:42+00:00</lastmod>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://zerotak.com/wp-content/uploads/2025/11/cyber-intelligence-series.png</image:loc>
			<image:title>cyber intelligence series</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://zerotak.com/blog/zerotak-launches-uae-based-security-operations-center-soc/</loc>
		<lastmod>2025-05-30T09:00:37+00:00</lastmod>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://zerotak.com/wp-content/uploads/2025/05/photo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://zerotak.com/blog/open-source-security-tools-for-ci-cd-testing/</loc>
		<lastmod>2022-12-07T08:41:40+00:00</lastmod>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://zerotak.com/wp-content/uploads/2022/11/zerotak_open-source-tools-featured-image.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://zerotak.com/wp-content/uploads/2022/11/zerotak_open-source-tools-image5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://zerotak.com/blog/credentials-harvesting-using-swagger-ui/</loc>
		<lastmod>2022-12-07T08:41:40+00:00</lastmod>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://zerotak.com/wp-content/uploads/2022/11/zerotak_blog-article1-featured.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://zerotak.com/wp-content/uploads/2022/11/zerotak_article1-code1.png</image:loc>
		</image:image>
	</url>
</urlset>
