<?xml version="1.0" encoding="utf-8" standalone="yes"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml"><url><loc>https://securitum.com/services/web-application-penetration-testing/</loc><priority>0.8</priority></url><url><loc>https://securitum.com/services/mobile-application-penetration-testing/</loc></url><url><loc>https://securitum.com/services/infrastructure-penetration-testing/</loc></url><url><loc>https://securitum.com/services/cloud-security-cloud-assessment/</loc></url><url><loc>https://securitum.com/services/social-engineering/</loc></url><url><loc>https://securitum.com/services/ssdlc-implementation/</loc></url><url><loc>https://securitum.com/services/osint/</loc></url><url><loc>https://securitum.com/services/desktop-and-console-applications/</loc></url><url><loc>https://securitum.com/services/configuration-analysis/</loc></url><url><loc>https://securitum.com/company/about-us/</loc></url><url><loc>https://securitum.com/services/source-code-review/</loc></url><url><loc>https://securitum.com/services/red-teaming/</loc></url><url><loc>https://securitum.com/company/team-references/</loc></url><url><loc>https://securitum.com/services/cyberscan-pro/</loc></url><url><loc>https://securitum.com/services/digital-operational-resilience-act-dora/</loc></url><url><loc>https://securitum.com/services/periodic-external-network-scanning/</loc></url><url><loc>https://securitum.com/services/insider-threat/</loc></url><url><loc>https://securitum.com/company/events/</loc></url><url><loc>https://securitum.com/resources/pentest-chronicles/one-time-pwn-unauthenticated-account-takeover-via-one-time-password/</loc><lastmod>2026-01-15T12:16:00+01:00</lastmod></url><url><loc>https://securitum.com/resources/pentest-chronicles/</loc><lastmod>2026-01-15T12:16:00+01:00</lastmod><priority>0.8</priority></url><url><loc>https://securitum.com/</loc><lastmod>2026-01-15T12:16:00+01:00</lastmod><priority>1</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/desktop-app-security-101/</loc><lastmod>2026-01-09T13:28:00+01:00</lastmod></url><url><loc>https://securitum.com/resources/pentest-chronicles/cve-2025-8890/</loc><lastmod>2025-12-19T12:45:00+01:00</lastmod></url><url><loc>https://securitum.com/resources/pentest-chronicles/extremaly-quick-ad-takeover-during-insider-threat-audit/</loc><lastmod>2025-12-05T13:28:00+01:00</lastmod></url><url><loc>https://securitum.com/resources/pentest-chronicles/hidden-vulnerabilities-with-visible-consequences-from-enumeration-through-blind-sql-injection-to-the-database-administrator/</loc><lastmod>2025-11-24T12:10:00+00:00</lastmod></url><url><loc>https://securitum.com/resources/pentest-chronicles/how-simple-math-can-crash-your-app.-support-for-exponential-number-format-leads-to-denial-of-service./</loc><lastmod>2025-11-14T22:44:00+00:00</lastmod></url><url><loc>https://securitum.com/resources/pentest-chronicles/how-secure-are-your-application-secrets-another-lesson-from-the-last-pentest/</loc><lastmod>2025-11-07T00:00:00+01:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/breaking-the-tui-from-client-quirks-to-dual-local-privilege-escalation-on-aix/</loc><lastmod>2025-10-31T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/even-the-best-can-be-beaten-bypassing-edrs-with-custom-malware/</loc><lastmod>2025-10-24T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/from-source-files-to-admin-exploiting-hardcoded-credentials-in-a-web-app/</loc><lastmod>2025-10-16T22:00:00+00:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/why-you-should-review-your-ios-defense-mechanisms-in-2025/</loc><lastmod>2025-10-10T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/tags/cybersecurity/</loc><lastmod>2025-09-26T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/tags/dataprotection/</loc><lastmod>2025-09-26T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/tags/infosec/</loc><lastmod>2025-09-26T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/resources/pentest-chronicles/let-the-framework-guard-your-jwt-internals-but-who-is-guarding-the-framework/</loc><lastmod>2025-09-26T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/tags/penetrationtesting/</loc><lastmod>2025-09-26T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/tags/pentestchronicles/</loc><lastmod>2025-09-26T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/tags/</loc><lastmod>2025-09-26T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/tags/websecurity/</loc><lastmod>2025-09-26T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/resources/pentest-chronicles/trust-me-im-a-plugin-chaining-webdav-and-unsigned-code-to-remote-code-execution/</loc><lastmod>2025-09-19T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/password-recovery-flow-flowing-straight-into-attackers-hands/</loc><lastmod>2025-09-12T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/how-to-extract-certificates-and-private-keys-from-ios-keychain/</loc><lastmod>2025-09-05T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/low-entropy-of-password-reset-token-leads-to-account-takeover/</loc><lastmod>2025-08-22T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/zero-auth-to-admin-exploiting-known-vulnerabilites-in-real-world-pen-tetsts/</loc><lastmod>2025-08-08T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/filter-injection-via-microsoft-graph-api-in-a-custom-application-from-verbose-errors-to-account-takeover/</loc><lastmod>2025-08-01T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/using-malicious-discord-apps-to-access-user-data-through-oauth2-permission-grants/</loc><lastmod>2025-07-25T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/mac-spoofing-made-easy-lessons-in-lan-and-physical-security-from-a-real-pentest/</loc><lastmod>2025-07-20T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/xxe-using-j4lfopserver-leading-to-remote-code-execution/</loc><lastmod>2025-07-13T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/wipe-and-rise-how-deleting-folder-on-windows-enables-lpe/</loc><lastmod>2025-07-11T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/iam-privilege-escalation-in-azure-cloud/</loc><lastmod>2025-07-07T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/insider-threat-how-to-take-over-a-domain-inside-an-unhackable-network/</loc><lastmod>2025-06-20T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/inter-process-communication-vulnerability-unrestricted-write-permissions-in-vpn-service/</loc><lastmod>2025-05-30T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/tunnelvision-selective-denial-of-service-vulnerability/</loc><lastmod>2025-05-23T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/privilege-escalation-through-docker-group-membership-and-sudo-backdoor/</loc><lastmod>2025-05-16T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/two-step-exploit-from-initial-request-to-complete-admin-takeover/</loc><lastmod>2025-05-09T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/logging-into-any-application-user-account-using-x-as-a-password-a-real-case-of-unauthenticated-backdoor-access/</loc><lastmod>2025-04-30T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/remote-configuration-disclosure-and-code-execution-in-a-legacy-typo3-instance/</loc><lastmod>2025-04-25T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/overriding-data-loss-prevention-controls-via-misconfigurations-and-endpoint-security-bypass/</loc><lastmod>2025-04-17T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/unrestricted-file-upload-leading-to-arbitrary-code-execution-and-ntlm-hash-disclosure/</loc><lastmod>2025-04-11T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/exploiting-improper-password-reset-token-validation-an-uncommon-authentication-flaw-enabling-account-takeover/</loc><lastmod>2025-04-04T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/denial-of-service-attack-via-web-cache-poisoning-vulnerability-analysis/</loc><lastmod>2025-03-28T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/not-easy-authorization/</loc><lastmod>2025-03-14T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/breaking-license-validation-in-a-desktop-application-how-business-logic-flaw-can-enable-unauthorized-activations/</loc><lastmod>2025-03-07T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/possible-misconfigurations-in-active-directory-security-audit-findings/</loc><lastmod>2025-02-28T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/how-secure-are-your-application-secrets-lessons-from-years-of-real-world-penetration-tests/</loc><lastmod>2025-02-21T15:00:00+00:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/vishing-how-it-works-and-why-its-so-effective-insights-from-commercial-social-engineering-tests/</loc><lastmod>2025-02-14T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/from-temporary-solutions-to-insecure-security-practices./</loc><lastmod>2025-02-06T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/the-hidden-danger-in-pdfs-how-misconfigurations-can-expose-sensitive-data/</loc><lastmod>2025-01-28T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/tags/devsecops/</loc><lastmod>2025-01-22T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/resources/pentest-chronicles/ex-employee-private-code-repository-accounts-a-breach-waiting-to-happen/</loc><lastmod>2025-01-22T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/tags/sourcecodesecurity/</loc><lastmod>2025-01-22T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/tags/datasecurity/</loc><lastmod>2025-01-10T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/resources/pentest-chronicles/from-spi-sniffing-to-keys-extracting-clevis/bitlocker-secrets-from-tpm-traffic-%23hardwarehacking/</loc><lastmod>2025-01-10T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/tags/redteam/</loc><lastmod>2025-01-10T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/tags/securityresearch/</loc><lastmod>2025-01-10T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/tags/pentesting/</loc><lastmod>2025-01-03T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/tags/secureapplications/</loc><lastmod>2025-01-03T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/tags/sessionfixation/</loc><lastmod>2025-01-03T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/resources/pentest-chronicles/symfony-profiler-in-production-an-entry-point-for-sensitive-data-leaks-and-remote-code-execution/</loc><lastmod>2025-01-03T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/from-an-aws-cognito-misconfiguration-to-full-account-takeover/</loc><lastmod>2024-12-30T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/session-fixation-a-hidden-threat-to-web-application-security/</loc><lastmod>2024-12-20T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/arbitrary-code-execution-through-uploading-a-malicious-jsp-file-vulnerability-analysis/</loc><lastmod>2024-12-13T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/tags/securedevelopment/</loc><lastmod>2024-12-13T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/tags/webapplicationsecurity/</loc><lastmod>2024-12-13T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/tags/appsec/</loc><lastmod>2024-12-06T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/resources/pentest-chronicles/exploiting-the-password-reset-vulnerability-a-real-world-case-study./</loc><lastmod>2024-12-06T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/tags/vulnerabilitymanagement/</loc><lastmod>2024-12-06T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/resources/pentest-chronicles/exploring-vulnerabilities-in-mobile-applications-key-exchange-protocol-hacking-man-in-the-middle-and-brute-force-in-action.-part-2-of-2./</loc><lastmod>2024-11-29T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/exploring-vulnerabilities-in-mobile-applications-key-exchange-protocol-analysis-and-toolkit-setup.-part-1-of-2./</loc><lastmod>2024-11-22T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/memory-heist-the-secrets-and-risks-of-cold-boot-attacks/</loc><lastmod>2024-11-15T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/tags/mobileappsecurity/</loc><lastmod>2024-10-31T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/tags/mobiledevelopment/</loc><lastmod>2024-10-31T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/resources/pentest-chronicles/security-mechanisms-vs.-application-logic-conclusions-from-mobile-app-penetration-tests/</loc><lastmod>2024-10-31T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/accessing-internal-network-by-wifi-hacking-2024-pentest-case/</loc><lastmod>2024-10-25T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/tags/vulnerabilityassessment/</loc><lastmod>2024-10-25T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/resources/pentest-chronicles/from-soql-query-to-data-breach-lessons-from-a-real-world-pentest/</loc><lastmod>2024-10-18T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/bypassing-host-validation-real-pentest-case-of-sensitive-data-exposure/</loc><lastmod>2024-10-11T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/hacking-ibm-as/400-in-2024-qshell-and-remote-code-execution/</loc><lastmod>2024-10-04T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/tags/dos/</loc><lastmod>2024-09-20T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/resources/pentest-chronicles/heartbleed-vulnerability-in-2024-a-fresh-case-from-our-pentest/</loc><lastmod>2024-09-20T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/tags/securitytesting/</loc><lastmod>2024-09-20T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/tags/serversecurity/</loc><lastmod>2024-09-20T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/tags/vulnerabilityresearch/</loc><lastmod>2024-09-20T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/resources/pentest-chronicles/denial-of-service-due-to-improper-handling-of-decimal-values/</loc><lastmod>2024-09-13T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/crafting-malicious-software-for-penetration-testers-a-guide-from-novice-to-pro/</loc><lastmod>2024-08-26T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/how-not-to-store-data-in-a-desktop-application/</loc><lastmod>2024-08-07T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/key-insights-from-red-team-testing/</loc><lastmod>2024-08-05T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/from-low-privileged-user-to-remote-code-execution-step-by-step-pentest-journey/</loc><lastmod>2024-07-12T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/tags/networksecurity/</loc><lastmod>2024-07-12T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/tags/privilegeescalation/</loc><lastmod>2024-07-12T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/tags/rce/</loc><lastmod>2024-07-12T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/tags/realworldpentest/</loc><lastmod>2024-07-12T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/tags/techinsights/</loc><lastmod>2024-07-12T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/tags/cve/</loc><lastmod>2024-07-05T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/tags/foogallery/</loc><lastmod>2024-07-05T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/resources/pentest-chronicles/two-new-cves-foogallerys-wordpress-plugin/</loc><lastmod>2024-07-05T00:00:00+02:00</lastmod><priority>0.5</priority></url><url><loc>https://securitum.com/tags/xss/</loc><lastmod>2024-07-05T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/tags/authorizationbypass/</loc><lastmod>2024-06-21T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/resources/pentest-chronicles/elevating-privileges-via-a-xss-and-authorization-bypass-attack/</loc><lastmod>2024-06-21T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/few-steps-on-how-to-take-over-a-whole-application/</loc><lastmod>2024-06-14T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/how-a-simple-vulnerability-allowed-proxying-tcp-traffic-real-pentest-case/</loc><lastmod>2024-06-07T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/exploiting-pdf-generation-vulnerability-a-case-study-from-real-pentest/</loc><lastmod>2024-06-05T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/tags/dosattack/</loc><lastmod>2024-05-29T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/resources/pentest-chronicles/password-reset-flaw-when-anyone-can-reset-your-password/</loc><lastmod>2024-05-29T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/why-you-shouldnt-again-roll-your-own-cryptography-real-life-case-in-2024./</loc><lastmod>2024-05-17T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/how-a-simple-lack-of-sms-code-verification-can-compromise-financial-security/</loc><lastmod>2024-04-30T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/tags/racecondition/</loc><lastmod>2024-04-30T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/tags/realworldpentests/</loc><lastmod>2024-04-30T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/resources/pentest-chronicles/multiple-benefits-from-a-single-action-the-dangers-of-race-conditions-in-your-application/</loc><lastmod>2024-04-19T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/tags/daas/</loc><lastmod>2024-04-12T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/resources/pentest-chronicles/exploring-daas-security-part-2-other-available-applications-on-the-machine-3rd-party/</loc><lastmod>2024-04-12T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/tags/ai/</loc><lastmod>2024-04-05T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/resources/pentest-chronicles/having-trouble-during-your-pentest-could-an-llm-come-to-your-rescue/</loc><lastmod>2024-04-05T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/tags/largelanguagemodels/</loc><lastmod>2024-04-05T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/tags/techinnovation/</loc><lastmod>2024-04-05T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/resources/pentest-chronicles/exploring-daas-security-a-comprehensive-guide-based-on-vulnerabilities-uncovered-in-real-pentests-part-1/</loc><lastmod>2024-03-15T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/crashing-servers-with-digits-floating-point-numbers-dos-vulnerabilities/</loc><lastmod>2024-03-10T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/tags/applicationsecurity/</loc><lastmod>2024-03-04T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/resources/pentest-chronicles/unicodes-role-in-xss-vulnerabilities./</loc><lastmod>2024-03-04T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/tags/activedirectory/</loc><lastmod>2024-02-23T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/tags/apt/</loc><lastmod>2024-02-23T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/resources/pentest-chronicles/insider-threat-the-average-insider-threat-attack-scenario.-how-attackers-can-take-over-an-entire-domain-in-a-few-steps.-part-2./</loc><lastmod>2024-02-23T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/tags/insiderthreat/</loc><lastmod>2024-02-23T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/tags/graphql/</loc><lastmod>2024-02-19T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/resources/pentest-chronicles/server-shutdown-via-graphql-during-real-life-pentest/</loc><lastmod>2024-02-19T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/insider-threat-why-security-measures-dont-matter.-part-1/</loc><lastmod>2024-02-09T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/persistent-threats-via-blind-xss-and-subsequent-data-exfiltration-tips-and-ticks-from-a-security-perspective./</loc><lastmod>2024-02-05T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/tags/applicationarchitecture/</loc><lastmod>2024-01-12T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/resources/pentest-chronicles/better-safe-than-sorry-the-imperative-of-double-checking-application-architecture-before-launch./</loc><lastmod>2024-01-12T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/tags/softwaredevelopment/</loc><lastmod>2024-01-12T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/tags/digitaldefense/</loc><lastmod>2024-01-05T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/resources/pentest-chronicles/new-year-fresh-vulnerabilities-unmasking-hidden-threats-in-web-applications/</loc><lastmod>2024-01-05T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/artificial-intelligence-assisted-fuzzing-new-horizons-in-software-security-testing/</loc><lastmod>2023-12-15T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/tags/fuzzing/</loc><lastmod>2023-12-15T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/tags/innovation/</loc><lastmod>2023-12-15T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/tags/techtrends/</loc><lastmod>2023-12-15T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/tags/communication/</loc><lastmod>2023-12-08T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/resources/pentest-chronicles/hacking-the-invisible-a-deep-dive-into-sub-ghz-communication-and-flaws-in-the-devices-we-use-every-day/</loc><lastmod>2023-12-08T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/tags/smarthomesecurity/</loc><lastmod>2023-12-08T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/tags/subghz/</loc><lastmod>2023-12-08T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/resources/pentest-chronicles/beyond-fingerprints-discussing-the-challenges-of-behavioral-biometrics-security/</loc><lastmod>2023-12-01T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/tags/biometricsecurity/</loc><lastmod>2023-12-01T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/tags/realworldcybersecurity/</loc><lastmod>2023-12-01T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/tags/informationsecurity/</loc><lastmod>2023-11-24T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/tags/insights/</loc><lastmod>2023-11-24T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/tags/itsecurity/</loc><lastmod>2023-11-24T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/tags/loggingbestpractices/</loc><lastmod>2023-11-24T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/resources/pentest-chronicles/mobile-device-security-in-todays-enterprise-landscape-a-comprehensive-approach/</loc><lastmod>2023-11-24T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/tags/mobileapplicationsecurity/</loc><lastmod>2023-11-24T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/resources/pentest-chronicles/the-risks-of-over-logging-a-case-study-on-application-takeover/</loc><lastmod>2023-11-15T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/tags/2fa/</loc><lastmod>2023-11-10T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/tags/digitalsafety/</loc><lastmod>2023-11-10T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/resources/pentest-chronicles/unveiling-hidden-data-a-log-files-security-breach/</loc><lastmod>2023-11-10T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/attacking-artificial-intelligence-3-common-ways/</loc><lastmod>2023-10-27T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/demystifying-prototype-pollution-and-its-link-to-dom-xss/</loc><lastmod>2023-10-03T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/tags/vulnerability/</loc><lastmod>2023-10-03T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/resources/pentest-chronicles/the-silent-threat-of-redos-2023-real-life-pentest-case/</loc><lastmod>2023-09-26T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/why-you-shouldnt-roll-your-own-cryptography-real-life-case-in-2023/</loc><lastmod>2023-08-28T00:00:35+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/a-small-oversight-with-big-consequences-how-a-minor-mistake-can-lead-to-the-compromise-of-your-domain-controller./</loc><lastmod>2023-08-04T19:17:28+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/tags/domaincontroller/</loc><lastmod>2023-08-04T19:17:28+02:00</lastmod></url><url><loc>https://securitum.com/tags/passwordpolicy/</loc><lastmod>2023-08-04T19:17:28+02:00</lastmod></url><url><loc>https://securitum.com/tags/cache/</loc><lastmod>2023-07-12T23:59:56+02:00</lastmod></url><url><loc>https://securitum.com/tags/hack/</loc><lastmod>2023-07-12T23:59:56+02:00</lastmod></url><url><loc>https://securitum.com/resources/pentest-chronicles/how-private-cache-can-lead-to-mass-account-takeover-pentest-case/</loc><lastmod>2023-07-12T23:59:56+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/how-private-cache-can-lead-to-mass-account-takeover-pentest-case/</loc><lastmod>2023-07-12T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/xss-in-wordpress-via-open-embed-auto-discovery/</loc><lastmod>2023-05-29T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/is-running-legacy-software-with-no-publicly-known-exploits-safe/</loc><lastmod>2023-05-15T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/tags/k9al/</loc><lastmod>2023-05-15T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/resources/pentest-chronicles/how-to-access-data-secured-with-bitlocker-do-a-system-update/</loc><lastmod>2023-01-12T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/socmint-or-rather-osint-of-social-media/</loc><lastmod>2022-10-28T00:00:00+02:00</lastmod><priority>0.5</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/pyscript-or-rather-python-in-your-browser--what-can-be-done-with-it/</loc><lastmod>2022-09-10T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/windows-security-reconnaissance-of-active-directory-environment-with-bloodhound-part-2./</loc><lastmod>2022-08-19T00:00:00+02:00</lastmod><priority>0.5</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/windows-security-reconnaissance-of-active-directory-environment-with-bloodhound-part-1./</loc><lastmod>2022-07-02T00:00:00+02:00</lastmod><priority>0.5</priority></url><url><loc>https://securitum.com/tags/bestpasswordpractices/</loc><lastmod>2022-06-09T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/tags/passwordsecurity/</loc><lastmod>2022-06-09T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/tags/pentest/</loc><lastmod>2022-06-09T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/tags/weakpasswordpractices/</loc><lastmod>2022-06-09T00:00:00+02:00</lastmod></url><url><loc>https://securitum.com/resources/pentest-chronicles/when-usernames-become-passwords-a-real-world-case-study-of-weak-password-practices/</loc><lastmod>2022-06-09T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/windows-security-what-is-lsass-dump.-how-to-protect-against-it-part-1./</loc><lastmod>2022-06-09T00:00:00+02:00</lastmod><priority>0.5</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/fail2ban-remote-code-execution/</loc><lastmod>2022-04-04T00:00:00+02:00</lastmod><priority>0.5</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/comparison-of-reverse-image-searching-in-popular-search-engines-osint-hints/</loc><lastmod>2021-08-11T00:00:00+02:00</lastmod><priority>0.5</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/mutation-xss-via-namespace-confusion-dompurify/</loc><lastmod>2020-09-21T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/prototype-pollution-and-bypassing-client-side-html-sanitizers/</loc><lastmod>2020-08-18T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/html-sanitization-bypass-in-ruby-sanitize/</loc><lastmod>2020-07-22T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/marginwidth/marginheight-the-unexpected-cross-origin-communication-channel/</loc><lastmod>2020-07-13T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/art-of-bug-bounty-a-way-from-js-file-analysis-to-xss/</loc><lastmod>2020-07-01T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/helping-secure-dompurify/</loc><lastmod>2020-01-27T00:00:00+02:00</lastmod><priority>0.5</priority></url><url><loc>https://securitum.com/resources/pentest-chronicles/protecting-against-social-engineering-based-attacks-an-introduction/</loc><lastmod>2020-01-27T00:00:00+02:00</lastmod><priority>0.7</priority></url><url><loc>https://securitum.com/trainings/</loc></url><url><loc>https://securitum.com/company/</loc></url><url><loc>https://securitum.com/contact/</loc><priority>0.7</priority></url><url><loc>https://securitum.com/order-pentest/</loc><priority>0.7</priority></url><url><loc>https://securitum.com/partnership/</loc><priority>0.7</priority></url><url><loc>https://securitum.com/pricing/</loc><priority>0.8</priority></url><url><loc>https://securitum.com/resources/public-reports/</loc><priority>0.8</priority></url><url><loc>https://securitum.com/resources/</loc><priority>0.8</priority></url><url><loc>https://securitum.com/services/</loc><priority>0.9</priority></url><url><loc>https://securitum.com/terms-and-conditions/</loc><priority>0.7</priority></url><url><loc>https://securitum.com/trainings-publications/</loc><priority>0.8</priority></url></urlset>