<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url><loc>https://defend.network/</loc><changefreq>daily</changefreq><priority>1.0</priority></url>
  <url><loc>https://defend.network/briefings.html</loc><changefreq>daily</changefreq><priority>0.9</priority></url>
  <url><loc>https://defend.network/vulnerabilities.html</loc><changefreq>weekly</changefreq><priority>0.8</priority></url>
  <url><loc>https://defend.network/tools.html</loc><changefreq>monthly</changefreq><priority>0.8</priority></url>
  <url><loc>https://defend.network/subscribe.html</loc><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://defend.network/about.html</loc><changefreq>monthly</changefreq><priority>0.5</priority></url>
  <url><loc>https://defend.network/briefings/adobe-reader-cpuid-ics-exploitation-2026-04-13.html</loc><changefreq>never</changefreq><priority>0.7</priority></url>
  <url><loc>https://defend.network/briefings/iran-plc-russian-token-theft-critical-2026-04-12.html</loc><changefreq>never</changefreq><priority>0.7</priority></url>
  <url><loc>https://defend.network/briefings/critical-supply-chain-industrial-control-attacks-2026-04-11.html</loc><changefreq>never</changefreq><priority>0.7</priority></url>
  <url><loc>https://defend.network/briefings/adobe-zero-day-apt28-router-attacks-2026-04-10.html</loc><changefreq>never</changefreq><priority>0.7</priority></url>
  <url><loc>https://defend.network/briefings/apt28-prismex-activemq-rce-router-tokens-2026-04-09.html</loc><changefreq>never</changefreq><priority>0.7</priority></url>
  <url><loc>https://defend.network/briefings/apt28-router-hijacking-critical-infrastructure-attacks-2026-04-08.html</loc><changefreq>never</changefreq><priority>0.7</priority></url>
  <url><loc>https://defend.network/briefings/iran-dprk-supply-chain-attacks-2026-04-07.html</loc><changefreq>never</changefreq><priority>0.7</priority></url>
  <url><loc>https://defend.network/briefings/dprk-drift-forticlient-supply-chain-2026-04-06.html</loc><changefreq>never</changefreq><priority>0.7</priority></url>
  <url><loc>https://defend.network/briefings/ta416-unc1069-supply-chain-critical-2026-04-05.html</loc><changefreq>never</changefreq><priority>0.7</priority></url>
  <url><loc>https://defend.network/briefings/trueconf-ta416-unc1069-supply-chain-2026-04-04.html</loc><changefreq>never</changefreq><priority>0.7</priority></url>
  <url><loc>https://defend.network/briefings/nextjs-credential-harvesting-critical-exploits-2026-04-03.html</loc><changefreq>never</changefreq><priority>0.7</priority></url>
  <url><loc>https://defend.network/briefings/chrome-zero-day-trueconf-malware-campaigns-2026-04-02.html</loc><changefreq>never</changefreq><priority>0.7</priority></url>
  <url><loc>https://defend.network/briefings/zero-day-supply-chain-wiper-attacks-2026-04-01.html</loc><changefreq>never</changefreq><priority>0.7</priority></url>
  <url><loc>https://defend.network/briefings/citrix-netscaler-axios-supply-chain-critical-2026-03-31.html</loc><changefreq>never</changefreq><priority>0.7</priority></url>
  <url><loc>https://defend.network/briefings/iran-fbi-director-breach-critical-exploits-2026-03-30.html</loc><changefreq>never</changefreq><priority>0.7</priority></url>
  <url><loc>https://defend.network/briefings/iran-stryker-citrix-critical-wiper-2026-03-29.html</loc><changefreq>never</changefreq><priority>0.7</priority></url>
  <url><loc>https://defend.network/briefings/supply-chain-wiper-attacks-critical-2026-03-28.html</loc><changefreq>never</changefreq><priority>0.7</priority></url>
  <url><loc>https://defend.network/briefings/telecom-infiltration-langflow-ai-exploit-2026-03-27.html</loc><changefreq>never</changefreq><priority>0.7</priority></url>
  <url><loc>https://defend.network/briefings/ai-autonomous-attacks-credential-theft-critical-2026-03-26.html</loc><changefreq>never</changefreq><priority>0.7</priority></url>
  <url><loc>https://defend.network/briefings/teampcp-supply-chain-wiper-attacks-2026-03-25.html</loc><changefreq>never</changefreq><priority>0.7</priority></url>
  <url><loc>https://defend.network/briefings/trivy-supply-chain-north-korea-wiper-2026-03-24.html</loc><changefreq>never</changefreq><priority>0.7</priority></url>
  <url><loc>https://defend.network/briefings/2026-03-23.html</loc><changefreq>never</changefreq><priority>0.7</priority></url>
  <url><loc>https://defend.network/briefings/2026-03-22.html</loc><changefreq>never</changefreq><priority>0.7</priority></url>
  <url><loc>https://defend.network/briefings/2026-03-21.html</loc><changefreq>never</changefreq><priority>0.7</priority></url>
  <url><loc>https://defend.network/briefings/2026-03-20.html</loc><changefreq>never</changefreq><priority>0.7</priority></url>
  <url><loc>https://defend.network/vulnerability-reports/2026-w16.html</loc><changefreq>never</changefreq><priority>0.7</priority></url>
  <url><loc>https://defend.network/vulnerability-reports/2026-w15.html</loc><changefreq>never</changefreq><priority>0.7</priority></url>
  <url><loc>https://defend.network/vulnerability-reports/2026-w14.html</loc><changefreq>never</changefreq><priority>0.7</priority></url>
  <url><loc>https://defend.network/vulnerability-reports/2026-w12.html</loc><changefreq>never</changefreq><priority>0.7</priority></url>
</urlset>