<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">

    <!-- Blog Index -->
    <url>
        <loc>https://lorikeetsecurity.com/blog</loc>
        <lastmod>2026-04-04</lastmod>
        <changefreq>daily</changefreq>
        <priority>0.8</priority>
    </url>

    <url>
        <loc>https://lorikeetsecurity.com/blog/prescient-security-vs-lorikeet</loc>
        <lastmod>2026-04-01</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/prescient-security-alternatives</loc>
        <lastmod>2026-04-01</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/anthropic-source-map-exposure</loc>
        <lastmod>2026-03-28</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/coinbase-insider-threat-2025</loc>
        <lastmod>2026-03-22</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/github-supply-chain-attack-tj-actions</loc>
        <lastmod>2026-03-20</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/oracle-cloud-breach-2025</loc>
        <lastmod>2026-03-15</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/salt-typhoon-telecom-breach</loc>
        <lastmod>2026-02-28</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/security-due-diligence-series-a-checklist</loc>
        <lastmod>2026-03-03</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/assumed-breach-pentesting</loc>
        <lastmod>2026-03-05</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/oauth2-attack-techniques</loc>
        <lastmod>2026-03-08</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/kerberoasting-enterprise-defense</loc>
        <lastmod>2026-03-10</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/jwt-vulnerabilities-real-attacks</loc>
        <lastmod>2026-03-12</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/ci-cd-pipeline-security-testing</loc>
        <lastmod>2026-03-14</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/api-security-bola-bfla</loc>
        <lastmod>2026-03-18</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/ssrf-to-cloud-metadata</loc>
        <lastmod>2026-03-21</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/cloud-privilege-escalation-aws-gcp</loc>
        <lastmod>2026-03-16</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/vciso-for-startups</loc>
        <lastmod>2026-02-20</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/enterprise-vendor-security-questionnaire</loc>
        <lastmod>2026-02-15</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/security-program-roi-board</loc>
        <lastmod>2026-02-05</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/startup-security-before-series-a</loc>
        <lastmod>2026-02-10</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/third-party-risk-vendor-assessment</loc>
        <lastmod>2026-01-30</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/soc2-limitations-what-it-doesnt-test</loc>
        <lastmod>2026-01-25</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/soc2-type2-vs-penetration-testing</loc>
        <lastmod>2026-01-20</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/compliance-checkbox-security-theater</loc>
        <lastmod>2026-01-15</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/soc2-pentest-scope-what-matters</loc>
        <lastmod>2026-01-10</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/iso27001-soc2-which-first</loc>
        <lastmod>2026-01-05</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/living-off-the-land-lotl-techniques</loc>
        <lastmod>2025-12-20</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/initial-access-brokers-corporate-risk</loc>
        <lastmod>2025-12-15</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/ransomware-double-extortion-anatomy</loc>
        <lastmod>2025-12-10</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/purple-team-exercises-guide</loc>
        <lastmod>2025-12-05</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/active-directory-attack-paths-bloodhound</loc>
        <lastmod>2025-11-30</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/waf-bypass-techniques-not-enough</loc>
        <lastmod>2025-11-25</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/delve-fake-compliance-scandal</loc>
        <lastmod>2026-03-20</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/prescient-security-soc2-client-what-now</loc>
        <lastmod>2026-03-20</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/how-to-spot-fake-soc2-report</loc>
        <lastmod>2026-03-20</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/what-to-do-if-delve-was-your-compliance-platform</loc>
        <lastmod>2026-03-20</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/compliance-automation-cannot-replace-real-security</loc>
        <lastmod>2026-03-20</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/why-every-saas-needs-annual-web-pentest</loc>
        <lastmod>2026-03-19</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/web-pentest-cost-breakdown</loc>
        <lastmod>2026-03-19</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/api-pentest-vs-web-pentest</loc>
        <lastmod>2026-03-19</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/pentest-before-product-launch</loc>
        <lastmod>2026-03-19</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/web-pentest-report-what-to-expect</loc>
        <lastmod>2026-03-19</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/choosing-web-pentest-provider</loc>
        <lastmod>2026-03-19</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/pentest-for-series-a-due-diligence</loc>
        <lastmod>2026-03-19</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/remediation-support-after-pentest</loc>
        <lastmod>2026-03-19</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/web-app-pentest-frequency</loc>
        <lastmod>2026-03-19</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/pentest-compliance-requirements-2026</loc>
        <lastmod>2026-03-19</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/automated-scanning-vs-manual-pentesting</loc>
        <lastmod>2026-03-19</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/pentest-scoping-guide</loc>
        <lastmod>2026-03-19</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/saas-security-checklist-before-enterprise-sales</loc>
        <lastmod>2026-03-19</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/web-pentest-findings-that-kill-deals</loc>
        <lastmod>2026-03-19</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/bundling-pentest-with-compliance</loc>
        <lastmod>2026-03-19</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/lorikeet-vs-prescient-security</loc>
        <lastmod>2026-03-17</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/state-of-enterprise-pentesting-2026</loc>
        <lastmod>2026-03-17</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/agentic-ai-security-testing</loc>
        <lastmod>2026-03-17</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/remediation-gap-why-vulnerabilities-dont-get-fixed</loc>
        <lastmod>2026-03-17</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/graphql-api-pentesting-beyond-rest</loc>
        <lastmod>2026-03-17</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/owasp-top-10-llm-2025-what-changed</loc>
        <lastmod>2026-03-17</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/rag-vector-database-security</loc>
        <lastmod>2026-03-17</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/security-program-maturity-smb-to-enterprise</loc>
        <lastmod>2026-03-17</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/ptaas-vs-traditional-pentesting-roi</loc>
        <lastmod>2026-03-17</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/ai-supply-chain-security-ai-bom</loc>
        <lastmod>2026-03-17</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/shadow-apis-zombie-endpoints</loc>
        <lastmod>2026-03-17</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/prompt-injection-attacks-explained</loc>
        <lastmod>2026-03-17</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/building-security-program-from-scratch</loc>
        <lastmod>2026-03-17</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/continuous-threat-exposure-management</loc>
        <lastmod>2026-03-17</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/pentesting-roi-real-numbers</loc>
        <lastmod>2026-03-17</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/founder-led-security-sales-playbook</loc>
        <lastmod>2026-03-17</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/why-cyber-awareness-training-matters</loc>
        <lastmod>2026-03-09</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/ai-phishing-threats-2026</loc>
        <lastmod>2026-03-09</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/soc2-continuous-monitoring-requirements</loc>
        <lastmod>2026-03-08</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/soc2-vendor-management-guide</loc>
        <lastmod>2026-03-08</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/soc2-evidence-collection-audit-prep</loc>
        <lastmod>2026-03-08</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/soc2-for-saas-companies</loc>
        <lastmod>2026-03-08</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/soc2-iso-pci-compliance-roadmap</loc>
        <lastmod>2026-03-08</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/iso-27001-business-continuity</loc>
        <lastmod>2026-03-08</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/iso-27001-statement-of-applicability</loc>
        <lastmod>2026-03-08</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/iso-27001-management-review</loc>
        <lastmod>2026-03-08</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/iso-27001-for-healthcare</loc>
        <lastmod>2026-03-08</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/pci-dss-incident-response-plan</loc>
        <lastmod>2026-03-08</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/pci-dss-tokenization-scope-reduction</loc>
        <lastmod>2026-03-08</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/pci-dss-requirement-1-firewall-security</loc>
        <lastmod>2026-03-08</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/pci-dss-for-fintech-startups</loc>
        <lastmod>2026-03-08</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/penetration-testing-for-compliance</loc>
        <lastmod>2026-03-08</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/soc-as-a-service-guide</loc>
        <lastmod>2026-03-08</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/incident-response-planning-guide</loc>
        <lastmod>2026-03-08</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/managed-security-vs-in-house</loc>
        <lastmod>2026-03-08</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/attack-surface-management-guide</loc>
        <lastmod>2026-03-08</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/vulnerability-management-program-guide</loc>
        <lastmod>2026-03-08</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/cloud-security-posture-management</loc>
        <lastmod>2026-03-08</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/red-team-vs-penetration-testing</loc>
        <lastmod>2026-03-08</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/web-application-pentest-what-to-expect</loc>
        <lastmod>2026-03-08</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/continuous-pentesting-vs-annual</loc>
        <lastmod>2026-03-08</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/security-program-for-startups</loc>
        <lastmod>2026-03-08</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/meet-lory-ai-security-assistant</loc>
        <lastmod>2026-03-04</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/email-security-phishing-pentests</loc>
        <lastmod>2026-03-02</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/database-security-testing</loc>
        <lastmod>2026-03-02</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/n8n-rce-cve-2026-21858</loc>
        <lastmod>2026-03-02</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/discord-persona-identity-verification</loc>
        <lastmod>2026-03-02</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/lorikeet-vs-intruder</loc>
        <lastmod>2026-03-02</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/intruder-io-review</loc>
        <lastmod>2026-03-02</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/red-team-rules-of-engagement</loc>
        <lastmod>2026-02-26</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/pci-dss-segmentation-testing</loc>
        <lastmod>2026-02-26</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/rest-api-penetration-testing</loc>
        <lastmod>2026-02-26</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/ai-code-review-tools-security</loc>
        <lastmod>2026-02-26</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/drata-vs-vanta-vs-secureframe</loc>
        <lastmod>2026-02-26</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/ciso-reporting-metrics</loc>
        <lastmod>2026-02-26</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/security-champions-program</loc>
        <lastmod>2026-02-26</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/when-to-hire-pentest-firm</loc>
        <lastmod>2026-02-26</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/cursor-copilot-claude-security-risks</loc>
        <lastmod>2026-02-26</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/securing-lovable-bolt-apps-production</loc>
        <lastmod>2026-02-26</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/ransomware-risk-assessment</loc>
        <lastmod>2026-02-26</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/cyber-insurance-security-requirements</loc>
        <lastmod>2026-02-26</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/business-impact-analysis-saas</loc>
        <lastmod>2026-02-26</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/risk-register-startups</loc>
        <lastmod>2026-02-26</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/user-access-reviews-soc2</loc>
        <lastmod>2026-02-26</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/privileged-access-management-guide</loc>
        <lastmod>2026-02-26</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/rbac-vs-abac-access-control</loc>
        <lastmod>2026-02-26</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/nodejs-security-code-review</loc>
        <lastmod>2026-02-26</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/react-nextjs-security-mistakes</loc>
        <lastmod>2026-02-26</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/lorikeet-asm-vs-crowdstrike-falcon</loc>
        <lastmod>2026-02-26</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/lorikeet-asm-vs-qualys</loc>
        <lastmod>2026-02-26</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/lorikeet-vs-coalfire</loc>
        <lastmod>2026-02-26</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/react2shell-cve-2025-8671</loc>
        <lastmod>2026-02-26</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/february-2026-patch-tuesday-zero-days</loc>
        <lastmod>2026-02-26</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/mongobleed-cve-2025-14847</loc>
        <lastmod>2026-02-26</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/top-cves-2025-year-in-review</loc>
        <lastmod>2026-02-26</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/lorikeet-pre-seed-announcement</loc>
        <lastmod>2026-02-26</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/why-startups-choose-lorikeet</loc>
        <lastmod>2026-02-26</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/pentest-pricing-transparent-guide</loc>
        <lastmod>2026-02-26</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/soc2-compliance-package-pentest-audit</loc>
        <lastmod>2026-02-26</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/owasp-top-10-real-world</loc>
        <lastmod>2026-02-24</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/authentication-bypass-techniques</loc>
        <lastmod>2026-02-24</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/ssrf-attacks-explained</loc>
        <lastmod>2026-02-24</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/business-logic-vulnerabilities</loc>
        <lastmod>2026-02-24</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/graphql-security-testing</loc>
        <lastmod>2026-02-24</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/api-authentication-flaws</loc>
        <lastmod>2026-02-24</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/webhook-security</loc>
        <lastmod>2026-02-24</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/desktop-app-pentesting</loc>
        <lastmod>2026-02-24</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/thick-client-security</loc>
        <lastmod>2026-02-24</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/ad-attack-chains</loc>
        <lastmod>2026-02-24</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/domain-user-to-domain-admin</loc>
        <lastmod>2026-02-24</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/security-culture-startups</loc>
        <lastmod>2026-02-24</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/founders-guide-not-getting-hacked</loc>
        <lastmod>2026-02-24</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/first-security-hire</loc>
        <lastmod>2026-02-24</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/zero-trust-practical-guide</loc>
        <lastmod>2026-02-24</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/openclaw-security-crisis</loc>
        <lastmod>2026-02-24</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/ai-security-guardrails</loc>
        <lastmod>2026-02-23</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/explaining-pentest-results-to-executives</loc>
        <lastmod>2026-02-21</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/security-budget-roi-guide</loc>
        <lastmod>2026-02-21</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/social-engineering-pentesting</loc>
        <lastmod>2026-02-21</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/third-party-risk-management</loc>
        <lastmod>2026-02-21</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/container-kubernetes-security</loc>
        <lastmod>2026-02-21</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/mobile-app-security-testing</loc>
        <lastmod>2026-02-21</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/supply-chain-security-dependencies</loc>
        <lastmod>2026-02-21</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/incident-response-playbook-startups</loc>
        <lastmod>2026-02-21</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/devsecops-cicd-security</loc>
        <lastmod>2026-02-21</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/active-directory-penetration-testing</loc>
        <lastmod>2026-02-21</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/ccpa-cpra-security-guide</loc>
        <lastmod>2026-02-21</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/nist-csf-practical-guide</loc>
        <lastmod>2026-02-21</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/gdpr-security-requirements</loc>
        <lastmod>2026-02-21</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/pci-dss-penetration-testing-guide</loc>
        <lastmod>2026-02-21</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/hipaa-security-testing-guide</loc>
        <lastmod>2026-02-21</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/red-team-vs-pentest</loc>
        <lastmod>2026-02-21</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/what-is-red-teaming</loc>
        <lastmod>2026-02-21</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/m-and-a-security-due-diligence</loc>
        <lastmod>2026-02-21</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/security-for-series-b-and-beyond</loc>
        <lastmod>2026-02-21</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/security-due-diligence-fundraising</loc>
        <lastmod>2026-02-21</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/top-code-review-findings</loc>
        <lastmod>2026-02-21</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/secure-code-review-process</loc>
        <lastmod>2026-02-21</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/cloud-security-assessment-aws-gcp-azure</loc>
        <lastmod>2026-02-21</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/api-security-testing-guide</loc>
        <lastmod>2026-02-21</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/how-to-prepare-for-a-penetration-test</loc>
        <lastmod>2026-02-21</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/what-happens-during-a-pentest</loc>
        <lastmod>2026-02-21</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/compliance-automation-soc2-iso-27001</loc>
        <lastmod>2026-02-21</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/iso-27001-for-saas-european-expansion</loc>
        <lastmod>2026-02-21</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/soc2-and-iso-27001-dual-certification</loc>
        <lastmod>2026-02-21</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/is-my-lovable-app-actually-secure</loc>
        <lastmod>2026-02-13</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/soc2-vs-iso-for-startups</loc>
        <lastmod>2026-02-11</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/security-after-pre-seed</loc>
        <lastmod>2026-02-11</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/ai-built-apps-wide-open</loc>
        <lastmod>2026-02-11</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/vulnerability-scanning-vs-penetration-testing</loc>
        <lastmod>2026-01-15</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/lorikeet-vs-cacilian</loc>
        <lastmod>2026-02-14</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/lorikeet-vs-bishop-fox</loc>
        <lastmod>2026-02-14</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/lorikeet-vs-netspi</loc>
        <lastmod>2026-02-14</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/choosing-cybersecurity-vendor</loc>
        <lastmod>2026-01-10</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/ai-generated-code-security</loc>
        <lastmod>2026-01-05</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/employee-offboarding-access</loc>
        <lastmod>2025-12-20</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/code-review-vs-pentest</loc>
        <lastmod>2025-12-10</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/soc2-pentest-requirements</loc>
        <lastmod>2025-12-01</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/how-to-read-a-pentest-report</loc>
        <lastmod>2026-02-28</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/pci-dss-v4-compliance-deadline</loc>
        <lastmod>2026-02-28</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/pci-dss-requirement-6-secure-development</loc>
        <lastmod>2026-02-28</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/pci-dss-network-segmentation-guide</loc>
        <lastmod>2026-02-28</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/pci-dss-cloud-compliance</loc>
        <lastmod>2026-02-28</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/pci-dss-saq-types-guide</loc>
        <lastmod>2026-02-28</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/pci-dss-logging-monitoring-requirement-10</loc>
        <lastmod>2026-02-28</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/pci-dss-access-control-requirements</loc>
        <lastmod>2026-02-28</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/pci-dss-vulnerability-scanning</loc>
        <lastmod>2026-02-28</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/pci-dss-encryption-requirements</loc>
        <lastmod>2026-02-28</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/pci-dss-for-ecommerce</loc>
        <lastmod>2026-02-28</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/iso-27001-certification-process</loc>
        <lastmod>2026-02-28</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/iso-27001-annex-a-controls</loc>
        <lastmod>2026-02-28</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/iso-27001-risk-assessment-guide</loc>
        <lastmod>2026-02-28</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/iso-27001-internal-audit-guide</loc>
        <lastmod>2026-02-28</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/iso-27001-vs-nist-csf</loc>
        <lastmod>2026-02-28</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/soc2-type-1-vs-type-2</loc>
        <lastmod>2026-02-28</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/soc2-trust-services-criteria</loc>
        <lastmod>2026-02-28</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/soc2-readiness-assessment</loc>
        <lastmod>2026-02-28</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/soc2-common-audit-findings</loc>
        <lastmod>2026-02-28</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/soc2-for-startups-timeline</loc>
        <lastmod>2026-02-28</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/penetration-testing-for-healthcare</loc>
        <lastmod>2026-02-28</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/penetration-testing-for-fintech</loc>
        <lastmod>2026-02-28</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/external-penetration-testing-guide</loc>
        <lastmod>2026-02-28</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/internal-network-penetration-testing</loc>
        <lastmod>2026-02-28</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/wireless-penetration-testing-guide</loc>
        <lastmod>2026-02-28</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/iot-security-testing-guide</loc>
        <lastmod>2026-02-28</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/penetration-testing-new-york</loc>
        <lastmod>2026-02-28</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/penetration-testing-san-francisco</loc>
        <lastmod>2026-02-28</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/penetration-testing-austin</loc>
        <lastmod>2026-02-28</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/penetration-testing-chicago</loc>
        <lastmod>2026-02-28</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/penetration-testing-los-angeles</loc>
        <lastmod>2026-02-28</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/penetration-testing-seattle</loc>
        <lastmod>2026-02-28</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/penetration-testing-boston</loc>
        <lastmod>2026-02-28</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/penetration-testing-denver</loc>
        <lastmod>2026-02-28</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/ai-llm-security-testing</loc>
        <lastmod>2026-02-15</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/attack-surface-management-complete-guide</loc>
        <lastmod>2026-02-15</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/bug-bounty-vs-pentesting</loc>
        <lastmod>2026-02-15</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/continuous-penetration-testing</loc>
        <lastmod>2026-02-15</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/cost-of-data-breach-2026</loc>
        <lastmod>2026-02-15</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/devsecops-implementation-guide</loc>
        <lastmod>2026-02-15</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/esxi-vm-escape-vsockpuppet</loc>
        <lastmod>2026-02-15</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/how-to-choose-penetration-testing-company</loc>
        <lastmod>2026-02-15</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/lorikeet-security-packages-vs-enterprise-firms</loc>
        <lastmod>2026-02-15</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/managed-security-services-startups</loc>
        <lastmod>2026-02-15</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/marketplace-expansion-30-integrations</loc>
        <lastmod>2026-02-15</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/network-penetration-testing-guide</loc>
        <lastmod>2026-02-15</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/network-security-assessment-guide</loc>
        <lastmod>2026-02-15</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/owasp-top-10-2025-update</loc>
        <lastmod>2026-02-15</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/penetration-testing-as-a-service-ptaas</loc>
        <lastmod>2026-02-15</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/secure-architecture-patterns-saas</loc>
        <lastmod>2026-02-15</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/threat-modeling-engineering-teams</loc>
        <lastmod>2026-02-15</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/waf-vs-penetration-testing</loc>
        <lastmod>2026-02-15</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/web-application-penetration-testing-guide</loc>
        <lastmod>2026-02-15</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/web-application-security-testing-checklist</loc>
        <lastmod>2026-02-15</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/what-is-attack-surface-monitoring</loc>
        <lastmod>2026-02-15</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/you-cant-protect-what-you-dont-know-exists-complete-cybersecurity-solutions-from-parrot-ctfs</loc>
        <lastmod>2026-01-12</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/you-cant-protect-what-you-dont-know-exists-introducing-lorikeet-asm</loc>
        <lastmod>2026-01-12</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/intellexas-predator-spyware-zero-day-exploits-and-the-real-risk-to-users</loc>
        <lastmod>2025-12-06</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/react2shell-critical-rce-vulnerability-shaking-the-react-ecosystem</loc>
        <lastmod>2025-12-05</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/ransomware-hits-onsolve-codered-what-emergency-alert-users-must-know</loc>
        <lastmod>2025-11-30</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/salesforce-integration-breach-how-the-salesloft%e2%80%91drift-oauth-exploit-compromised-thousands-of-records</loc>
        <lastmod>2025-11-30</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/cisas-expanding-mandate-making-threat-intelligence-reach-every-business</loc>
        <lastmod>2025-11-30</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/strengthening-americas-backbone-how-cisa-secures-critical-infrastructure</loc>
        <lastmod>2025-11-30</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/securing-federal-cyber-resources-the-critical-role-of-https-and-cisas-guidance</loc>
        <lastmod>2025-11-30</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/native-code-execution-via-misused-function-link-a-deep-dive</loc>
        <lastmod>2025-11-30</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/remote-privileged-access-management-why-its-becoming-the-new-standard</loc>
        <lastmod>2025-11-30</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/alternatives-to-cacilian-comprehensive-comparison-of-leading-ptaas-platforms</loc>
        <lastmod>2025-11-28</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/where-to-start-your-ethical-hacking-journey-top-learning-platforms-for-2025</loc>
        <lastmod>2025-11-28</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/7-holiday-scams-you-need-to-watch-out-for-in-2025</loc>
        <lastmod>2025-11-28</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/critical-windows-kernel-zero%e2%80%91day-and-62-additional-flaws-what-every-defender-must-do</loc>
        <lastmod>2025-11-12</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/stealth-logic-bombs-hidden-in-popular-net-packages-threaten-databases-and-plcs</loc>
        <lastmod>2025-11-10</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/zero%e2%80%91click-samsung-flaw-used-to-deploy-landfall-spyware-what-you-need-to-know</loc>
        <lastmod>2025-11-09</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/china-linked-hackers-exploit-legacy-vulnerabilities-to-infiltrate-a-u-s-policy-ngo</loc>
        <lastmod>2025-11-08</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/google-maps-adds-business-extortion-reporting-to-fight-review-bombing</loc>
        <lastmod>2025-11-07</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/inside-the-blackcat-ransomware-indictments-what-u-s-companies-need-to-know</loc>
        <lastmod>2025-11-04</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/airstalk-malware-nation%e2%80%91state-exploitation-of-mobile-mdm-apis-and-what-enterprises-must-do</loc>
        <lastmod>2025-11-03</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/ai%e2%80%91driven-code-hardening-inside-openais-aardvark-gpt%e2%80%915-agent</loc>
        <lastmod>2025-11-02</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/airstalk-malware-exploits-airwatch-api-in-a-sophisticated-supply%e2%80%91chain-attack</loc>
        <lastmod>2025-11-01</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/brash-exploit-puts-chromium-browsers-at-risk-a-deep-dive</loc>
        <lastmod>2025-10-31</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/googles-ai%e2%80%91powered-scam-shield-on-android-what-it-means-for-users-and-enterprises</loc>
        <lastmod>2025-10-30</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/chrome-zero%e2%80%91day-cve%e2%80%912025%e2%80%912783-powers-leetagent-spyware-in-operation-forumtroll</loc>
        <lastmod>2025-10-28</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/how-parrot-ctfs-enterprise-candidate-processing-works</loc>
        <lastmod>2025-10-27</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/china-linked-smishing-triad-exploits-194k-domains-to-target-global-brokerage-users</loc>
        <lastmod>2025-10-26</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/bridging-the-cybersecurity-perception-gap-a-practical-guide-for-leaders-and-teams</loc>
        <lastmod>2025-10-25</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/muddywaters-phoenix-campaign-how-iranian-espionage-threatens-mena-governments</loc>
        <lastmod>2025-10-22</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/polaredge-botnet-exploits-cisco-asus-qnap-and-synology-devices-what-you-need-to-know</loc>
        <lastmod>2025-10-21</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/understanding-clickfix-why-it-works-and-how-to-defend-against-it</loc>
        <lastmod>2025-10-20</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/silver-foxs-winos-4-0-expands-into-japan-and-malaysia-using-holdinghands-rat</loc>
        <lastmod>2025-10-19</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/inside-the-net-capi-backdoor-campaign-targeting-russian-auto-and-e%e2%80%91commerce-firms</loc>
        <lastmod>2025-10-18</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/red-team-infrastructure-complete-guide-to-setup-and-best-practices-in-2025</loc>
        <lastmod>2025-10-18</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/prescient-security-vs-parrot-ctfs-choosing-the-right-cybersecurity-partner-for-your-organization</loc>
        <lastmod>2025-11-05</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/netspi-vs-parrot-ctfs-comprehensive-comparison-of-cyber-security-consulting-services</loc>
        <lastmod>2025-10-18</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/web-application-penetration-testing-why-every-company-needs-it-in-2025</loc>
        <lastmod>2025-10-18</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/the-complete-guide-to-pci-dss-4-0-1-compliance-in-2025-requirements-best-practices-and-implementation</loc>
        <lastmod>2025-10-18</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/the-complete-guide-to-ctf-event-hosting-planning-platforms-and-best-practices</loc>
        <lastmod>2025-10-18</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/top-10-cyber-consulting-firms-in-2025-leading-the-future-of-digital-security</loc>
        <lastmod>2025-10-18</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/cacilian-alternatives-top-ptaas-platforms-for-continuous-penetration-testing</loc>
        <lastmod>2025-10-18</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/prescient-security-alternatives-cybersec-insights</loc>
        <lastmod>2025-10-18</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/microsoft-revokes-hundreds-of-fraudulent-certificates-used-by-vanilla-tempest-in-ransomware-campaigns</loc>
        <lastmod>2025-10-17</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/organization-hacks-for-managing-cyber-consulting-engagements-with-parrot-ctfs</loc>
        <lastmod>2025-10-17</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/the-evolution-of-cybersecurity-ptaas-and-socaas-with-parrot-ctfs</loc>
        <lastmod>2025-10-17</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/expert-cyber-security-consulting-services-parrot-ctfs</loc>
        <lastmod>2025-10-17</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/elevate-your-teams-security-skills-with-parrot-ctfs-consulting</loc>
        <lastmod>2025-10-17</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/north-korean-group-unc5342-deploys-etherhiding-to-mask-crypto-theft</loc>
        <lastmod>2025-10-16</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/inside-the-f5-big%e2%80%91ip-source-code-leak-risks-impact-and-immediate-actions</loc>
        <lastmod>2025-10-15</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/from-awareness-to-action-why-threat-hunting-is-the-missing-link-in-cyber-readiness</loc>
        <lastmod>2025-10-14</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/weekly-threat-landscape-zero%e2%80%91day-exploits-ransomware-coalitions-and-ai%e2%80%91powered-malware</loc>
        <lastmod>2025-10-13</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/sonicwall-ssl-vpn-breach-what-you-need-to-know-and-how-to-respond</loc>
        <lastmod>2025-10-12</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/payroll-hijack-campaign-by-storm-2657-a-deep-dive-and-action-plan</loc>
        <lastmod>2025-10-11</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/sonicwall-cloud-backup-breach-exposes-global-firewall-configurations</loc>
        <lastmod>2025-10-09</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/password-graveyard-webinar-reveals-real-risks-and-practical-defenses</loc>
        <lastmod>2025-10-08</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/why-traditional-password-rules-fail-and-what-leaders-can-do-today</loc>
        <lastmod>2025-10-08</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/batshadows-go%e2%80%91based-vampire-bot-targets-job-seekers-and-marketers</loc>
        <lastmod>2025-10-08</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/openssh-proxycommand-injection-cve%e2%80%912025%e2%80%9161984-what-you-need-to-know</loc>
        <lastmod>2025-10-07</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/the-complete-guide-to-becoming-a-penetration-tester-in-2025</loc>
        <lastmod>2025-10-02</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/ultimate-ctf-event-hosting-platform-comparison-parrot-ctfs-vs-ctfd-vs-hack-the-box-vs-tryhackme</loc>
        <lastmod>2025-10-02</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/best-place-to-learn-ethical-hacking-and-get-ethical-hacking-certifications-comparison</loc>
        <lastmod>2025-10-02</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/guide-to-passing-the-pcwpt-parrot-ctfs-web-penetration-tester-exam</loc>
        <lastmod>2025-10-01</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/complete-penetration-testing-tools-guide-essential-cheat-sheets-for-ethical-hackers</loc>
        <lastmod>2025-09-26</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/wireshark-cheat-sheet-essential-guide-for-network-analysis</loc>
        <lastmod>2025-09-26</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/parrot-ctfs-academy-to-advanced-certification</loc>
        <lastmod>2025-09-22</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/best-platforms-to-learn-ethical-hacking-in-2025-complete-beginners-guide</loc>
        <lastmod>2025-11-28</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/why-companies-choose-parrot-ctfs-for-cybersecurity-consulting-soc-penetration-testing-malware-analysis</loc>
        <lastmod>2025-09-22</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/the-complete-guide-to-cybersecurity-learning-platforms-in-2025-best-hack-the-box-alternatives-ctf-reviews-and-upcoming-competitions</loc>
        <lastmod>2025-09-22</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/top-cybersecurity-learning-platforms-and-ctf-competitions-for-ethical-hackers</loc>
        <lastmod>2025-09-22</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/metasploit-framework-cheat-sheet-for-penetration-testing</loc>
        <lastmod>2025-09-22</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/ghidra-cheat-sheet-essential-commands-and-shortcuts-for-reverse-engineering</loc>
        <lastmod>2025-09-22</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/common-hacking-terms-a-cybersecurity-glossary</loc>
        <lastmod>2025-09-22</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/ctf-event-hosting-complete-guide-to-cybersecurity-competition-management</loc>
        <lastmod>2025-09-21</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/security-operations-as-a-service-complete-guide-to-managed-security-operations</loc>
        <lastmod>2025-09-21</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/red-team-operations-advanced-adversary-simulation-and-security-testing-services</loc>
        <lastmod>2025-09-21</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/ai-penetration-testing-the-complete-guide-to-machine-learning-security-assessment</loc>
        <lastmod>2025-09-21</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/owasp-top-10-security-vulnerabilities-complete-guide-with-ctf-training-examples</loc>
        <lastmod>2025-09-21</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/ctf-training-programs-for-universities-and-corporate-security-teams-the-ultimate-guide-to-building-elite-penetration-testing-skills</loc>
        <lastmod>2025-09-21</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/capture-the-flag-competitions-a-complete-guide-to-understanding-and-hosting-ctf-events</loc>
        <lastmod>2025-09-21</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/parrot-ctfs-vs-hack-the-box-vs-tryhackme-the-future-of-cybersecurity-training</loc>
        <lastmod>2025-08-22</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/huntress-vs-parrot-ctfs-a-deep-dive-into-modern-soc-and-mdr-platforms</loc>
        <lastmod>2025-08-22</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/how-to-run-a-penetration-test-a-complete-step-by-step-guide</loc>
        <lastmod>2025-08-22</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/how-to-set-up-an-in-house-security-operations-center-soc</loc>
        <lastmod>2025-08-22</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/why-businesses-explore-huntress-alternatives</loc>
        <lastmod>2025-08-22</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/why-soc-as-a-service-is-critical-for-startups</loc>
        <lastmod>2025-08-22</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/artificial-intelligence-and-the-future-of-cybersecurity-ctf-events</loc>
        <lastmod>2025-08-22</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/understanding-xss-cross-site-scripting-through-ctf-events</loc>
        <lastmod>2025-08-22</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/understanding-ssrf-server-side-request-forgery-through-ctf-events</loc>
        <lastmod>2025-08-22</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/why-companies-and-universities-should-host-ctf-events-with-parrot-ctfs</loc>
        <lastmod>2025-08-22</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/parrot-ctfs-seamless-ctf-event-hosting-for-universities-businesses-and-communities</loc>
        <lastmod>2025-08-22</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/parrot-ctfs-cyber-consulting-comprehensive-modern-security-pricing-insights</loc>
        <lastmod>2025-08-22</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/why-parrot-ctfs-is-the-owasp-juice-shop-alternative-for-advanced-appsec-training</loc>
        <lastmod>2025-07-23</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/introducing-lorikeet-security-the-end-to-end-solution-for-modern-cybersecurity-compliance-soc-as-a-service</loc>
        <lastmod>2025-07-23</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/best-ctfd-alternatives-for-hosting-capture-the-flag-events</loc>
        <lastmod>2025-07-09</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/nis2-compliance-why-european-organizations-need-more-than-just-a-checkbox</loc>
        <lastmod>2025-07-08</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/nis-2-compliance-why-testing-matters-more-than-ever-and-why-parrot-ctfs-covers-it-all</loc>
        <lastmod>2025-07-08</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/level-up-your-active-directory-hacking-parrot-ctfs-now-hosts-goad-by-orange-cyberdefense</loc>
        <lastmod>2025-07-05</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/parrot-ctfs-ptaas-continuous-penetration-testing-for-a-changing-world</loc>
        <lastmod>2025-07-01</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/ai-meets-offsec-how-parrot-ctfs-is-training-hackers-to-think-like-machines</loc>
        <lastmod>2025-06-28</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/elevate-your-cybersecurity-game-with-parrot-ctfs-ptaas-a-comprehensive-guide</loc>
        <lastmod>2025-05-13</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/capture-the-flag-ctf-cyber-security-for-beginners-your-gateway-into-ethical-hacking</loc>
        <lastmod>2025-05-13</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/nullbulge-hacker-exposed-disney-breach-was-cybercriminal-in-disguise</loc>
        <lastmod>2025-05-13</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/cisa-flags-critical-flaw-in-telemessage-app-used-by-former-national-security-advisor</loc>
        <lastmod>2025-05-13</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/top-10-parrot-ctfs-challenges-to-sharpen-your-ethical-hacking-skills</loc>
        <lastmod>2025-05-13</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/golang-backdoors-deployed-via-zero-day-in-output-messenger-by-turkish-apt-group</loc>
        <lastmod>2025-05-13</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/asus-patches-driverhub-rce-flaws-exploitable-via-http-and-crafted-ini-files-cve-2025-3462-cve-2025-3463</loc>
        <lastmod>2025-05-13</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/moldovan-authorities-arrest-suspect-in-e4-5m-ransomware-attack-on-dutch-research-agency</loc>
        <lastmod>2025-05-13</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/introducing-the-parrot-ctfs-community-content-partner-program</loc>
        <lastmod>2025-05-13</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/parrot-ctfs-free-real-world-hacking-challenges-for-cybersecurity-enthusiasts</loc>
        <lastmod>2025-05-04</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/exploring-parrot-ctfs-a-comprehensive-guide-to-cybersecurity-labs</loc>
        <lastmod>2025-04-25</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/%f0%9f%94%90-top-5-cybersecurity-education-and-academy-platforms-in-2025</loc>
        <lastmod>2025-04-25</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/using-athena-os-on-parrot-ctfs-cloud-attack-vm-and-offline-practice</loc>
        <lastmod>2025-04-14</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/critical-rce-vulnerability-in-bentoml-cve-2025-27520-what-you-need-to-know</loc>
        <lastmod>2025-04-14</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/why-parrot-ctfs-is-excellent-for-red-teaming</loc>
        <lastmod>2025-04-14</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/the-latest-on-cve-2025-29927-nextjs-vulnerability</loc>
        <lastmod>2025-04-14</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/parrot-ctfs-cyber-security-ethical-hacking-education-platform</loc>
        <lastmod>2025-03-08</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/breaking-cyber-security-news-parrot-ctfs-just-launched-event-hosting</loc>
        <lastmod>2025-02-03</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/why-hackers-love-parrot-ctfs-vms-powered-by-athenaos</loc>
        <lastmod>2025-10-05</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/the-ultimate-wireshark-cheat-sheet-master-network-analysis-like-a-pro</loc>
        <lastmod>2025-01-13</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/best-ctf-platform-in-2025-hack-the-box-alternative</loc>
        <lastmod>2025-10-05</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/the-growing-world-of-bug-bounty-hunting-a-look-at-platforms-programs-and-the-future-with-parrot-ctfs</loc>
        <lastmod>2025-01-11</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/security-capture-the-flag-a-gateway-to-cybersecurity-mastery</loc>
        <lastmod>2025-01-11</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/realistic-learning-why-parrot-ctfs-is-the-future-of-cybersecurity-education</loc>
        <lastmod>2025-01-11</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/why-universities-should-leverage-parrot-ctfs-unlocking-a-70-bulk-discount</loc>
        <lastmod>2025-01-11</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/unraveling-the-cyber-kill-chain-tools-and-tactics-behind-cyber-attacks</loc>
        <lastmod>2025-01-11</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/the-top-5-ctf-platforms-of-2025-best-places-to-sharpen-your-hacking-skills</loc>
        <lastmod>2025-10-16</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/how-to-build-a-career-in-penetration-testing-a-step-by-step-roadmap</loc>
        <lastmod>2025-01-11</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/mastering-hacking-games-and-ctf-challenges-your-ultimate-guide-to-becoming-a-cybersecurity-pro</loc>
        <lastmod>2025-10-01</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/the-ultimate-guide-to-nuclei-enumeration-scanner</loc>
        <lastmod>2025-01-11</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/thick-client-penetration-testing-a-comprehensive-guide</loc>
        <lastmod>2025-01-11</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/case-study-jacob-masse-passed-ejpt-ewpt-ecppt</loc>
        <lastmod>2025-01-11</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/how-much-does-parrot-ctfs-academy-cost</loc>
        <lastmod>2025-07-22</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/stacys-office-parrot-ctfs-red-team-lab-walkthrough</loc>
        <lastmod>2025-01-11</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/is-hack-the-box-worth-it-a-comprehensive-review</loc>
        <lastmod>2025-10-05</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/is-tryhackme-worth-it-a-detailed-look-at-the-platform</loc>
        <lastmod>2025-10-05</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/is-parrot-ctfs-worth-it-a-comprehensive-review</loc>
        <lastmod>2025-01-11</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/comprehensive-burp-suite-cheat-sheet-for-web-application-security-testing</loc>
        <lastmod>2025-01-11</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/active-directory-ad-hacking-cheat-sheet</loc>
        <lastmod>2025-11-30</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/sqlmap-cheat-sheet</loc>
        <lastmod>2025-11-30</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/ffuf-fuzz-faster-u-fool-cheat-sheet</loc>
        <lastmod>2025-01-11</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/impacket-kerberoasting-cheat-sheet</loc>
        <lastmod>2025-01-11</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/gobuster-cheat-sheet</loc>
        <lastmod>2025-10-05</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/metasploit-cheat-sheet</loc>
        <lastmod>2025-01-11</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/nmap-cheat-sheet</loc>
        <lastmod>2025-01-11</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/what-is-the-owasp-top-10</loc>
        <lastmod>2025-01-11</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/tryhackme-vs-parrot-ctfs-a-comprehensive-comparison</loc>
        <lastmod>2025-01-11</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/become-a-parrot-ctfs-subject-matter-expert</loc>
        <lastmod>2025-01-11</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/parrot-ctfs-now-offering-certificates-for-completions</loc>
        <lastmod>2025-01-11</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/parrot-ctfs-introduces-advanced-red-team-labs</loc>
        <lastmod>2025-11-30</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/why-hands-on-learning-is-crucial-in-cybersecurity-the-role-of-parrot-ctfs</loc>
        <lastmod>2025-01-11</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/top-10-tools-every-ethical-hacker-should-know</loc>
        <lastmod>2025-01-11</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/why-parrot-ctfs-is-the-ideal-platform-for-cybersecurity-training</loc>
        <lastmod>2025-01-11</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/why-parrot-ctfs-is-the-ultimate-platform-for-cybersecurity-training</loc>
        <lastmod>2025-01-11</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/understanding-vulnerable-lab-machines</loc>
        <lastmod>2025-01-11</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/parrot-ctfs-joins-forces-with-athenaos</loc>
        <lastmod>2025-01-11</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/ready-set-pwn-parrot-ctfs-your-ultimate-hacking-playground</loc>
        <lastmod>2025-01-11</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/what-is-ctf-in-hacking-tips-ctfs-for-beginners</loc>
        <lastmod>2025-01-11</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/parrot-ctfs-vs-hack-the-box-a-comprehensive-comparison</loc>
        <lastmod>2025-01-11</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/what-is-ctf-in-cyber-security</loc>
        <lastmod>2025-01-11</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/parrot-ctfs-def-con-32</loc>
        <lastmod>2025-01-11</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/discover-the-top-5-beginner-ctfs-on-parrot-ctfs-your-gateway-to-cybersecurity-mastery</loc>
        <lastmod>2025-01-11</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/getting-started-with-capture-the-flag-ctf-competitions-a-beginners-guide</loc>
        <lastmod>2025-01-11</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/the-best-ctfs-for-enhancing-your-cybersecurity-skills</loc>
        <lastmod>2025-01-11</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>
    <url>
        <loc>https://lorikeetsecurity.com/blog/beginner-capture-the-flags</loc>
        <lastmod>2025-01-11</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
    </url>

</urlset>
