<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://infosecnotes.com/wp-sitemap.xsl" ?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://infosecnotes.com/securing-cloud-infrastructure-lessons-from-attack-patterns-part-1/</loc><lastmod>2025-10-12T13:57:32+00:00</lastmod></url><url><loc>https://infosecnotes.com/inside-a-breach-cisas-lessons-from-incident-response-2/</loc><lastmod>2025-10-15T06:12:42+00:00</lastmod></url><url><loc>https://infosecnotes.com/a-small-number-of-samples-can-poison-llms-of-any-size/</loc><lastmod>2025-10-13T17:43:56+00:00</lastmod></url></urlset>
