<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1">
  <url>
    <loc>https://www.leansecurity.com.au/prices</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-17</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/a32a40db-12d1-4bf5-ba66-56a5076482b3/purple-abstract-blur-bokeh.jpg</image:loc>
      <image:title>Prices</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1427849628992-HN9FS07CEBHL3PZ4UUW0/Buisness-11.jpg</image:loc>
      <image:title>Prices</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/the-2026-shift-from-annual-compliance-to-continuous-penetration-testing-and-red-teaming-in-australia</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-04-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/9d47f593-0d96-497e-8470-d07e4ff3c114/f4a52db9-ea9f-4539-9c21-dca3671d5b00.jpg</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - The 2026 Shift from Annual Compliance to Continuous Penetration Testing and Red Teaming in Australia - Make it stand out</image:title>
      <image:caption>Evolution of offensive security: Annual vs Continuous</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/4/2/australian-daily-cyber-threat-briefing-02-april-2026</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/4/1/daily-threat-briefing-1-april-2026-ai-cloud-and-supply-chain-under-siege</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/3/31/australian-daily-cyber-threat-briefing-edge-exploits-ai-risks-and-regulatory-crackdowns</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-31</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/3/30/daily-australian-cyber-threat-briefing-ai-pipeline-exploits-api-sprawl-and-critical-infrastructure-targeting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-30</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/3/29/australian-cyber-threat-intelligence-weekly-vulnerability-deep-dive</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-29</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/3/28/australian-cyber-threat-intelligence-briefing-28-march-2026</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-28</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/3/27/australian-daily-threat-briefing-27-march-2026</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-27</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/3/26/australian-daily-cyber-threat-briefing-weaponised-ai-cloud-breaches-and-api-exploitation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-26</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/3/25/australian-cyber-threat-briefing-ai-exploits-ransomware-escalation-and-new-iot-mandates</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-25</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/3/24/australian-daily-cyber-threat-briefing-ai-exploits-api-abuse-and-evolving-ransomware</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-24</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/3/23/australian-cyber-threat-landscape-daily-briefing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-23</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/3/22/weekly-australian-cyber-threat-amp-vulnerability-deep-dive</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/3/22/australian-cyber-threat-briefing-ai-ransomware-and-cloud-exploits</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/3/21/daily-cyber-threat-briefing-ransomware-cloud-exploits-and-ai-driven-attacks-in-australia</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-21</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/3/20/daily-threat-briefing-australian-cyber-landscape-deep-dive</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-20</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/3/19/daily-cyber-threat-briefing-australia-ai-weaponisation-cloud-api-exploits-and-sector-sieges</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-19</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/3/18/daily-threat-briefing-australian-cyber-landscape-amp-emerging-vulnerabilities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-18</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/3/17/australian-cyber-threat-briefing-surging-ransomware-ai-exploits-and-critical-api-vulnerabilities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-17</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/3/16/daily-australian-cyber-threat-briefing-escalating-ai-exploits-ransomware-and-cloud-breaches</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-16</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/3/15/australian-cyber-threat-intelligence-weekly-vulnerability-deep-dive-815-march-2026</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-15</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/3/15/australian-cyber-threat-briefing-cloud-compromises-ai-weaponisation-and-escalating-ransomware</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-15</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/3/14/australian-daily-threat-briefing-ai-exploits-ransomware-resurgence-and-zero-day-fallout</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-14</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/3/13/australian-cyber-threat-briefing-ai-weaponisation-api-exploits-and-sector-wide-targeting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-13</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/3/11/daily-cyber-threat-briefing-ai-driven-exploitation-and-api-abuse-surge-across-australia</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-11</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/3/10/australian-daily-cyber-threat-briefing-10-march-2026</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-10</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/3/9/daily-threat-briefing-ai-weaponisation-cloud-breaches-and-iot-exploits</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-09</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/3/8/australian-cyber-threat-landscape-weekly-vulnerability-deep-dive-08-march-2026</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-08</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/3/8/weekly-cyber-threat-intelligence-briefing-australia-08-march-2026</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-08</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/3/7/daily-australian-threat-briefing-agentic-ai-exploits-cloud-intrusions-and-iot-vulnerabilities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-07</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/3/6/australian-daily-threat-briefing-ai-cloud-and-api-exploits-escalating-across-critical-sectors</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-06</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/3/5/australian-daily-cyber-threat-briefing-emerging-exploits-ai-weaponisation-and-iot-vulnerabilities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-05</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/3/4/australian-daily-threat-briefing-ai-driven-fraud-cloud-breaches-and-web-application-exploits</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-04</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/3/3/daily-australian-threat-intelligence-briefing-agentic-ai-zero-days-and-sector-wide-extortion</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-03</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/cisco-catalyst-sd-wan-vulnerability-cve-2026-20127</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-01</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/2/27/australian-cyber-threat-briefing-fintech-data-leaks-healthcare-ransomware-amp-critical-ai-exploits</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-27</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/2/26/daily-threat-briefing-critical-cisco-zero-day-amp-ai-fraud-surge-26-february-2026</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-26</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/2/25/australian-cyber-threat-briefing-supply-chain-shocks-fintech-fallout-amp-the-ai-attack-surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/2/24/daily-threat-briefing-critical-infrastructure-under-siege-amp-new-webmail-exploits</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-24</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/2/23/daily-threat-briefing-ivanti-zero-days-healthcare-ransomware-amp-the-identity-crisis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-23</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/2/22/australia-cyber-threat-briefing-ai-driven-api-attacks-fintech-fallout-amp-the-rise-of-0apt</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-22</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/2/21/daily-threat-briefing-major-fintech-breach-amp-critical-ai-workflow-rce</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-21</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/2/20/daily-threat-briefing-critical-ivanti-zero-days-fintech-breaches-and-the-rise-of-lockbit-50</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-20</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/2/18/urgent-chrome-zero-day-government-blind-spots-amp-the-ai-agent-threat</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-18</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/2/17/australian-threat-intelligence-briefing-chrome-zero-days-government-gaps-amp-ai-agent-risks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-18</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/2/16/threat-briefing-beyondtrust-critical-rce-healthcare-under-siege-amp-the-25m-fintech-warning</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-16</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/2/15/weekly-threat-briefing-zero-days-hit-apple-amp-solarwinds-nsw-health-under-pressure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-15</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/2/14/daily-threat-briefing-critical-saas-rces-amp-healthcare-under-siege</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-14</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/2/13/daily-threat-briefing-australia-13-february-2026</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-13</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/2/12/daily-threat-briefing-australia-12-february-2026</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-12</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/2/11/daily-threat-briefing-national-alert-system-compromised-landmark-fintech-penalty-amp-new-ai-workflow-rce</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-11</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/2/10/australia-daily-cyber-threat-briefing-fiigs-25m-penalty-school-data-fallout-amp-the-rise-of-shadow-ai</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-10</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/2/9/daily-threat-briefing-smartermail-zero-day-substack-breach-amp-healthcare-resilience</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-09</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/2/8/weekly-threat-briefing-australias-cyber-landscape-28-february-2026</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-08</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/2/7/daily-threat-briefing-deepseek-ban-healthcare-ransomware-and-edge-exploits</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-07</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/2/6/daily-threat-briefing-australia-06-february-2026</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-06</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/2/5/cyber-threat-briefing-australias-digital-landscape-under-siege</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-05</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/2/4/australian-cyber-threat-briefing-ai-agents-hijacked-and-critical-rces-targeting-enterprise</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-04</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/2/3/daily-threat-briefing-ai-agents-exposed-nsws-new-cyber-mandate-and-real-estate-risks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-03</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/2/2/weekly-threat-briefing-critical-zero-days-and-nation-state-shifts-targeting-australia</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-02</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/2/2/daily-threat-briefing-ai-model-hosting-abuse-amp-new-sso-phishing-campaigns</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-02</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/1/30/australia-cyber-threat-briefing-network-assaults-outpace-malware-amp-ai-privacy-shifts</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-30</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/1/29/daily-threat-briefing-nsw-gov-strategy-launch-vic-schools-breached-amp-critical-ai-flawsc</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-29</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/1/28/daily-threat-briefing-australia-28-january-2026</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/1/27/daily-threat-briefing-australia-27-january-2026</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-27</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/1/26/daily-threat-briefing-australia-day-cyber-risks-active-rces-amp-edtech-fallout</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-26</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/1/24/daily-threat-briefing-airwallex-under-scrutiny-copilot-ai-vulnerability-amp-critical-saas-rces</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-24</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/1/17/daily-threat-briefing-australia-17-january-2026</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-17</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/1/15/daily-threat-briefing-critical-n8n-rce-microsoft-zero-days-amp-prosura-breach</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-15</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/1/14/daily-threat-briefing-australia-14-january-2026</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-14</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/1/13/daily-threat-briefing-anubis-targets-healthcare-amp-critical-rce-in-n8n-automation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-13</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/1/12/daily-threat-briefing-australia-12-january-2026</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-12</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/sharepoint-toolshell-vulnerability-australia</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-11</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/c3a57fe7-9bf4-4295-b303-fe963a20d9f3/ToolShell+Crisis+SharePoint+vulnerability+2.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - The ToolShell Crisis: Why Your SharePoint Server Is a Ticking Time Bomb - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/bdd5c64a-b49a-44bc-beaf-d92a25975db2/SharePoint_ToolShell_attack_chain_infographic_showing_5-phase_exploitation_process.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - The ToolShell Crisis: Why Your SharePoint Server Is a Ticking Time Bomb - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/c4f03ae8-38ff-43d8-91f1-2dd42554bd69/SharePoint_ToolShell_risk_assessment_matrix_for_Australian_organisations.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - The ToolShell Crisis: Why Your SharePoint Server Is a Ticking Time Bomb - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/1/11/weekly-threat-briefing-automation-platforms-under-siege-amp-the-rise-of-ai-jailbreaks-11-jan-2026</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-11</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/1/10/daily-threat-briefing-australia-10-january-2026</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-10</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/1/9/daily-threat-briefing-mongobleed-dfat-data-exposure-and-critical-saas-vulnerabilities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-09</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/1/8/australian-cyber-threat-briefing-mongobleed-prosura-breach-and-ai-supply-chain-risks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-08</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/1/7/daily-threat-briefing-mongobleed-crisis-deepens-amp-watchguard-exploits-targeting-australian-networks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-07</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/1/6/australian-cyber-threat-briefing-06-january-2026</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-06</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/1/5/daily-threat-briefing-mongobleed-crisis-amp-critical-infrastructure-under-siege</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-05</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/1/4/weekly-threat-briefing-australias-cyber-landscape-29-dec-2025-4-jan-2026</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-04</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/1/3/australian-cyber-threat-briefing-03-january-2026</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-03</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/1/2/daily-threat-briefing-mongobleed-react-rce-and-dfats-ethical-hack</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-02</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2026/1/1/australian-monthly-threat-briefing-december-2025</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-01</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2025/12/31/daily-threat-briefing-australia-31-december-2025</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-31</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2025/12/30/daily-threat-briefing-mongobleed-critical-alert-sydney-uni-breach-amp-saas-risks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-30</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2025/12/29/daily-threat-briefing-australia-29-december-2025</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-29</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2025/12/28/weekly-threat-briefing-australia-21-december-28-december-2025</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-28</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2025/12/28/australian-cyber-threat-briefing-critical-rces-and-supply-chain-strikes</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-28</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/long-lived-cloud-credentials-identity-risk-2025</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-11</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/cdbb6d36-9b0b-44ec-ae7a-7b25a1fc74f6/Cloud_credential_risk_visualization_featuring_long-lived_credentials_in_network_topology.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Why Long-Lived Cloud Credentials Are Your Biggest Identity Risk in 2025 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2025/12/27/daily-threat-briefing-australia-27-december-2025</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-27</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2025/12/26/daily-threat-briefing-boxing-day-cyber-spike-amp-critical-edge-exploits</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-26</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2025/12/25/australian-cyber-threat-briefing-critical-rces-and-ransomware-targeting-saas-amp-education</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-25</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2025/12/24/daily-threat-briefing-critical-watchguard-exploits-amp-holiday-ransomware-spikes-24-december-2025</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-24</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2025/12/23/daily-threat-briefing-react2shell-crisis-amp-aussie-healthcare-under-fire</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-23</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2025/12/22/daily-threat-briefing-critical-cisco-amp-react-zero-days-nsw-health-risks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-22</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2025/12/21/fortinet-sso-auth-bypass-penetration-testing-australia</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-21</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/7f2b7cf5-1d32-448d-ac2e-28a9993267ff/Fortinet+FortiGate+SSO+Ghost+Login+Attacks+horizontal.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Fortinet "Ghost Logins": How Authentication Bypass Attacks Expose Gaps in Your Penetration Testing Strategy - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/8381dc06-4bae-48ca-bd23-81904a109817/Visualising+the+attack+path%3A+from+FortiGate+to+data+loss</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Fortinet "Ghost Logins": How Authentication Bypass Attacks Expose Gaps in Your Penetration Testing Strategy - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2025/12/21/weekly-threat-briefing-australia-14-21-december-2025</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-21</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2025/12/20/daily-threat-briefing-australia-20-december-2025</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-20</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2025/12/19/australian-cyber-threat-briefing-healthcare-security-gaps-amp-critical-saas-vulnerabilities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-19</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2025/12/18/daily-threat-briefing-react2shell-exploits-surge-amp-uni-sydney-breach</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-18</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2025/12/17/australian-threat-briefing-react2shell-escalation-critical-fortinet-flaws-amp-ai-supply-chain-risks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-17</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2025/12/16/daily-threat-briefing-react-critical-rce-healthcare-under-fire-and-new-ai-risks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-16</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2025/12/15/urgent-critical-react-amp-fortinet-flaws-exploit-australian-networks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-15</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2025/12/14/weekly-threat-briefing-critical-fortinet-flaws-ai-vulnerabilities-amp-nation-state-shifts</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-14</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2025/12/13/urgent-react2shell-rce-exploited-by-state-actors-amp-new-healthcare-supply-chain-risks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-13</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2025/12/12/daily-threat-briefing-australia-12-december-2025</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-12</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2025/12/11/daily-threat-briefing-critical-fortinet-auth-bypass-amp-ai-copilot-vulnerabilities-hit-australian-shores</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-11</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2025/12/10/daily-threat-briefing-critical-react-flaw-defence-supply-chain-breach-amp-ai-identity-risks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-10</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2025/12/9/daily-threat-briefing-react2shell-crisis-ai-espionage-amp-retail-ransomware-hits-australia</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-09</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2025/12/8/daily-threat-briefing-australia-08-december-2025</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-08</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2025/12/7/australia-cyber-threat-briefing-react2shell-crisis-amp-defence-supply-chain-breach-0107-dec-2025</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-07</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2025/12/6/daily-threat-briefing-australia-06-december-2025</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-06</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/react-nextjs-cvss-10-rce-react2shell-australia-ciso-advisory</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-06</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2025/12/5/daily-threat-briefing-critical-react-rce-aussie-retailers-hit-by-ransomware-and-android-zero-days</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-05</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2025/12/4/daily-threat-briefing-ransomware-surge-amp-critical-react-flaw-hits-australian-networks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-08</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2025/12/3/daily-threat-briefing-defence-supply-chain-breach-ai-rces-amp-critical-telco-fines</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-03</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2025/12/2/daily-threat-briefing-australia-02-december-2025</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-02</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2025/12/1/monthly-threat-briefing-australia-november-2025</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-01</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2025/12/1/australian-cyber-threat-briefing-record-ddos-saas-supply-chain-risks-and-holiday-scams</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-12-01</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2025/11/30/daily-threat-briefing-australias-holiday-cyber-surge-amp-critical-sector-alerts</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-30</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2025/11/29/australian-weekly-threat-briefing-defence-supply-chain-breached-amp-saas-under-siege</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-29</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2025/11/28/daily-threat-briefing-ai-driven-phishing-amp-the-machine-identity-crisis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-28</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2025/11/27/australias-cyber-siege-healthcare-ransomware-api-exploits-and-the-holiday-scam-surge</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-27</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/sessionreaper-penetration-testing-australia-cve-2025-54236</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-26</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/eb8a8302-874a-42e9-9b84-479e81180f66/Threat+Overview.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - SessionReaper &amp;amp; BFCM: Why Penetration Testing Services Are Critical (CVE-2025-54236) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/611f5daa-2076-4462-865a-92c6dbf203e7/Financial+and+Legal+Risk+Analysis.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - SessionReaper &amp;amp; BFCM: Why Penetration Testing Services Are Critical (CVE-2025-54236) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/20669069-88d2-43fd-9917-4a651552e9b2/Exploit+Mechanics.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - SessionReaper &amp;amp; BFCM: Why Penetration Testing Services Are Critical (CVE-2025-54236) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/30f5b6b1-8457-49b5-8cc0-5059eb525d5d/Strategic+Response.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - SessionReaper &amp;amp; BFCM: Why Penetration Testing Services Are Critical (CVE-2025-54236) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2025/11/26/daily-threat-briefing-australia-26-november-2025</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-26</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2025/11/25/daily-threat-briefing-record-ddos-hits-australia-amp-critical-fortinet-flaws</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-25</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2025/11/24/daily-threat-briefing-russian-sanctions-salesforce-supply-chain-risks-amp-critical-wsus-exploits</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-24</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2025/11/23/daily-threat-briefing-supply-chain-attacks-hit-defence-ai-driven-phishing-escalates</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-23</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2025/11/22/daily-threat-briefing-russian-sanctions-defence-supply-chain-breaches-amp-the-zero-day-surge</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-22</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2025/11/21/daily-threat-briefing-defence-supply-chain-sieged-russian-hosts-sanctioned-amp-critical-fortinet-zero-days</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-22</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2025/11/20/daily-threat-briefing-australia-november-20-2025</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-20</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/au-threat-brief-cve-2025-21042-landfall-byod-liability</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-12</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/wsus-vulnerability-cve-2025-59287-australia-red-team</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-26</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/2c0a0396-97e8-4e31-a32d-5a1a03449f54/Screenshot+2025-10-25+at+3.34.27%E2%80%AFpm.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Beyond the Patch: Why the Actively Exploited WSUS Vulnerability (CVE-2025-59287) Demands a Red Team Response in Australia - Make it stand out</image:title>
      <image:caption>CVE-2025-59287</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/26db55ff-47c0-4e70-b9bd-1af806e9d8b7/Screenshot+2025-10-25+at+3.34.08%E2%80%AFpm.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Beyond the Patch: Why the Actively Exploited WSUS Vulnerability (CVE-2025-59287) Demands a Red Team Response in Australia - Make it stand out</image:title>
      <image:caption>CVE-2025-59287 timeline</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/a33302dd-c0ef-4290-917f-645df306fc7f/Screenshot+2025-10-25+at+3.33.48%E2%80%AFpm.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Beyond the Patch: Why the Actively Exploited WSUS Vulnerability (CVE-2025-59287) Demands a Red Team Response in Australia - Make it stand out</image:title>
      <image:caption>Adversary Emulation phases</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2025/10/20/apis-under-attack-why-your-digital-core-needs-penetration-testing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-19</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/40ea7337-5a75-4143-8059-39595b39bd82/code-laptop.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - APIs Under Attack: Why Your Digital Core Needs Penetration Testing - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/bb45b896-18b5-4e7a-8d48-91b6f74b3efb/code-laptop-typing.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - APIs Under Attack: Why Your Digital Core Needs Penetration Testing - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/47cb745e-58ab-4cea-9676-1f1749466db5/+business-team-office.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - APIs Under Attack: Why Your Digital Core Needs Penetration Testing - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/904a7b8f-23b2-44c1-bc14-c403514f2fc4/security-lock-keyboard.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - APIs Under Attack: Why Your Digital Core Needs Penetration Testing - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2025/10/17/it-security-audit-services-turning-compliance-into-a-competitive-advantage</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-16</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/02ab4784-a038-4446-a974-2e7ec2382908/business-team-discussing-audit.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - IT Security Audit Services: Turning Compliance into a Competitive Advantage - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/41cf0635-d0f2-4955-b881-f48771b28480/digital-hand-lock.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - IT Security Audit Services: Turning Compliance into a Competitive Advantage - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/ad205904-c69b-4f08-a82e-c67affc814fb/orange-background-progress-steps.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - IT Security Audit Services: Turning Compliance into a Competitive Advantage - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/ec4bb207-383d-47ca-9289-eb95681965bb/checklist-graphic-tickmarks.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - IT Security Audit Services: Turning Compliance into a Competitive Advantage - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2025/10/13/managed-internal-vulnerability-scanning-your-businesss-first-line-of-defence-against-insider-threats</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-12</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/oracle-ebs-zero-day-cve-2025-61882-australia</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-13</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2025/10/10/scanning-smarter-how-managed-web-vulnerability-scanning-detects-what-traditional-tools-miss</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-09</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/90d02fe3-ad4f-4a2a-8b33-3933e83cf401/Scanning+Smarter%3A+How+Managed+Web+Vulnerability+Scanning+Detects+What+Traditional+Tools+Miss.jpg</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Scanning Smarter: How Managed Web Vulnerability Scanning Detects What Traditional Tools Miss - Make it stand out</image:title>
      <image:caption>Discover how managed web vulnerability scanning enhances cybersecurity by detecting flaws traditional tools miss. This infographic highlights expert oversight, real threat validation, actionable reporting, regulatory compliance, and human expertise—helping businesses reduce risks and secure systems with continuous monitoring.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2025/10/6/the-rise-of-managed-security-services-why-diy-cybersecurity-no-longer-works</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-05</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2025/10/2/inside-a-penetration-testing-company-what-to-expect-before-during-and-after-an-engagement</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/7f9d22dc-7e79-480b-9dbf-ae661b48cf16/Inside+a+Penetration+Testing+Company%3A+What+to+Expect+Before%2C+During%2C+and+After+an+Engagement.jpg</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Inside a Penetration Testing Company: What to Expect Before, During, and After an Engagement - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/acsc-alert-cicd-pipeline-supply-chain-attack-australia</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-27</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2025/9/22/beyond-the-basics-advanced-security-testing-techniques-for-2025-threats-infograph-J68PZ</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-22</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/17df57ed-9665-4618-95de-ac433999742e/Beyond+the+Basics%3A+Advanced+Security+Testing+Techniques+for+2025+Threats+-+Infograph.jpg</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Beyond the Basics: Advanced Security Testing Techniques for 2025 Threats - Infograph - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2025/9/19/managed-web-vulnerability-scanning-vs-manual-testing-which-one-is-right-for-you</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-19</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2025/9/15/building-a-resilient-web-security-platform-what-enterprises-should-look-for</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-15</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/acsc-alert-sonicwall-vpn-akira-ransomware-australia</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-27</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/ai-red-teaming-penetration-testing-australia</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-27</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2025/9/12/source-code-security-assessment-in-the-cloud-benefits-risks-and-best-practices</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-12</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2025/9/8/the-future-of-mobile-app-security-testing-in-an-api-driven-world</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-08</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2025/9/5/how-managed-security-services-can-reduce-operational-costs-without-sacrificing-protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-05</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/0ce2c645-9948-41b9-8c0d-989a382be6d3/How+Managed+Security+Services+Can+Reduce+Operational+Costs+Without+Sacrificing+Protection.jpg</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - How Managed Security Services Can Reduce Operational Costs Without Sacrificing Protection - Make it stand out</image:title>
      <image:caption>This infographic by Lean Security outlines how outsourcing to managed security services can help businesses control costs without compromising protection. It emphasizes three key areas: scalable security solutions based on business needs, access to expert cybersecurity professionals for better ROI, and reduced compliance costs through integrated regulatory controls.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2025/9/2/beyond-the-basics-advanced-security-testing-techniques-for-2025-threats</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1bb65516-83a3-43c7-ad81-e37a2e40ac7c/Beyond+the+Basics%3A+Advanced+Security+Testing+Techniques+for+2025+Threats+-+Infograph.jpg</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Beyond the Basics: Advanced Security Testing Techniques for 2025 Threats - Make it stand out</image:title>
      <image:caption>This Lean Security infographic outlines advanced testing strategies for evolving 2025 cybersecurity threats, including AI-driven vulnerability scans, realistic red team simulations, adaptive testing, cloud-specific evaluations, and the combined strengths of automated and manual security testing for comprehensive protection.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2025/8/29/wafs-arent-enough-why-you-still-need-a-web-application-scanning-strategy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1754305112940-BJEVMHK2G1OWMTI5C9BZ/dashboard-analytics-on-laptop.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - WAFs Aren’t Enough: Why You Still Need a Web Application Scanning Strategy - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/ec341a9d-fb34-4654-857c-65e403a64dd3/security-metrics-review-session.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - WAFs Aren’t Enough: Why You Still Need a Web Application Scanning Strategy - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/8143fe3d-e4a8-46df-a45f-99bdd2aa84b6/manual-pen-testing-data-graph.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - WAFs Aren’t Enough: Why You Still Need a Web Application Scanning Strategy - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/84936c7e-49b8-4b39-9b05-fcdad1171e50/trade-insights-on-web-platform.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - WAFs Aren’t Enough: Why You Still Need a Web Application Scanning Strategy - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2025/8/25/the-true-cost-of-skipping-website-penetration-testing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-25</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1754304186024-8PUOE589STAK245CUQRN/business-leader-on-phone.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - The True Cost of Skipping Website Penetration Testing - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/72b032eb-fde1-492a-9962-631c380a290c/laptop-tablet-blank-screen-coffee.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - The True Cost of Skipping Website Penetration Testing - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/db6b549a-2056-40bd-9716-6ddd2902f4c6/device-trio-laptop-tablet-phone.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - The True Cost of Skipping Website Penetration Testing - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/ef398c40-4ba5-4709-a4a3-d74ebf5856dd/focused-woman-secure-mobile-workflow.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - The True Cost of Skipping Website Penetration Testing - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2025/8/22/managing-web-security-assessment-for-saas-platforms-a-2025-guide</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-22</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/aabf4e0d-1adb-413c-ba97-77fa94d83a52/professional-phone-monitor.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Managing Web Security Assessment for SaaS Platforms: A 2025 Guide - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/10836cb4-9d6a-4fee-9265-6b3071bf32c3/woman-working-laptop-topview.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Managing Web Security Assessment for SaaS Platforms: A 2025 Guide - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/8e96c166-2834-4a5a-8386-c47ff52d0ee1/hands-holding-smartphone-white-desk.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Managing Web Security Assessment for SaaS Platforms: A 2025 Guide - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/68f0a9e0-aad4-4dbf-a579-077241a65349/team-reviewing-security-report.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Managing Web Security Assessment for SaaS Platforms: A 2025 Guide - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2025/8/18/cloud-infrastructure-testing-why-your-devops-pipeline-depends-on-it</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-18</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/4e9a6c29-4590-48ff-9d3f-b601832a27c4/laptop-plant-cup-phone.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Cloud Infrastructure Testing: Why Your DevOps Pipeline Depends On It - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/29a27e14-dbe1-4714-8c6b-a23d3c147297/+laptop-coffee-pad-phone.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Cloud Infrastructure Testing: Why Your DevOps Pipeline Depends On It - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/e4a83280-c1e3-40b0-8490-455c92089970/woman-phone-chat-cup.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Cloud Infrastructure Testing: Why Your DevOps Pipeline Depends On It - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/98dfeb35-6c30-47f0-9c10-13fbf85f20d3/person-using-phone-laptop-stickers.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Cloud Infrastructure Testing: Why Your DevOps Pipeline Depends On It - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2025/8/15/from-open-source-to-secure-code-how-to-reduce-risk-in-hybrid-dev-environments</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-15</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/34b33df5-bf31-4f5f-9173-92ddb7a7fbca/hybrid-dev.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - From Open Source to Secure Code: How to Reduce Risk in Hybrid Dev Environments - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/66368833-fd7b-47c5-8efa-553c1de28f59/hacker.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - From Open Source to Secure Code: How to Reduce Risk in Hybrid Dev Environments - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/53a6ad7f-1ea6-45a7-81c3-2d875fcfb2d7/matrix+.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - From Open Source to Secure Code: How to Reduce Risk in Hybrid Dev Environments - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/4150b038-09b9-4dc1-aec5-bbc790d7a359/open-source.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - From Open Source to Secure Code: How to Reduce Risk in Hybrid Dev Environments - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2025/8/11/beyond-firewalls-the-role-of-application-penetration-testing-in-modern-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-11</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1754296279645-YKO2JJPCU0QGXZGK3888/cyber-attack.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Beyond Firewalls: The Role of Application Penetration Testing in Modern Security - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/8fe6299c-d7ae-42b8-a6e2-67201fb4b878/+security+.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Beyond Firewalls: The Role of Application Penetration Testing in Modern Security - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/a56ecdc2-cb81-4929-a0d0-5f9bb893d270/firewall.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Beyond Firewalls: The Role of Application Penetration Testing in Modern Security - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/fa21127c-39d1-4976-9aed-f992af67f077/web-application+.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Beyond Firewalls: The Role of Application Penetration Testing in Modern Security - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/00985601-edbb-4281-84d4-e8314a074ee6/+hacked.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Beyond Firewalls: The Role of Application Penetration Testing in Modern Security - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2025/8/8/the-importance-of-cyber-security-in-digital-marketing-infograph</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/220bae0e-b38a-4293-86e6-d0b8350e7b41/The+Importance+of+Cyber+Security+in+Digital+Marketing.jpg</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - The Importance of Cyber Security in Digital Marketing - Infograph - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2025/8/4/how-to-secure-your-digital-media-accounts-infograph</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-04</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1396b7f6-29e9-4be7-a7b4-fa3751459b09/How+To+Secure+Your+Digital+Media+Accounts.jpg</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - How To Secure Your Digital Media Accounts - Infograph - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2021/10/12/4-reasons-why-you-should-ip-protect-your-medical-devices</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-11-07</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2021/10/8/cyber-security-threats</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-10-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1633520186110-YU2A3FI2JFQQE0Y652F9/cyber-security-threats.jpg</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Cyber Security Threats - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2021/10/7/game-on-why-cyber-security-protects-your-games-image</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-10-06</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2021/9/19/the-importance-of-cyber-security-in-digital-marketing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-09-19</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2021/9/16/the-financial-benefits-of-managed-it-services</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-09-16</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2021/8/31/how-to-ensure-mobile-application-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-08-31</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1630410301740-6M4V21GATDIO1U5882HB/how-to-ensure-mobile.jpg</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - How to Ensure Mobile Application Security - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2021/8/23/why-is-online-gaming-security-important</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-08-23</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2021/8/19/how-to-secure-your-digital-media-accounts</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-08-19</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1629359548883-3CXV9L8QQHJMD8XG140Q/social-media+accounts.jpg</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - How To Secure Your Digital Media Accounts - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2021/7/25/how-can-online-gaming-be-used-to-scam-the-youth</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-07-25</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2021/7/20/4-ways-to-protect-your-e-commerce-website</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-07-20</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1626775600143-CU25DCROWUE0I93LZS3D/coding.jpg</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - 4 Ways To Protect Your E-Commerce Website - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2021/7/2/ensure-phone-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-07-02</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1625203030105-1S0D2C8106XJP4W7OGYL/ensure-mobile-security+-+Copy.jpg</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Ensure Phone Security - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2021/6/26/how-to-safeguard-your-data-against-malware</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-06-25</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1624186210758-4PL1OHO8QCFO9WSMBACB/safeguard-your-data-against-malware.jpg</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - How to Safeguard Your Data Against Malware - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2021/6/21/cyber-crime-in-the-post-pandemic-era-all-you-need-to-know</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-06-21</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1624185647085-0TZBSI87TRCRIIWB6TS8/computer-code.jpg</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Cyber Crime in the Post Pandemic Era: All You Need to Know - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2021/6/18/revolutions-in-the-cyber-security-industry</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-06-20</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2021/5/17/ensure-online-gaming-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-06-20</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1624184921811-72RKR8Z9AQZ24XWHWATD/Online-gaming-security.jpg</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Ensure Online Gaming Security - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2021/5/15/4-ways-your-computer-can-be-exposed-to-malware-while-working-from-home</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-06-20</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1624184088585-T5AS9Z8R27E0MZHWU0LM/spyware.jpg</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - 4 Ways Your Computer Can Be Exposed To Malware While Working From Home - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2021/5/10/ways-you-agreed-to-privacy-invasion-through-apps-on-your-phone</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-06-20</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2021/3/6/tips-to-improve-your-vulnerability-scans</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-03-30</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2021/4/3/common-web-security-vulnerabilities-and-how-to-fix-them</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-04-03</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2021/3/9/how-to-improve-your-security-plan</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-03-09</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1615278151997-8BUJQIEQYNHIFI9T93FD/How-to-improve-your-security-plan.jpg</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - How to Improve Your Security Plan</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2021/2/8/mobile-apps-security-risks-you-should-be-aware-of</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-02-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1611828808976-EVIAENAAFT2HBWFWDGW0/Mobile-Apps-Security.jpg</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Mobile Apps Security - Risks You Should Be Aware of</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2021/2/3/how-to-formulate-a-stronger-security-plan-for-your-business</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-02-03</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2021/1/28/how-hackers-can-penetrate-your-business-networks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1611826374661-VPXPIGX419C50XDLOBZT/Somebody+using+a+free+wi-fi+at+a+public+space+that+can+be+used+by+hackers+to+access+their+data.jpg</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - How Hackers Can Penetrate Your Business Networks?</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2021/1/20/present-your-small-business-with-the-gift-of-cyber-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-01-20</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1610532078264-Z5OWVI3JS2R9LDK6LRMX/Cyber-security-small-business.jpg</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Present Your Small Business with the Gift of Cyber Security</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2021/1/15/what-kind-of-penetration-test-is-the-right-fit-for-your-business</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-01-15</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2021/1/13/the-basics-of-web-application-pen-testing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-01-13</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2020/11/30/top-4-threats-online-gamers-need-to-be-wary-of</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-15</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1606734814944-N2BTP0ZJWZLNMK5Y3FFA/threats-online-gamers-need-to-be-wary-of+-+Copy+%281%29.jpg</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Top 4 Threats Online Gamers Need to be Wary Of (infographics)</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2020/11/12/security-risk-assessment-why-do-you-need-it</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-11-12</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1603875076584-82ZKAF2KFYLJI4NC67MY/Security-Risk-Assessment-min.jpg</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Security Risk Assessment - Why Do You Need It</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2020/11/8/security-challenges-in-hybrid-cloud-environments</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-11-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1603873707113-B7090M2IV4SXWNQ805H7/Cloud-networking.jpg</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Security Challenges in Hybrid Cloud Environments</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2020/11/5/exploitative-facial-recognition-devices</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-11-05</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1603873172508-S9JESHE4BVTI4CI246LQ/Face-detection-scan-scanning.jpg</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Exploitative Facial Recognition Devices</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1603873116200-BI5E13PCMK4SGNAFO7AD/Facial-recognition-system-concept.jpg</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Exploitative Facial Recognition Devices</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2020/11/2/secure-setup-for-remote-working</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-11-02</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1603872558338-Z884EC7TXTTCUNZSNHED/image-asset.jpeg</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Secure Setup for Remote Working</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2020/10/28/pen-testing-vs-source-code-review-whats-best-for-web-application-testing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-10-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1603872213922-DH86YBDV5OHA07045RX5/Programming-developing.jpg</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Pen Testing vs. Source Code Review: What’s Best for Web Application Testing?</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2020/9/23/can-a-vulnerability-assessment-save-you-from-the-next-security-crash</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-09-23</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2020/9/19/what-to-consider-when-iot-security-testing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-09-19</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2020/9/15/3-key-things-to-consider-when-opting-for-network-penetration-testing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-09-15</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1599808613945-RVLD320VN4CJSAOMM27Z/image-asset.jpeg</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - 3 Key Things To Consider When Opting For Network Penetration Testing</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2020/9/11/heres-why-digital-enterprises-need-network-penetration-testing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-09-11</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2020/9/6/understanding-security-as-an-investment-importance-of-penetration-testing-for-start-ups</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-09-06</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2020/9/2/3-common-cloud-vulnerabilities-you-should-be-wary-of</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-09-02</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2020/8/28/4-steps-to-safeguard-against-your-malware</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-08-27</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2020/8/13/why-your-customer-data-should-be-encrypted-infographic</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-08-13</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1597148105555-3SJR3LQMREYNHGAG4W5R/Why-Your-Customer-Data-Should-Be-encrypted.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Why Your Customer Data Should Be Encrypted (Infographic)</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2020/8/12/5-cyber-security-risks-of-working-from-home</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-08-11</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2020/8/7/contact-tracing-how-does-it-work</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-08-07</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2020/7/30/the-perks-of-a-pen-test</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-07-29</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2020/7/15/ddos-attack</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-07-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1594619239434-KPOE20EZSQX9WD0GSGT6/DDOS-Attack-min.jpg</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - DDOS ATTACK</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2020/7/13/the-importance-of-encryption-for-storing-customer-data</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-07-13</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2020/7/10/3-cybersecurity-tips-for-remote-workers-to-protect-sensitive-company-data</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-07-10</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2020/7/3/understanding-the-art-of-penetration-testing-faqs-answered</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-07-03</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2020/6/30/top-cybersecurity-challenges-of-managing-a-remote-workforce</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-06-30</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1592311533209-SZYEDA0O7MLADXB4NWDY/mitigate+cybersecurity+threats.jpg</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Top Cybersecurity Challenges of Managing a Remote Workforce</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2020/6/27/penetration-testing-can-prevent-insider-threatsheres-everything-you-need-to-know</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-06-27</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2020/6/25/3-benefits-of-real-time-asset-tracking-in-manufacturing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-06-25</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2020/6/20/securing-banking-applications-101-mobile-money-safety</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-06-20</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2020/6/15/who-is-external-network-penetration-testing-test-for</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-06-15</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2020/5/10/why-is-web-service-penetration-testing-beneficial-for-your-business</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-05-30</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2020/6/5/your-ultimate-cybersecurity-checklist-for-working-from-home</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-06-05</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2020/5/30/top-4-threats-online-gamers-need-to-be-wary-of</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-05-30</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2020/5/25/the-importance-of-mobile-application-penetration-testing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-05-25</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2020/5/20/4-ways-to-prevent-url-open-redirect-attacks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-05-20</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2020/5/19/cloud-security-amp-threats</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-05-19</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1589534990073-0ZTMD04IK5P1DIU59NZ1/Cloud-Security-Threats-min.jpg</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Cloud Security &amp;amp; Threats</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2020/5/8/how-safe-is-your-mobile-data</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-05-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1588851892099-F5U6QQVGWZC21U505RMC/How-Safe-Is-Your-Mobile-Data-min.jpg</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - How Safe Is Your Mobile Data</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2020/5/5/best-practices-for-database-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-05-04</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2020/4/29/beware-of-these-4-types-of-cyber-attacks-to-preserve-your-companys-reliability</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-04-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1587561828657-97TJNXZMA3A19IP8QCK4/Cyber+Attacks.jpg</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Beware of These 4 Types of Cyber Attacks to Preserve Your Company’s Reliability</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2020/4/29/e-commerce-security-amp-solutions</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-04-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1587563923757-EHBR9D8R6ZF6TYHFFWKF/Ecommerce-Security-Solutions-min.jpg</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - E-commerce Security &amp;amp; Solutions</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2020/4/26/cloud-security-challenges-explore-the-top-cloud-security-threats</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-04-26</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1587561220365-RDWCCPQVW4YGMSGBVBAE/image-asset.jpeg</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Cloud Security Challenges: Explore the Top Cloud Security Threats</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2020/4/23/5-ways-to-protect-your-e-commerce-site-from-hackers-in-2020</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-15</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2020/2/14/creating-a-culture-of-cyber-security-at-work</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-02-13</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1580810785592-CW13N77BNA5ESWBZ09IM/Creating-a-Culture-of-Cberysecurityat-work-min.jpg</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Creating a Culture of Cyber-Security at work</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2020/2/12/internet-of-things-iot-security-in-2020-expert-advice-you-should-follow</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-02-11</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2020/2/10/e-commerce-security-101-what-you-should-know</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-02-09</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2020/2/6/prioritizing-web-security-in-digital-marketing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-02-05</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2020/2/4/5-expert-tips-for-social-media-security-to-mitigate-risks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-02-04</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2020/1/2/cybersecurity-for-small-businesses-in-australia</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-01-02</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1577185296683-LYXUPU8J0Z1S3LX417T8/protect-your-business-from-cyberattack.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Cybersecurity for Small Businesses in Australia</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2019/12/27/4-ways-healthcare-application-security-can-be-improved</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-12-27</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1577185019843-0OMT2RZACQ4QIJC1DDFR/Running-Application-Testing.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - 4 Ways Healthcare Application Security can be Improved</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2019/12/24/mobile-app-penetration-testing-frequently-asked-questions</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-12-24</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1577184794823-28DYRPOUCXOXUY16Q1X8/mobile+app+penetration+testing+provider.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Mobile App Penetration Testing- Frequently Asked Questions</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2019/12/5/how-your-business-can-benefit-from-a-penetration-testing-provider</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-12-05</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2019/12/3/what-hackers-look-for-in-a-mobile-app</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-12-02</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2019/11/30/5-reasons-why-cloud-based-security-is-right-for-your-business</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-11-30</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2019/11/27/3-ways-you-can-stay-secure-on-mmo-games-online</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-11-27</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2019/11/25/5-most-common-types-of-application-attacks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-11-24</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1574489456991-DGCMJ774PUA4PF0ON81W/image-asset.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - 5 Most Common Types of Application Attacks</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2019/11/23/a-beginners-guide-to-external-penetration-testing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-11-22</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1574229800585-8S4VIFHN7JTM4QNJOM6S/Threat-Modelling.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - A Beginner’s Guide to External Penetration Testing</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2019/11/20/professional-malware-detection-service-why-is-it-important</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-11-20</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1574229567153-Y45KDXMX6J5Q4GH0DQCL/hire-professional-malware-detection-services.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Professional Malware Detection Service: Why Is It Important?</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2019/11/10/me-confused-whats-the-difference-between-mobile-and-web-application-penetration-testing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-11-09</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1573032237405-HKG0A8TWKP9EUMVKBZA8/Web+app+pen+testing.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Me Confused: What’s the Difference Between Mobile And Web Application Penetration Testing?</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2019/11/6/5-best-practices-for-choosing-a-penetration-testing-company</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-11-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1573031946982-7DMKG34VRKJPL6413O05/reputable-pen-testing-companies.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - 5 Best Practices For Choosing a Penetration Testing Company</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2019/10/14/effects-of-malware-on-websites-infographics</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-10-13</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1569407005683-NVEN29V13JWSHLQO1U1H/image-asset.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Effects of Malware on Websites [Infographics]</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2019/10/5/is-your-secure-password-policy-actually-secur</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-10-05</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2019/10/2/me-confused-whats-the-difference-between-vulnerability-assessment-and-pen-testing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-15</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2019/9/30/a-business-owners-basic-guide-to-pen-testing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-15</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2019/9/25/bots-bots-everywhere-5-largest-ddos-attacks-in-the-history-of-the-internet</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-09-25</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2019/8/29/introduction-to-penetration-testing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-08-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1567072137076-F5AC861OZ2ZTXJ0D27Y7/Introduction+to+Penetration+Testing.jpg</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Introduction to Penetration Testing</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2019/7/30/cloud-based-mobile-application-testingwhat-should-you-focus-on</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-08-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1564463367382-U0EIQ0IEOAEFNIZS5KMR/development+process+of+your+mobile+app.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Cloud-Based Mobile Application Testing—What Should You Focus On?</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1564463389266-6SUDI4FP19OA0RAKJ9BK/image-asset.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Cloud-Based Mobile Application Testing—What Should You Focus On?</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2019/8/6/web-application-security-testing-focusing-on-certain-areas-of-web-app</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-08-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1564463134048-0S52QPY2GNMO8AYWA714/Login+Credentials.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Web Application Security Testing: Focusing on Certain Areas of Web App</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1564463056506-0EQS95COT5O0TMU2LDYL/mobile+application+penetration+test.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Web Application Security Testing: Focusing on Certain Areas of Web App</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2019/8/3/how-to-keep-your-website-safe-from-a-ddos-attack</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-08-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1564462877836-D56D8K5E4GJ8GYPF644G/image-asset.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - How to Keep Your Website Safe from a DDoS Attack</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1564462852470-LK5P3DP48A2UZE17DNNA/penetration+testing+services.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - How to Keep Your Website Safe from a DDoS Attack</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2019/7/29/mobile-app-security-tips-to-avoid-cyber-threats</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-07-29</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2019/7/29/five-reasons-your-business-needs-the-most-secure-data-protection-available</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-15</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1564402959735-DVKYT14QTWXOW7IZ8Y2L/Five+Reasons+Your+Business+Needs+The+Most+Secure+Data+Protection+Available.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Five Reasons Your Business Needs The Most Secure Data Protection Available</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2019/7/29/victim-of-a-vicious-malware-attack-heres-what-you-need-to-do</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-07-29</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2019/7/24/3-potential-security-risks-of-online-gaming</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-07-24</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2019/7/20/4-security-benefits-of-cloud-computing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-15</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2019/7/17/why-you-need-a-strong-cybersecurity-solution</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-07-17</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1563363179315-4PX4SDG7XORJCOAJOG98/image-asset.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Why You Need a Strong Cybersecurity Solution</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2019/6/10/static-vs-dynamic-code-analysis-everything-you-need-to-know</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-07-30</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2019/6/2/why-you-should-include-qa-in-your-web-app-development-process</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-06-02</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1558428495593-01A22KYJ9VZH3VQRN15M/network+vulnerability+assessment.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Why You Should Include QA in Your Web App Development Process</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2019/5/30/6-necessary-security-software-for-small-businesses</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-05-30</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1558428227507-4UBA42NAF4EPXUJ8OBHX/Spyware+are+malicious+software.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - 6 Necessary Security Software for Small Businesses</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2019/5/26/4-mobile-application-development-mistakes-to-avoid</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-05-26</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1558425853855-P3T0VJ7WGCBMSVFB3QSN/developing+a+mobile+application.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - 4 Mobile Application Development Mistakes to Avoid</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2019/5/24/the-impact-of-data-breaches-on-customer-loyalty</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-05-24</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1558425560736-21HY5TWFJ78UHFTQMRA6/internet+giant.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - The Impact of Data Breaches on Customer Loyalty</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2019/5/21/benefits-of-using-a-managed-security-service-provider-infographic</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-05-21</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1558424224211-J2WHTEHMZUP343W0RYCQ/Benefits+of+Using+A+Managed+Security+Service+Provider.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Benefits of Using A Managed Security Service Provider - Infographic</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2019/4/30/top-4-cyber-security-details-new-employees-should-be-aware-of-5kxxQ</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-04-30</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1555568710965-PA9V7D958740N1C7WOA6/instructed+to+contact+IT+administration.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Top 4 Cyber Security Details New Employees Should Be Aware Of</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2019/4/29/the-impact-data-of-breaches-on-customer-loyalty</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-04-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1556517195656-KPN38E88F4Z1MSGV2UIS/The+Impact+Data+Breaches+on+Customer+loyalty.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - The Impact Data of Breaches on Customer Loyalty (Infographic)</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2019/4/27/proactive-risk-management-making-your-business-resilient-84vvf</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-04-27</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1555567792846-KG5HV5AUICTOIPPUIKTU/KRIs+in+the+metrics.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Proactive Risk Management-Making Your Business Resilient</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2019/4/24/cybersecurity-vs-data-privacy-whats-the-difference</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-04-24</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1553683145590-YYG2178T6VBLNILIAJQL/Web+Security+Assessment+Technology.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Cybersecurity vs. Data Privacy – What’s The Difference?</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2019/4/20/latest-malwares-in-2019-that-pose-a-threat-to-your-data-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-04-20</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1553682972442-8WMJ282IE9JKWDZ8OVNZ/Ransomware.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Latest Malwares in 2019 That Pose a Threat to Your Data Security</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2019/4/13/why-network-security-is-important-for-your-business</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-04-13</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1553581353980-VLI4IHKI86PHK4LOBURS/Why+Network+Security+is+Important+For+Your+Business.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Why Network Security is Important For Your Business</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2019/4/9/steps-involved-in-web-application-vulnerability-assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-04-09</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1553580890195-KRJ11GHJ5AAIV7R1T2BT/web+application+vulnerability+assessment.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Steps Involved In Web Application Vulnerability Assessment</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2019/4/4/the-benefits-of-source-code-analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-15</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1553580694837-RU60GE13JTAXPAXBW1W9/image-asset.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - The Benefits Of Source Code Analysis</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2019/3/30/network-vulnerability-assessment-a-guide</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-03-30</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1553580434412-Q2F685J9PZ5JV4IIEGO0/Testing-+The+White+Box+Method.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Network Vulnerability Assessment: A Guide</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2019/3/26/5-common-types-of-malware</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-03-26</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1553579770838-WN9L8GTQYCE1XAL2VD4C/adware+is+a+type+of+malware.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - 5 Common Types Of Malware</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2019/3/8/ways-to-keep-your-business-information-secure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-03-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1551164990995-NQMKXH9I79UMHRW25VGB/Monitor+Computer+Equipment+Used+At+Work+-+vulnerability+scanning.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Ways To Keep Your Business Information Secure</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2019/3/5/why-network-security-is-important-for-your-business-infographic</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-03-05</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1551164377917-4DHCW1MA4RMPWP9D5C31/Why+Network+Security+Is+Important+For+Your+Business.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Why Network Security Is Important For Your Business (Infographic)</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2019/3/1/4-types-of-cyber-security-threats</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-03-01</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1551164099706-26NWKOEN0TR3ZCNGHQTD/Phishing+-+Website+%26+Web+Application+Security.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - 4 Types Of Cyber Security Threats</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2019/2/26/4-most-notorious-australian-hackers</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-02-26</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1551163516019-K9GOSLX40BFQLND7K5KS/penetration+testing+service.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - 4 Most Notorious Australian Hackers</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2019/2/1/4-effective-strategies-to-protect-web-applications-infographic</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-02-01</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1548672054185-36IHLU5SVSVYH6PQVB9Y/4+Effective+Strategies+to+Protect+Web+Applications.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - 4 Effective Strategies to Protect Web Applications | Infographic</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2019/1/30/e-commerce-security-threat-what-do-you-need-to-know-infographic</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-01-30</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1548402400567-BY4N2D4QBGE231M1LUKH/E-Commerce+Security+Threat+-What+Do+You+Need+to+Know.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - E-Commerce Security Threat -What Do You Need to Know | Infographic</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2019/1/25/3-safety-concerns-with-cloud-data-storage</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-01-25</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1548402068745-E0X9251D1Y61HKOQVMG7/image-asset.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - 3 Safety Concerns With Cloud Data Storage</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2019/1/3/understanding-the-importance-of-cloud-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-01-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1545910726134-Z4TC8ERWGMHZZ4CGCHEZ/Effective+cloud-based+solutions-+Cloud+Security.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Understanding the Importance of Cloud Security</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2018/12/31/the-differences-between-penetration-tests-audits-and-security-assessments</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-12-31</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1545910516200-R2G8VZZK1FV6BZFJO1VV/penetration+testing+services+and+network+vulnerability+assessment.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - The Differences between Penetration Tests, Audits, and Security Assessments</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2018/12/27/simple-security-vulnerabilities-putting-your-business-at-risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-12-27</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1545910368995-XYMTZ0A5GM8TR3PVRHTP/network+vulnerability+assessment+-+Australia.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Simple Security Vulnerabilities Putting Your Business at Risk</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2018/12/22/avoiding-the-major-data-loss-pitfalls</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-12-22</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1545460174691-NA430WYN1LSFGE7QXRHD/penetration+testing+services.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Avoiding the Major Data Loss Pitfalls</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2018/12/18/3-major-penetration-testing-techniques</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-12-18</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2018/12/6/application-security-why-its-important</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-12-14</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2018/12/12/how-malware-can-impact-your-business-website</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-12-12</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2018/12/6/ddos-attacks-all-you-need-to-know</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-12-06</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2018/11/27/cyber-security-what-do-the-number-say-infographic</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-11-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1543389355185-QJ03U0KX2QII0E0LNQZT/Cyber+Security-+What+do+the+Number+Say.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Cyber Security- What do the Number Say [Infographic]</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2018/10/31/heres-how-to-stop-your-network-from-being-hacked</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-10-31</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1540971449371-B0UGSXWIHFF35DOUWQGS/Here%27s+How+to+Stop+Your+Network+From+Being+Hacked.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Here's How to Stop Your Network From Being Hacked</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2018/10/29/penetration-testing-trends-you-need-to-get-behind</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-10-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1540450000170-O7HFLL9YZRHIYJOBSX6O/audits+to+secure+internet+data.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Penetration Testing Trends You Need To Get Behind</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1540450030728-PC4TJKLV3ANZ6JNZ57EW/deployment+of+a+Web+Application+Firewall+%28WAF%29.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Penetration Testing Trends You Need To Get Behind</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2018/10/25/5-ways-penetration-testing-can-help-your-business</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-10-25</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1540448719603-S1P0EXHWNSQMIPC2B1ZI/Penetration+testing.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - 5 Ways Penetration Testing Can Help Your Business</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1540448654674-6ULNJFKRA0SGV5HIHJAL/Prevents+Data+Theft+with+penetration+testing.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - 5 Ways Penetration Testing Can Help Your Business</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2018/10/9/why-timely-data-breach-detection-is-key</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-10-09</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1538132036080-KPRX49VY1LZJBWYLFVQW/Detect+Other+Loopholes+for+data+breach.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Why Timely Data Breach Detection Is Key</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2018/10/5/attention-app-developers-protect-your-source-code</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-10-05</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1538131777526-HBCKZXFHNDYS2D4W885B/Encryption+and+Monitoring.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Attention App Developers: Protect Your Source Code!</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2018/10/1/top-security-issues-app-developers-should-know-about</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-10-01</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1538131360936-REYEZ3B2WBXL84OQ7GD7/Weak+Authentication+Mechanism%27.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Top Security Issues App Developers Should Know About</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2018/9/28/benefits-of-cloud-based-testing-for-mobile-applications</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-09-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1538131122924-LUJTHKAL6H87RS6J78L3/image-asset.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Benefits of Cloud-Based Testing for Mobile Applications</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2018/9/19/mobile-application-vulnerabilities-infographic</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-09-19</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1537341411831-17EDC254JN4ADBKFB2TZ/Mobile+Application+Vulnerabilities.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Mobile Application Vulnerabilities - Infographic</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2018/9/6/how-to-keep-your-data-secure-on-cloud</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-09-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1535540973071-HSMQN7GPDSQK5GA0NK2Z/image-asset.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - How to Keep Your Data Secure On Cloud</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1535540956622-H7HVW5BK16062I1WZVJC/image-asset.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - How to Keep Your Data Secure On Cloud</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2018/9/3/signs-your-network-security-has-been-compromised</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-09-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1535540406714-NWO2PW1LQQIBL0YA7E4T/image-asset.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Signs Your Network Security Has Been Compromised</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1535540435127-YEN8YNHXETQZJ5ZR788Q/image-asset.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Signs Your Network Security Has Been Compromised</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2018/8/31/the-benefits-of-network-security-assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-08-31</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1535539976183-F2XVDME89WV5BBV9KQ68/web+security+testing.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - The Benefits of Network Security Assessment</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2018/8/29/how-hackers-attack-your-computer-systems</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-08-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1535538877062-XV8Q0F0TX7XL1CV5HXBY/Malware.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - How Hackers Attack Your Computer Systems</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1535538806992-PPBFLGB6L2C4452IN6UM/DDOS+Attack.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - How Hackers Attack Your Computer Systems</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2018/8/24/emerging-cyber-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-08-24</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1535110201819-F0BKD2RPSMPHQGE89JA5/Emerging+Cyber+Security.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Emerging Cyber Security</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2018/7/27/cyber-security-challenges-these-days-infographic</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-07-27</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1532676698764-6ZNYJ6QGYSI8TQQFYOVH/Cyber+Security+Challenges+These+Days.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Cyber Security Challenges These Days (Infographic)</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2018/6/4/cyber-security-trends-and-threats-in-2018-infograph</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-06-04</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1527308653274-GXIE3DWNX7TRYJMIJROI/Cyber+Security+Trends+and+Threats+in+2018.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Cyber Security Trends and Threats in 2018 (Infograph)</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2018/5/31/ddos-attacks-ensure-that-your-sensitive-data-stays-secure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-05-30</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1527240495975-S1H7OT6QTJJ8WVBBCBL5/image-asset.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - DDoS Attacks-Ensure That Your Sensitive Data Stays Secure</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1527240542466-63785QXYXLEN3OP04F6L/image-asset.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - DDoS Attacks-Ensure That Your Sensitive Data Stays Secure</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1527240601043-4CYBL25RBS776L6HFSEM/Picture9.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - DDoS Attacks-Ensure That Your Sensitive Data Stays Secure</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2018/5/30/the-general-data-protection-regulation-guidelines-for-businesses-in-australia</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-05-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1527240270664-EXK243ZHLCPPMFSDB4GQ/image-asset.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - The General Data Protection Regulation Guidelines For Businesses In Australia</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1527240312083-X42VI24FEMFYCDJ55OKL/image-asset.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - The General Data Protection Regulation Guidelines For Businesses In Australia</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2018/5/29/network-vulnerability-assessment-and-their-benefits-for-businesses</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-05-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1527240074952-OLKKY6DR91P38MQXGLJP/Picture3.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Network Vulnerability Assessment And Their Benefits For Businesses</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1527240121862-J74FOSTPGUMRZIJ5KS8H/image-asset.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Network Vulnerability Assessment And Their Benefits For Businesses</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2018/5/28/ensure-that-your-cloud-systems-stay-safe-and-secure-through-automation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-05-27</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1527239788415-C7RYN1H088T2CSEXAB93/Picture1.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Ensure That Your Cloud Systems Stay Safe and Secure Through Automation</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1527239878454-0OI43PKDOHWHEUIC5CMN/Picture2.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Ensure That Your Cloud Systems Stay Safe and Secure Through Automation</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2018/4/23/streamlining-your-netwrok-security-the-need-for-regular-vulnerability-assessment-infographic</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-04-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1523261224582-RL2YCHI0QTU8864E86S6/Streamlining+Your+Netwrok+Security+-+The+Need+For+Regular+Vulnerability+Assessment.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Streamlining Your Netwrok Security - The Need For Regular Vulnerability Assessment- Infographic</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2018/4/20/cryptocurrency-mining-malware-2018s-new-menace</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-04-20</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2018/4/16/secure-code-review-the-best-practices</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-05-26</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1523260276161-JVKHRF9ZWMN99CRE24OJ/security+education+program.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Secure Code Review – The Best Practices</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2018/4/12/common-and-deadly-security-mistakes-coders-make</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-04-12</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1523259916232-KLMFO3W78WMQ0504DGJC/third-party+services.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Common and Deadly Security Mistakes Coders Make</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2018/4/9/a-beginners-guide-to-ddos-attack-and-protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-16</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1523259456073-VV4VEUHLLHXY6WPEDWUV/Aim+of+DDoS+Attackers.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - A Beginner’s Guide to DDoS Attack and Protection</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2018/3/7/why-a-network-vulnerability-assessment-is-good-for-business</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-03-07</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2018/3/3/things-to-look-out-for-when-hiring-a-managed-network-security-service</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-03-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1519646685653-1Y1E2GINIDEJRLXHT1S2/network+and+data+security+needs.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Things to Look Out for When Hiring a Managed Network Security Service</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2018/2/28/web-application-firewalls-essentials-and-basics</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-02-27</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1519645927811-T14RJ61XHGLV3YD82A1Z/Data+breach+threat.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Web Application Firewalls: Essentials and Basics</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2018/2/26/5-reasons-to-invest-in-online-or-cyber-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-02-26</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1519645667356-1QOFLRXZ5RMRDPYIWOV0/invest+in+cyber+security+services.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - 5 Reasons To Invest In Online Or Cyber Security</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2018/2/22/cyber-security-stat-trends-infographic</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-02-22</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1519274528714-TX2OBQGT7LMN7H5A9ID0/Cyber+Security-++Stats+%26+Trends.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Cyber Security - Stat &amp; Trends Infographic</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2018/2/19/reasons-why-you-need-to-keep-your-business-data-safe-infographic</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-02-19</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1516004049853-QJJXXXADEMT8DWAQ1FL3/Reasons+Why+You+Need+To+Keep+Your+Business+Data+Safe.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Reasons Why You Need To Keep Your Business Data Safe - Infographic</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2018/2/15/reasons-why-mobile-app-security-testing-is-vital-infographic</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-02-14</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1516003689023-N320WZQCHZV6362X2ZRP/Reasons+Why+Mobile+App+Security+Testing+is+Vital.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Reasons Why Mobile App Security Testing is Vital -Infographic</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2018/2/1/is-cloud-hosting-secure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-02-01</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2018/1/29/protect-your-site-from-vulnerabilities-why-you-should-have-a-scan</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-01-29</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2018/1/24/predicting-2018-cyber-security-solutions</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-01-23</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2018/1/18/organising-a-risk-based-security-strategy-for-your-online-business</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-01-18</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2018/1/8/why-pci-dss-compliance-matters-to-your-business</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-01-16</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1515398795188-3C43F3UG1EPXEKWLBDKO/multi-layered+security+setup.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Why PCI DSS Compliance Matters to Your Business</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2018/1/13/the-many-benefits-of-network-vulnerability-assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-01-13</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1515398429310-3WTMBIO52A3ZZU3LJ8YM/image-asset.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - The Many Benefits of Network Vulnerability Assessment</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2018/1/10/how-to-guarantee-mobile-application-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-01-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1515397623834-C5UITUY8RNK6I0912HME/Encrypt+Your+Source+Code.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - How to Guarantee Mobile Application Security</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2018/1/8/bulk-up-on-web-application-security-by-following-these-3-tips</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-01-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1515396544383-89AHEY7J3KQ59GWIDXJN/Penetration+Testing.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Bulk Up On Web Application Security by Following These 3 Tips</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1515396509790-H5K018EYQEQSTQMRX1TU/DDOS+PROTECTION</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Bulk Up On Web Application Security by Following These 3 Tips</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2017/11/16/five-security-tips-for-your-e-commerce-website-infographic</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-01-16</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1509455200568-JBTVR1QKXEIDMCRMYNA6/Five+Security+Tips+For+Your+E-Commerce+Website.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Five Security Tips For Your E-Commerce Website - Infographic</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2017/11/13/why-usability-testing-is-so-important</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-11-12</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2017/11/8/social-media-security-some-common-threats</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-11-08</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2017/11/4/mobile-app-vulnerabilities-you-should-keep-in-mind</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-11-04</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2017/10/31/5-trends-to-watch-out-for-in-cyber-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-10-31</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1509454276844-7JWLDGLVQTFELV02Z0WE/Greater+Threats+to+Mobile+Security.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - 5 Trends to Watch Out For in Cyber Security!</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2017/10/2/data-breach-a-guide-for-mitigating-the-risks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-10-20</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1506930983038-XQOJQW9D8H3DAZILV0L2/Data+Breach-+A+Guide+For+Mitigating+The+Risks.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Data Breach- A Guide For Mitigating The Risks</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2017/10/16/web-application-security-checklist-2017-are-you-ready</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-10-16</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2017/10/11/how-well-is-the-security-testing-in-your-organisation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-10-11</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2017/10/7/how-to-improve-cyber-security-for-non-profit-organisations</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-10-07</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2017/10/2/highlighting-open-source-software-how-detrimental-it-is-for-your-company</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-15</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1506927350434-QBF1ZQK5S41EKJSZ66JB/Open+source+software.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Highlighting Open Source Software – How Detrimental It Is For Your Company</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2017/8/25/infographic-five-most-common-security-concerns-businesses-face-today</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-08-25</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1502359833180-Y8M8IL0ZNJYB2LF434UK/image-asset.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Infographic: Five Most Common Security Concerns Businesses Face Today</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2017/8/10/web-security-issues-youre-not-addressing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-08-22</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2017/8/18/conducting-web-application-testing-on-your-own-this-checklist-will-help</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-08-18</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2017/8/14/application-security-is-fraught-with-mystery-3-myths-busted</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-08-14</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2017/8/10/3-pci-compliance-mistakes-you-need-to-stop-making-today</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-08-10</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2017/7/24/web-application-mistakes-that-lead-to-security-risks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-07-24</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2017/7/21/testing-for-application-securitycan-you-skip-it</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-07-21</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2017/7/18/major-challenges-that-hamper-penetration-testing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-07-18</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2017/7/15/boost-customer-satisfaction-by-maintaining-web-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-07-15</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2017/7/12/why-choose-lean-security-for-your-web-security-testing-needs</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-07-12</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2017/7/8/simple-tips-for-security-testing-web-applications</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-07-08</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2017/7/4/how-important-is-penetration-testing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-07-04</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2017/6/30/challenges-faced-by-automated-application-security-testing-tools</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-06-30</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2017/2/28/session-hijacking-what-is-it</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-02-28</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2017/2/25/performing-a-web-vulnerability-assessment-are-you-making-these-mistakes</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-02-25</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2017/2/22/do-you-know-all-there-is-to-know-about-sql-injections</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-02-22</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2017/2/20/are-all-web-security-vulnerabilities-equally-dangerous-for-your-online-business</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-02-20</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2017/2/10/what-are-your-resolutions-for-web-applications-pen-testing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-02-10</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2017/2/9/security-compliance-and-audits-what-you-should-know</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-02-09</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2017/2/8/how-to-choose-the-right-penetration-testing-vendor</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-02-08</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2017/2/7/ask-us-difference-between-penetration-testing-security-audit-and-vulnerability-assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-02-07</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2016/10/10/mobile-security-assessment-three-points-of-focus</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-10-10</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2016/10/7/penetration-testing-should-you-go-for-automatic-or-manual-penetration-testing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-10-07</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2016/10/5/steps-to-web-application-vulnerability-assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-10-07</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2016/10/5/three-main-considerations-for-cloud-network-testing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-10-05</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2016/8/25/eliminate-the-blind-spot-on-your-web-application</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-08-25</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2016/7/14/avoid-a-costly-security-breach-with-these-essential-tips</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-07-14</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2016/6/10/your-websites-security-is-important-find-the-best-vulnerability-scanner-for-it</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-06-10</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2016/6/10/web-security-practices-the-financial-sector-must-implement-asap</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-06-10</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2016/5/5/web-security-concerns-in-2016-healthcare-under-attack</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-05-05</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2016/5/5/can-your-website-withstand-the-pressure-of-a-live-video-event</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-05-05</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2016/5/4/3-tips-for-creating-better-web-browsing-experience-for-your-customers</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-05-04</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2016/5/4/3-reasons-how-managed-security-services-can-help-save-your-business</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-05-04</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2016/4/7/top-4-application-security-issues-in-healthcare-industry</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-04-07</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2016/4/7/a-guide-to-establishing-a-successful-byod-policy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-04-07</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2016/4/7/4-tips-to-improve-security-of-financial-apps</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-04-07</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2016/4/1/byod-and-growing-security-threats</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-04-01</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2016/2/26/take-these-steps-to-further-improve-your-authenticated-vulnerability-scans</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-02-26</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2016/2/26/know-the-common-web-security-vulnerabilities-and-how-to-fix-them</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-02-26</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2016/2/26/here-are-the-mobile-security-predictions-for-the-year-2016</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-02-26</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2016/2/17/9-things-everyone-should-know-about-website-security-scans-and-why-they-are-a-must-for-all-serious-webmaster</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-15</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2016/2/17/7-simple-steps-to-protect-your-website-from-most-common-cyber-threats</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-02-16</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2016/2/17/5-shortcuts-for-choosing-the-perfect-vulnerability-scanner-in-record-time</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-02-16</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2016/2/16/5-little-known-facts-that-can-affect-web-application-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-15</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2016/2/16/the-minimalist-guide-to-mobile-application-security-why-less-can-be-more</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-02-15</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/the-future-of-penetration-testing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-15</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2016/1/15/what-to-expect-when-you-hire-a-web-application-testing-service-provider</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-01-15</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2016/1/15/top-areas-you-shouldnt-miss-while-testing-your-web-applications</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-01-15</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2016/1/15/theres-a-security-gap-within-your-organization-how-can-you-fix-that</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-01-15</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2016/1/15/what-is-a-web-application-firewall-waf</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-01-15</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2016/1/4/what-makes-penetration-testing-different-than-vulnerability-assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-15</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/12/11/your-businesss-website-just-got-hacked-here-is-what-you-should-do-now</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-01-04</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/12/11/what-measures-do-you-take-to-keep-your-businesss-web-and-mobile-applications-secure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-01-04</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/12/7/cyber-scammers-confess-every-trick-in-the-book-that-hurts-our-internet-security-part-2</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-12-10</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/12/7/cyber-scammers-confess-every-trick-in-the-book-that-hurts-our-internet-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-12-07</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/11/9/security-risks-that-small-businesses-should-know-about</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-11-09</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/11/9/here-is-how-you-can-prevent-data-breaches-in-your-company</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-11-09</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/11/9/3-reasons-why-your-business-would-benefit-from-a-mobile-application</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-11-09</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/11/3/analysing-vulnerability-scanning-reports</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-15</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1446545637291-0NMP1R3HC3ZK00DP226F/Burp+suite+sample+report</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Analysing vulnerability scanning reports</image:title>
      <image:caption>Burp suite sample report</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1446545668657-TN6144D4312NOWNNW2UO/Netsparker+sample+report</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Analysing vulnerability scanning reports</image:title>
      <image:caption>Netsparker sample report</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1446545768422-58BN3F2CNKLKMP22FHM4/Acunetix%2Bsample%2Breport.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Analysing vulnerability scanning reports</image:title>
      <image:caption>Acunetix sample report</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1446525766794-7NNRE50CTJVX0YNJ2GWP/C%3A%5CUsers%5Csecurity%5CPictures%5CTop+10+products+with+the+most+reported+vulnerabilities.+Report+by+Qualys.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Analysing vulnerability scanning reports</image:title>
      <image:caption>Top 10 products with the most reported vulnerabilities. Report by Qualys.png</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1446525922313-9LVXJ8WU40WOQIWUWPK7/Burp+suite+reporting+potential+Clickjacking+attack</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Analysing vulnerability scanning reports</image:title>
      <image:caption>Burp suite reporting potential Clickjacking attack</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1446526054691-HDT6ZAPPJMZPLD3X0SY9/Simple+risk+matrix.png</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Analysing vulnerability scanning reports</image:title>
      <image:caption>Simple risk matrix</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1446526134730-NHHK7BKK328D9W8HLTN5/Nessus+sample+report</image:loc>
      <image:title>Latest Threat Intelligence &amp; Security News - Analysing vulnerability scanning reports</image:title>
      <image:caption>Nessus sample report</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/10/20/what-is-source-code-analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-10-20</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/10/20/the-most-problematic-mobile-security-threats-part-2</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-10-20</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/10/20/the-most-problematic-mobile-security-threats-part-1</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-10-20</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/8/12/what-you-need-to-know-about-web-application-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-15</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/8/12/protecting-your-virtual-businesses-better-to-be-safe-than-sorry</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-15</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/8/12/potential-threats-to-web-applications</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-15</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/8/12/controlling-security-risks-in-cloud</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-15</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/8/12/why-online-businesses-should-go-for-managed-and-secure-cloud-hosting-services</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-15</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/8/12/the-evolution-of-e-commerce-amidst-rising-security-concerns</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-15</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/8/12/protecting-your-network-perimeter-life-on-the-edge</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-08-12</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/8/12/how-to-protect-and-secure-your-important-data-using-saas-applications</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-08-12</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/8/12/how-to-protect-your-business-from-ddos-attacks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-08-12</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/8/12/how-are-you-shielding-your-business-against-the-threats-related-to-web-applications</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-15</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/8/12/data-loss-prevention-problems-and-solutions</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-15</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/8/12/being-on-cloud-and-staying-updated-and-secure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-15</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/8/12/importance-of-web-application-security-in-business-environments</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-08-12</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/8/12/web-application-security-are-your-measures-enough</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-08-12</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/8/12/what-is-network-perimeter-and-how-to-secure-it</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-08-12</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/8/12/what-waf-managed-service-offers</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-15</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/8/12/why-you-need-ddos-protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-08-12</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/8/12/future-of-cloud-managed-services</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-08-12</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/8/12/get-your-business-into-the-cloud</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-15</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/tips-to-ensure-cloud-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-15</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/8/12/top-cloud-computing-apps</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-15</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/8/12/amazon-aws-security-mistakes-to-avoid</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-15</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/8/12/hidden-backdoors-into-your-wordpress-page</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-15</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/8/12/cloud-security-tools-which-are-worth-it</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-15</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/8/12/wordpress-security-risks-assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-15</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/8/12/amazon-aws-security-risks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-15</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/4/26/another-ssltls-vulnerability</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-15</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/4/21/magento-vulnerability-check-your-web-sites-now</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-15</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/2015/4/20/ssl-3-is-dead-killed-by-the-poodle-attack</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-15</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/category/mobile+app+security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/category/Network+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/category/Pen+Testing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/category/Monthly+Threat+Briefing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/category/Weekly+Vulnerability+Deep</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/category/Daily+Threat+Briefing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/category/Weekly+Vuln+Deep+Dive</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/category/Weekly+Threat+Briefing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/tag/DDoS+Protection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/tag/Cloud+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/tag/wordpress</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/tag/SQL+injection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/tag/blog</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/tag/vulnerability+assessment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/tag/ssl</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/tag/SaaS+Applications</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/tag/Cloud+Hosting+Services</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/tag/eCommerce</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/tag/Web+Application+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/tag/Cloud+Computing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/tag/DDoS+attacks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/tag/Evolution+of+E-Commerce</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/tag/Managed+Security+Services</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/tag/Technology</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/tag/hackers</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/tag/remote+exploit</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/tag/Cloud+Based+Security+Services</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/tag/Cloud+Apps+Risks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/tag/penetration+testing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/tag/mobile+application+security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/tag/magento</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/tag/Network+Perimeter+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/tag/Web+Application+Penetration+Testing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/tag/Security+Risks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/tag/Web+Application+Firewalls</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/tag/vulnerability+scanner</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/tag/wordpress+security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/tag/Virtual+Business</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/tag/OWASP</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/tag/Amazon+AWS</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/tag/Web+Applications</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/tag/pentest</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/blog/tag/WAF</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/new-home</loc>
    <changefreq>daily</changefreq>
    <priority>1.0</priority>
    <lastmod>2025-12-11</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/a32a40db-12d1-4bf5-ba66-56a5076482b3/purple-abstract-blur-bokeh.jpg</image:loc>
      <image:title>Expert Penetration Testing Services in Sydney | Lean Security</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/2b194e02-56c2-46ad-b3af-7183b1cb990c/Our+mission</image:loc>
      <image:title>Expert Penetration Testing Services in Sydney | Lean Security</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/417f90e9-ad7d-43e8-b5a7-cf230c207c73/Our+Services</image:loc>
      <image:title>Expert Penetration Testing Services in Sydney | Lean Security</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/9467d203-9dcb-4095-8cf0-2983abdb6af6/Our+company</image:loc>
      <image:title>Expert Penetration Testing Services in Sydney | Lean Security</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/4e7aa6e8-da2f-4720-b541-db25f185e7d4/Our+philosophy.png</image:loc>
      <image:title>Expert Penetration Testing Services in Sydney | Lean Security</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1539258201587-OSIQ4WEVWBWVQZFYB0NT/icon4.png</image:loc>
      <image:title>Expert Penetration Testing Services in Sydney | Lean Security - Penetration Testing</image:title>
      <image:caption>We test your systems, websites, and apps by simulating a real cyber-attack. This hands-on testing finds security holes that automated tools often miss, giving you a true picture of your security. Read More</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1539258262791-68FL3ZE4FN8XMXY2TLYL/icon5.png</image:loc>
      <image:title>Expert Penetration Testing Services in Sydney | Lean Security - Source code security assessment</image:title>
      <image:caption>Your application's code is its foundation. We manually review your source code line by line to find hidden vulnerabilities, logical flaws, and security issues before they can be exploited by attackers. Read More</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1539258363554-K2UAZWV3580A4SBSCY27/icon6.png</image:loc>
      <image:title>Expert Penetration Testing Services in Sydney | Lean Security - Threat Modelling</image:title>
      <image:caption>Before you write a line of code, we help you think like an attacker. We work with your development team to map out potential threats to a new system and plan its defences from the very start. Read More</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1546953181555-4TD2PPGHU818ORNF4C3O/icon1.png</image:loc>
      <image:title>Expert Penetration Testing Services in Sydney | Lean Security - AI Pen Testing and Red Teaming</image:title>
      <image:caption>Go beyond standard tests. Red Teaming is a full-scale attack simulation against your organisation to test your people, processes, and technology. We also specialise in testing AI systems, finding unique vulnerabilities in machine learning models. Read More</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1546953875873-736W7XYGQ3MCPQGQTDQE/icon2.png</image:loc>
      <image:title>Expert Penetration Testing Services in Sydney | Lean Security - IoT Pen Testing</image:title>
      <image:caption>From smart office devices to industrial sensors, connected devices are a common target. We test your "Internet of Things" hardware, firmware, and communication methods to find weaknesses before they're used against you. Read More</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1546953888722-X59PCHFF35VJ023R0GMZ/icon3.png</image:loc>
      <image:title>Expert Penetration Testing Services in Sydney | Lean Security - API Penetration Testing</image:title>
      <image:caption>APIs are the backbone of modern applications, handling all the communication. We test these critical connections to find security flaws that could lead to data breaches or allow attackers to take control of your services. Read More</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/vulnerability-deep-dives</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-11-18</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1763459339335-ROSMS40VM1NH0OQ6JZWY/image-asset.png</image:loc>
      <image:title>Vulnerability Deep Dives - API Security</image:title>
      <image:caption>(BOLA, BFLA, Mass Assignment, JWT Flaws)</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1763459339335-ROSMS40VM1NH0OQ6JZWY/image-asset.png</image:loc>
      <image:title>Vulnerability Deep Dives - API Security</image:title>
      <image:caption>(BOLA, BFLA, Mass Assignment, JWT Flaws)</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1763459364789-O85C9IIOW705IFQQNICG/Gemini_Generated_Image_jjcrnujjcrnujjcr.png</image:loc>
      <image:title>Vulnerability Deep Dives - Cloud Security</image:title>
      <image:caption>(AWS S3 Leaks, Azure IAM Misconfigurations, GCP Container Escapes)</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1763459417880-IBMCDUXY5T94MZGHQIWT/Gemini_Generated_Image_eodfl0eodfl0eodf.png</image:loc>
      <image:title>Vulnerability Deep Dives - OTT Security</image:title>
      <image:caption>(Insecure Data Storage, Root/Jailbreak Detection Bypass, Hardcoded API Keys)</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1763459447433-QN8YINTKVA5U8AAYUZFS/Gemini_Generated_Image_k1h08hk1h08hk1h0.png</image:loc>
      <image:title>Vulnerability Deep Dives - Web Application</image:title>
      <image:caption>(OWASP Top 10, Business Logic Errors, XSS, SQLi)</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/services</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-12-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1765023848336-I7WDT4UJOQ2B1RBBAA51/source_code_security_icon_2025_sml.png</image:loc>
      <image:title>Services - Source code security assessment</image:title>
      <image:caption>Your application's code is its foundation. We manually review your source code line by line to find hidden vulnerabilities, logical flaws, and security issues before they can be exploited by attackers.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1765023848336-I7WDT4UJOQ2B1RBBAA51/source_code_security_icon_2025_sml.png</image:loc>
      <image:title>Services - Source code security assessment</image:title>
      <image:caption>Your application's code is its foundation. We manually review your source code line by line to find hidden vulnerabilities, logical flaws, and security issues before they can be exploited by attackers.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1765023845276-6XPFHF8DF2F03FNRCQW5/threat_modelling_icon_2025_sml.png</image:loc>
      <image:title>Services - Threat Modelling</image:title>
      <image:caption>Before you write a line of code, we help you think like an attacker. We work with your development team to map out potential threats to a new system and plan its defences from the very start.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1765023905914-V3D5Y0SQUDFGS1PGSB0W/api_penetration_testing_icon_2025_sml.png</image:loc>
      <image:title>Services</image:title>
      <image:caption>API Penetration Testing APIs are the backbone of modern applications, handling all the communication. We test these critical connections to find security flaws that could lead to data breaches or allow attackers to take control of your services.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1765023852884-ZRSUU61793WME9HHRMOI/ai_pentesting_red_teaming_icon_2025_sml.png</image:loc>
      <image:title>Services - AI Pen Testing and Red Teaming</image:title>
      <image:caption>Go beyond standard tests. Red Teaming is a full-scale attack simulation against your organisation to test your people, processes, and technology. We also specialise in testing AI systems, finding unique vulnerabilities in machine learning models.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1765023849550-FL8M0VOUWHZA2U43166P/iot_pentesting_icon_2025_sml.png</image:loc>
      <image:title>Services - IoT Pen Testing</image:title>
      <image:caption>From smart office devices to industrial sensors, connected devices are a common target. We test your "Internet of Things" hardware, firmware, and communication methods to find weaknesses before they're used against you.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1765023851369-5LVYXSZ2HN9GSE9WE4GH/penetration_testing_icon_2025_sml.png</image:loc>
      <image:title>Services - Penetration Testing</image:title>
      <image:caption>We test your systems, websites, and apps by simulating a real cyber-attack. This hands-on testing finds security holes that automated tools often miss, giving you a true picture of your security</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/sitemap</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2018-07-17</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/application-penetration-test</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-08-19</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1427849704494-RWRXWI44LRRP48REDZDC/Buisness-11.jpg</image:loc>
      <image:title>Web Application Penetration Testing Services | Lean Security</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/about-us</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-05-27</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1453184123203-XB9GN7Q68GJY5LY2RCLK/5686-abstract-background-of-blue-rays-pv.jpg</image:loc>
      <image:title>About Us</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/partner-with-us</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-08-04</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1434273627670-V6EKD22TFKSKREWQPTEL/10006007.JPG</image:loc>
      <image:title>Partners</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/static-source-code-analysis</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-08-19</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1429575945690-BG5USMNTHS927PONL5ZK/13334048894_6e8b421c4e_o.jpg</image:loc>
      <image:title>Static Source Code Analysis Service | Secure Code Review</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/contact-us</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-02-12</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1429778741870-5MRUESEAQ4EP4D21E83J/Dollarphotoclub_64287959.jpg</image:loc>
      <image:title>Contact Us</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/source-code-analysis</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-11-16</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1442351082759-14ATNS9CHDTRGD0UINKB/source_code_scanning.jpg</image:loc>
      <image:title>Static Testing and Source Code Analysis</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1446545478690-J4ZIP80ZBS1KUPOHXKB9/Static+Source+Code+Analysis+screenshot</image:loc>
      <image:title>Static Testing and Source Code Analysis</image:title>
      <image:caption>Example of Static Source Code Analysis findings</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/mobileapptesting</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2016-01-14</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1429778417661-HPP315GDBUHJSWF6H0PU/Dollarphotoclub_77020857.jpg</image:loc>
      <image:title>Mobile Application Security Testing</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1429768872714-BAAQZNDWZO3E82OQKSOH/image-asset.png</image:loc>
      <image:title>Mobile Application Security Testing</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/mobile-application-security-testing-prices</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-08-19</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1455516579208-YY5AHJEHBDPKILYXFU42/background-805060.jpg</image:loc>
      <image:title>Mobile Application Penetration Testing (iOS &amp; Android) | Lean Security</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/infrastructure-penetration-test</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-08-19</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1455516678742-R2IKVE37TFNY3AFKCNQH/ellipse-784354.jpg</image:loc>
      <image:title>Infrastructure Penetration Testing (External &amp; Internal) | Lean Security</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/penetration-testing-services</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-11-15</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1442363600946-43M2JXOBRM377QOIA0ZN/penetration+testing+services.png</image:loc>
      <image:title>Expert Web Application Pen Testing Services | Australia</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/8d12deb1-dac6-409d-bce0-b529ae1b6b67/Web+App+Pen+Testing</image:loc>
      <image:title>Expert Web Application Pen Testing Services | Australia - Web App Pen Testing</image:title>
      <image:caption>Need web app pen testing for a tender or compliance in Australia? We provide expert reports to satisfy regulatory &amp; audit requirements</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/ecommerce-security</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-07-07</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1439187139466-RYIY2YJEKSSXWMLNHP8D/ecommerce.jpg</image:loc>
      <image:title>eCommerce Security Australia | Protecting Your Online Store &amp; Customer Data</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/why-us</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-09-27</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1433937947857-QFSXO03VXEIS1I7A7Y0A/Dollarphotoclub_77267238.jpg</image:loc>
      <image:title>Why Partner With Lean Security? | Expert Pen Testing Sydney</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/continuous-monitoring-service</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-05-27</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1442383322327-Y70LIU0SMV9LU0TRPUT2/continious_monitoring_service.jpg</image:loc>
      <image:title>Managed Attack Surface Management Australia | MASM Services Sydney</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/saas-application-security</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-01</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/acd1ef9e-3773-44e7-9717-8183fe6c7eee/saas_cyber_security_services.png</image:loc>
      <image:title>SaaS Security Australia | From Startup to Enterprise-Ready</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/mobile-application-assessment</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-11-15</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1442363286830-CSGFDV033784FDXCCI5F/mobile+application+security.jpg</image:loc>
      <image:title>Mobile Application Penetration Test</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/6feb3630-17ed-40f0-8a38-23720056e06d/Gemini_Generated_Image_889rfx889rfx889r.png</image:loc>
      <image:title>Mobile Application Penetration Test - Mobile App Pen Testing</image:title>
      <image:caption>Expert mobile app pen testing in Australia. We find critical API &amp; backend flaws scanners miss. Get a detailed report for PCI, OWASP &amp; GRC compliance.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/directory-traversal</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-11-17</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1763355070501-VA8ZFEOFGR9ODA4YSSS7/unsplash-image-DdjQaVxAqRA.jpg</image:loc>
      <image:title>Directory Traversal &amp; Directory Attack: What It Is &amp; Prevention</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/ldap-injection</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-11-15</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/crlf-injection</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-11-15</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/online-gaming-applications-security</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-08-04</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1451881494890-1IOZ4N41IW5OW4UV57KH/9090-an-abstract-blue-background-pv.jpg</image:loc>
      <image:title>Online Gaming Security</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/insecure-cryptographic-storage</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-11-15</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/financial-application-security</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-11-18</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/3e021603-a777-43b4-af49-d77e0af00852/FinTech+and+Payments+Penetration+Testing+2025.png</image:loc>
      <image:title>Penetration Testing for Financial Services &amp; FinTech</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/mobile-top-10-security-issues</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2015-12-29</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/buffer-overflow</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-11-16</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1763335355900-ONLBHMMK6BGM3E28R9SX/unsplash-image-DjlKxYFJlTc.jpg</image:loc>
      <image:title>Buffer Overflows Explained: Mechanics, Risks &amp; Prevention</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/healthcare-applications-security</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-07-07</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1fa04e91-6d62-4178-a1aa-e3a9aec83432/Gemini_Generated_Image_r449iqr449iqr449.png</image:loc>
      <image:title>Healthcare Application Security | Patient Trust &amp; Compliance in Australia</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/internet-of-things-iot-security</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-07-07</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/8fa3b091-5342-487b-abb9-1f270e6a404c/Gemini_Generated_Image_lm7ds3lm7ds3lm7d.png</image:loc>
      <image:title>IoT Security Australia | Protecting Your Connected Devices in 2025</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/failure-to-restrict-url</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-11-15</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/application-security-knowledge-base</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-11-18</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1763452171488-L6VFEW4AFMGRNZBZWX92/unsplash-image-DdjQaVxAqRA.jpg</image:loc>
      <image:title>Knowledge Base: Web App Security &amp; OWASP Top 10 (2025 Edition)</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/insufficient-transport-layer-protection</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-11-15</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/penetration-test-report-sample</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-02-12</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/what-is-sql-injection</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-11-15</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/digital-media-security</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-08-04</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1451882752999-7AZSAR5KT1V79HNMH1AT/background-waves-1445353418_40.jpg</image:loc>
      <image:title>Penetration Testing for Digital Media &amp; Streaming | Lean Security</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/malicious-code-injection</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-11-15</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/cross-site-scripting</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-11-16</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1763335869429-5ZSDKQ8QPDQSEOVI2KHG/unsplash-image-DjlKxYFJlTc.jpg</image:loc>
      <image:title>What is Cross Browser Scripting? Stored, Reflected &amp; DOM XSS Explained</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/cross-site-request-forgery</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-11-15</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/terms-and-conditions</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-10-08</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/web-services-penetration-test</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-11-13</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1488268377432-S5UZ847MX37CRILMICMJ/light-blue-wallpaper-7846-8139-hd-wallpapers-1024x576.jpg</image:loc>
      <image:title>API Penetration Testing Australia | OWASP API Security | Secure Your APIs</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/69949929-6c9c-4f22-aac1-88f15f5c0d06/Gemini_Generated_Image_k1h08hk1h08hk1h0.png</image:loc>
      <image:title>API Penetration Testing Australia | OWASP API Security | Secure Your APIs - API Penetration Testing</image:title>
      <image:caption>Expert API penetration testing in Australia. Our Sydney team finds critical OWASP API Top 10 flaws like BOLA &amp; Broken Authentication</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/iot-penetration-test</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-11-13</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1488268363050-CHVBOTA490JX1KRFCVN3/light-blue-wallpaper-7846-8139-hd-wallpapers-1024x576.jpg</image:loc>
      <image:title>IoT Penetration Testing Australia | Secure Connected Devices | Specialist IoT Security Services</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/b82875b1-c4f6-490a-91fc-49a4af55f1c3/Gemini_Generated_Image_nnwqv6nnwqv6nnwq.png</image:loc>
      <image:title>IoT Penetration Testing Australia | Secure Connected Devices | Specialist IoT Security Services - Secure Connected Devices</image:title>
      <image:caption>Expert IoT penetration testing in Australia. We find hardware, firmware, API &amp; communication flaws in connected devices. Secure your IoT ecosystem</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/api-security-assessment</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-08-19</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1488269786465-VRF4KHK1EFNPUZQO1HS0/light-blue-wallpaper-7846-8139-hd-wallpapers-1024x576.jpg</image:loc>
      <image:title>API Penetration Testing Service | REST, GraphQL &amp; SOAP | Lean Security</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/security-risks-assessment-and-consulting</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-11-16</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1489198141293-2KO6QRWHG1AX2M2PQX45/9090-an-abstract-blue-background-pv.jpg</image:loc>
      <image:title>Security Risks Assessments</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/external-network-penetration-test</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-11-15</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1489201699806-78IAI0WJJNJS7GXL2NAT/9090-an-abstract-blue-background-pv.jpg</image:loc>
      <image:title>External Network Penetration Testing Australia</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/2d5befb5-8307-4d6b-bea5-2715fa013390/External+Network+Penetration+Test</image:loc>
      <image:title>External Network Penetration Testing Australia - Secure Your Attack Surface</image:title>
      <image:caption>Expert external network pen testing in Australia. We find critical firewall, VPN, &amp; unpatched server flaws an attacker would use.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/threat-modelling-service-pricing</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-08-19</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1496656073824-F9AYK9KKSY67JXXRPJDH/network+vulnerability+scanner.jpg</image:loc>
      <image:title>Threat Modelling Service</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/thankyou</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2019-06-28</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/ai-penetration-test</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-11-13</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1488268363050-CHVBOTA490JX1KRFCVN3/light-blue-wallpaper-7846-8139-hd-wallpapers-1024x576.jpg</image:loc>
      <image:title>AI Penetration test</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/21a1e96c-2596-44f8-9d70-a6e474c65955/AI+Penetration+Testing+Services</image:loc>
      <image:title>AI Penetration test - AI Penetration Testing: Secure LLMs</image:title>
      <image:caption>Protect your AI and LLMs from prompt injection &amp; data poisoning. Our expert Sydney-based team provides AI penetration testing based on the OWASP Top 10</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/ai-red-teaming</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-11-15</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1488268377432-S5UZ847MX37CRILMICMJ/light-blue-wallpaper-7846-8139-hd-wallpapers-1024x576.jpg</image:loc>
      <image:title>AI Red Teaming Sydney | Adversarial AI Security Testing Australia | 2025</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/908bc21f-db55-47a7-a4e9-8795a4b5bc2f/AI+Red+Teaming</image:loc>
      <image:title>AI Red Teaming Sydney | Adversarial AI Security Testing Australia | 2025 - AI Red Teaming: Test Your AI Defences</image:title>
      <image:caption>Is your AI resilient? Our AI Red Teaming service in Sydney simulates sophisticated attacks to test your defences, detection, and response.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/threat-modelling-service</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-07-07</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1488268363050-CHVBOTA490JX1KRFCVN3/light-blue-wallpaper-7846-8139-hd-wallpapers-1024x576.jpg</image:loc>
      <image:title>Threat Modelling for ISO 27001 &amp; Client Compliance | Secure SDLC Services Australia</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/145ee1d4-b968-4a81-a699-e39efdd2c00a/Threat+Modelling+Service</image:loc>
      <image:title>Threat Modelling for ISO 27001 &amp; Client Compliance | Secure SDLC Services Australia - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/education-edtech</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-01</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/65ae9956-4fcc-4d67-8d07-f5c8b8a20e93/Education_EdTech_penetration_testing.png</image:loc>
      <image:title>Education &amp; EdTech</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/government-public-sector</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-01</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/30874cc6-c8b4-446b-9c65-ba3e6f4e651e/public_sector_penetration_testing.png</image:loc>
      <image:title>Government Penetration Testing &amp; ISM Compliance</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/critical-infrastructure-industrial-otics</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-08-04</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/a32a40db-12d1-4bf5-ba66-56a5076482b3/purple-abstract-blur-bokeh.jpg</image:loc>
      <image:title>OT &amp; ICS Penetration Testing for Critical Infrastructure | Lean Security</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/cloud-security-penetration-test-aws-azure-gcp</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-08-19</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1427849704494-RWRXWI44LRRP48REDZDC/Buisness-11.jpg</image:loc>
      <image:title>Cloud Security Penetration Test (AWS, Azure, GCP) | Lean Security</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/strategic-threat-report-the-akirasonicwall-campaign</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-09-15</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/d537c57a-2688-4f3d-b2e4-ece39aab5112/CVE-2024-40766.png</image:loc>
      <image:title>Strategic Threat Report: The Akira-SonicWall Campaign and its Implications for Australian Businesses - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/fe74e933-0535-459c-bf6f-6983855375f7/Akira+Ransomware+TTPs.png</image:loc>
      <image:title>Strategic Threat Report: The Akira-SonicWall Campaign and its Implications for Australian Businesses - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/669feff8-97c4-46ca-8553-7b87798ceef9/Australian+Ransomware+Reporting+Obligations+Checklist.png</image:loc>
      <image:title>Strategic Threat Report: The Akira-SonicWall Campaign and its Implications for Australian Businesses - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/ott-penetration-testing</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-11-18</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/d7dd5829-9fe4-4e60-8d84-0e552a21b213/Gemini_Generated_Image_9zmu6z9zmu6z9zmu.png</image:loc>
      <image:title>OTT penetration testing</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/top-10-ott-platform-vulnerabilities</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-11-16</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/db49f63a-dd7d-4095-a156-8bf60a728e26/Gemini_Generated_Image_f6zsotf6zsotf6zs.png</image:loc>
      <image:title>Top 10 OTT Platform Vulnerabilities</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/69f49e93-07a1-48f4-84ca-bd0c8843bcff/Top+10+Cybersecurity+Risks+in+OTT+%26+Streaming+Platforms.png</image:loc>
      <image:title>Top 10 OTT Platform Vulnerabilities - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/bespoke-threat-advisory-service-australia</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-11-15</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/73a87ab6-7b41-403c-b111-76c039ce6dd3/Gemini_Generated_Image_bkgsq9bkgsq9bkgs.png</image:loc>
      <image:title>Bespoke Threat Advisory Service</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/adversary-simulation-red-purple-teaming</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-11-15</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/a32a40db-12d1-4bf5-ba66-56a5076482b3/purple-abstract-blur-bokeh.jpg</image:loc>
      <image:title>Adversary Simulation (Red &amp; Purple Teaming)</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/99401711-d31f-4b0c-aae6-c42e4ad33585/Adversary+Simulation+%28Red+%26+Purple+Teaming%29.png</image:loc>
      <image:title>Adversary Simulation (Red &amp; Purple Teaming) - Adversary Simulation (Red &amp; Purple Teaming)</image:title>
      <image:caption>Go beyond pen testing. Test your team's real-world detection &amp; response with our expert Red Teaming &amp; Purple Teaming services.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/knowledge-base</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-01</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/api-penetration-testing-services-australia-owasp-top-10</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-11-18</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1763455059716-OA9VNVUBKJMREWKKSFQF/unsplash-image-DdjQaVxAqRA.jpg</image:loc>
      <image:title>API Penetration Testing Services Australia | 2025 OWASP Top 10 Experts</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/cloud-security-penetration-testing-aws-azure-gcp</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-11-18</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/executive-cyber-warfare-simulation-incident-response-testing</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-26</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1442352530160-GTNMADD29LCUQJJR3B3W/9090-an-abstract-blue-background-pv.jpg</image:loc>
      <image:title>Executive Cyber Warfare Simulation | Incident Response Testing</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/ed09b09d-183d-4037-b1d2-a7cf0025f223/cyber+war+room.png</image:loc>
      <image:title>Executive Cyber Warfare Simulation | Incident Response Testing - Next-Gen Cyber Warfare &amp; Executive Simulation</image:title>
      <image:caption>Lean Security’s Next-Gen Cyber Warfare &amp; Executive Simulation replaces outdated training with a premium, automated platform that plunges your team into a highly realistic, gamified cyber crisis. We stress-test your executives, your communication lines, and your Incident Response (IR) plan in real-time.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/vciso-services</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-01</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/81ca9c4b-92f4-4312-a486-ebfda6696bec/vciso_services_australia.png</image:loc>
      <image:title>Virtual CISO (vCISO) Services - Virtual CISO (vCISO) service</image:title>
      <image:caption>Lean Security’s Virtual CISO (vCISO) service provides your business with fractional, on-demand executive security leadership. We help you optimise your security investments, achieve regulatory compliance, and build a cyber security program that enables business growth rather than blocking it.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/penetration-testing-as-a-service-ptaas</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-01</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/b224c6e8-6e2e-4f84-a84e-30bd044375e9/pen_test_as_a_service_australia_ptaas.png</image:loc>
      <image:title>Penetration Testing as a Service (PTaaS) - Penetration Testing as a Service (PTaaS)</image:title>
      <image:caption>Lean Security’s Penetration Testing as a Service (PTaaS) bridges the gap between fast-paced DevOps and rigorous security. We provide continuous, on-demand manual penetration testing integrated directly into your software development lifecycle (SDLC). Get real-time access to senior penetration testers, continuous vulnerability discovery, and actionable remediation advice—all delivered through a streamlined, subscription-based platform.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/proptech-real-estate</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-01</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/fbb7dce6-ab8d-499b-9c0f-513d60556cd1/proptech_real_estate_security.png</image:loc>
      <image:title>PropTech &amp; Real Estate Cyber Security | Penetration Testing &amp; BEC Defense</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/c4606799-c743-46dc-a117-65f9afc6d2d3/proptech_real_estate_security_full.png</image:loc>
      <image:title>PropTech &amp; Real Estate Cyber Security | Penetration Testing &amp; BEC Defense - Cyber Security for PropTech &amp; Real Estate</image:title>
      <image:caption>Lean Security provides specialised penetration testing and strategic cyber security services designed specifically for the unique architecture and high-stakes financial workflows of PropTech platforms and real estate networks.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/application-penetration-test-prices</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2017-03-11</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/application-penetration-test-prices/app-code-cloud-security-bundle</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-17</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/759aa1b8-4ec2-4a37-8638-e14ca84b7d5e/Gemini_Generated_Image_690g8o690g8o690g.png</image:loc>
      <image:title>Application Penetration Test - Comprehensive App, Code, &amp; Cloud Security Bundle - Gemini_Generated_Image_690g8o690g8o690g.png</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/application-penetration-test-prices/event-driven-ptaas-continuous-penetration-testing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-17</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/ace1e1ef-7988-4257-a3e3-d0cfa5764c3a/ptaas_pen_test_as_a_service.png</image:loc>
      <image:title>Application Penetration Test - Event-Driven Penetration Testing as a Service (PTaaS) - ptaas_pen_test_as_a_service.png</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/application-penetration-test-prices/app-pen-test-source-code-review-bundle</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-17</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/30480981-ca67-490d-a00e-03e58c129590/Gemini_Generated_Image_z2g2soz2g2soz2g2.png</image:loc>
      <image:title>Application Penetration Test - Comprehensive App &amp; Code Security Bundle - Gemini_Generated_Image_z2g2soz2g2soz2g2.png</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/application-penetration-test-prices/web-application-penetration-test-for-compliance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-17</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/c4cb7620-c18a-4eee-976a-d0c32434eb12/Gemini_Generated_Image_hvg5sdhvg5sdhvg5.png</image:loc>
      <image:title>Application Penetration Test - Web Application Penetration Test</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/application-penetration-test-prices/web-application-penetration-test-for-compliance-sghgw</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-17</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/84179186-efc0-42b7-949e-15e96f3df224/Gemini_Generated_Image_so259sso259sso25+%281%29.png</image:loc>
      <image:title>Application Penetration Test - Thick Client Penetration Test</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/static-source-code-analysis-1</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2017-10-22</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/static-source-code-analysis-1/on-demand-source-code-analysys</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-17</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/ed1a5d7b-1ab7-4b44-b172-2f00171fb0ac/Gemini_Generated_Image_dgpfbadgpfbadgpf.png</image:loc>
      <image:title>Static Source Code Analysis - Static Source Code Analysis Package</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/mobile-application-testing</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2015-12-22</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/mobile-application-testing/premium-mobile-application-penetration-test-mm4h2</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-17</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/0595bd23-e2c5-4d54-ba6a-056b015b9ca8/Gemini_Generated_Image_a0tbfda0tbfda0tb.png</image:loc>
      <image:title>Mobile Application Testing - Mobile Application Penetration Test Package</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/network-penetration-tests</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-08-19</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/network-penetration-tests/external-network-penetration-test</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-17</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/32b70936-a373-42b8-8df9-1f9681e5e3e1/Gemini_Generated_Image_v3dhatv3dhatv3dh.png</image:loc>
      <image:title>Infrastructure Penetration Test - External Infrastructure Penetration Test</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/network-penetration-tests/external-network-penetration-test-l5cd8</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-17</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/8a02fffe-6c40-47d3-89cb-1f9be6478fd4/Gemini_Generated_Image_cur0otcur0otcur0.png</image:loc>
      <image:title>Infrastructure Penetration Test - Internal Infrastructure Penetration Test</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/web-services-penetration-test-1</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-11-15</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/1488269503486-9OBEUIO51NVCRBDTC0NX/light-blue-wallpaper-7846-8139-hd-wallpapers-1024x576.jpg</image:loc>
      <image:title>API Security Assessment</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/web-services-penetration-test-1/web-service-penetration-test-tier-1</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-17</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/75cac703-ac0d-49b0-889f-d9ddcc784cf5/Gemini_Generated_Image_mb7nammb7nammb7n.png</image:loc>
      <image:title>API Security Assessment - API Security Assessment</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/security-risks-assessment-and-consulting-1</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2019-02-09</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/security-risks-assessment-and-consulting-1/threat-modelling</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-17</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/e53264ec-5888-444e-8604-f78d4e6d78b5/Gemini_Generated_Image_hb8rk2hb8rk2hb8r.png</image:loc>
      <image:title>Security Risks Assessment and Consulting - Threat Modelling Service</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/cloud-infrastructure-security</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2017-06-05</lastmod>
  </url>
  <url>
    <loc>https://www.leansecurity.com.au/cloud-infrastructure-security/cloud-security-penetration-test-aws-azure-gcp</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-17</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5516199be4b05ede7c57f94f/07ec0753-3f7d-4133-8d50-586f3b7c2ce6/Gemini_Generated_Image_42g8rh42g8rh42g8.png</image:loc>
      <image:title>Cloud Infrastructure Security - Cloud Security Penetration Test (AWS, Azure, GCP)</image:title>
    </image:image>
  </url>
</urlset>

