<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
  xmlns:xhtml="http://www.w3.org/1999/xhtml">

  <url>
    <loc>https://thethreatneuron.in/blog/ai-device-code-phishing-bypass-mfa-attacks-2026/</loc>
    <lastmod>2026-04-07T18:00:00+05:30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://thethreatneuron.in/tags/ai-phishing/</loc>
    <lastmod>2026-04-07T18:00:00+05:30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://thethreatneuron.in/blog/</loc>
    <lastmod>2026-04-07T18:00:00+05:30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://thethreatneuron.in/categories/cybersecurity/</loc>
    <lastmod>2026-04-07T18:00:00+05:30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://thethreatneuron.in/tags/device-code-phishing/</loc>
    <lastmod>2026-04-07T18:00:00+05:30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://thethreatneuron.in/tags/enterprise-security/</loc>
    <lastmod>2026-04-07T18:00:00+05:30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://thethreatneuron.in/tags/identity-security/</loc>
    <lastmod>2026-04-07T18:00:00+05:30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://thethreatneuron.in/tags/mfa-bypass/</loc>
    <lastmod>2026-04-07T18:00:00+05:30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://thethreatneuron.in/tags/phishing-as-a-service/</loc>
    <lastmod>2026-04-07T18:00:00+05:30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://thethreatneuron.in/</loc>
    <lastmod>2026-04-07T18:00:00+05:30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://thethreatneuron.in/tags/ai-infrastructure/</loc>
    <lastmod>2026-04-07T14:00:00+05:30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://thethreatneuron.in/tags/credential-theft/</loc>
    <lastmod>2026-04-07T14:00:00+05:30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://thethreatneuron.in/tags/litellm/</loc>
    <lastmod>2026-04-07T14:00:00+05:30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://thethreatneuron.in/blog/litellm-supply-chain-attack-pypi-compromise-ai-systems-2026/</loc>
    <lastmod>2026-04-07T14:00:00+05:30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://thethreatneuron.in/tags/open-source-security/</loc>
    <lastmod>2026-04-07T14:00:00+05:30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://thethreatneuron.in/tags/pypi-security/</loc>
    <lastmod>2026-04-07T14:00:00+05:30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://thethreatneuron.in/tags/supply-chain-attack/</loc>
    <lastmod>2026-04-07T14:00:00+05:30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://thethreatneuron.in/tags/agentic-ai/</loc>
    <lastmod>2026-04-07T10:00:00+05:30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://thethreatneuron.in/blog/ai-agent-hijacking-autonomous-systems-attacks-2026/</loc>
    <lastmod>2026-04-07T10:00:00+05:30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://thethreatneuron.in/tags/ai-agent-security/</loc>
    <lastmod>2026-04-07T10:00:00+05:30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://thethreatneuron.in/tags/autonomous-agents/</loc>
    <lastmod>2026-04-07T10:00:00+05:30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://thethreatneuron.in/tags/llm-attacks/</loc>
    <lastmod>2026-04-07T10:00:00+05:30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://thethreatneuron.in/tags/prompt-injection/</loc>
    <lastmod>2026-04-07T10:00:00+05:30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://thethreatneuron.in/tags/red-teaming/</loc>
    <lastmod>2026-04-07T10:00:00+05:30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://thethreatneuron.in/categories/ai/</loc>
    <lastmod>2026-04-04T00:00:00+00:00</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://thethreatneuron.in/tags/ai-safety/</loc>
    <lastmod>2026-04-04T00:00:00+00:00</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://thethreatneuron.in/tags/llm-security/</loc>
    <lastmod>2026-04-04T00:00:00+00:00</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://thethreatneuron.in/tags/owasp/</loc>
    <lastmod>2026-04-04T00:00:00+00:00</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://thethreatneuron.in/blog/understanding-prompt-injection-attacks/</loc>
    <lastmod>2026-04-04T00:00:00+00:00</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://thethreatneuron.in/blog/how-ai-is-transforming-threat-detection/</loc>
    <lastmod>2026-04-03T00:00:00+00:00</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://thethreatneuron.in/tags/machine-learning/</loc>
    <lastmod>2026-04-03T00:00:00+00:00</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://thethreatneuron.in/tags/siem/</loc>
    <lastmod>2026-04-03T00:00:00+00:00</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://thethreatneuron.in/tags/soc/</loc>
    <lastmod>2026-04-03T00:00:00+00:00</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://thethreatneuron.in/tags/threat-detection/</loc>
    <lastmod>2026-04-03T00:00:00+00:00</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://thethreatneuron.in/about/</loc>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
  </url>
</urlset>
