<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
  xmlns:xhtml="http://www.w3.org/1999/xhtml">

  <url>
    <loc>https://thethreatneuron.in/blog/ai-weaponized-cyberattack-lifecycle-tycoon2fa-2026/</loc>
    <lastmod>2026-04-08T12:18:09+05:30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://thethreatneuron.in/blog/</loc>
    <lastmod>2026-04-08T12:18:09+05:30</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://thethreatneuron.in/</loc>
    <lastmod>2026-04-08T12:18:09+05:30</lastmod>
    <changefreq>daily</changefreq>
    <priority>1</priority>
  </url>
  <url>
    <loc>https://thethreatneuron.in/blog/ai-device-code-phishing-bypass-mfa-attacks-2026/</loc>
    <lastmod>2026-04-07T18:00:00+05:30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://thethreatneuron.in/blog/litellm-supply-chain-attack-pypi-compromise-ai-systems-2026/</loc>
    <lastmod>2026-04-07T14:00:00+05:30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://thethreatneuron.in/blog/ai-agent-hijacking-autonomous-systems-attacks-2026/</loc>
    <lastmod>2026-04-07T10:00:00+05:30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://thethreatneuron.in/blog/understanding-prompt-injection-attacks/</loc>
    <lastmod>2026-04-04T00:00:00+00:00</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://thethreatneuron.in/blog/how-ai-is-transforming-threat-detection/</loc>
    <lastmod>2026-04-03T00:00:00+00:00</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://thethreatneuron.in/about/</loc>
    <changefreq>monthly</changefreq>
    <priority>0.3</priority>
  </url>
</urlset>
