<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
  xmlns:xhtml="http://www.w3.org/1999/xhtml">

  <url>
    <loc>https://thethreatneuron.in/blog/</loc>
    <lastmod>2026-04-12T14:54:12+05:30</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://thethreatneuron.in/blog/shadow-ai-enterprise-data-leakage-security-risks-2026/</loc>
    <lastmod>2026-04-12T14:54:12+05:30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://thethreatneuron.in/</loc>
    <lastmod>2026-04-12T14:54:12+05:30</lastmod>
    <changefreq>daily</changefreq>
    <priority>1</priority>
  </url>
  <url>
    <loc>https://thethreatneuron.in/blog/react2shell-cve-2025-55182-credential-harvesting-ai-api-keys-2026/</loc>
    <lastmod>2026-04-12T14:34:07+05:30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://thethreatneuron.in/blog/grafanaghost-cve-2026-27876-indirect-prompt-injection-data-exfiltration-2026/</loc>
    <lastmod>2026-04-12T14:23:22+05:30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://thethreatneuron.in/blog/marimo-cve-2026-39987-ai-notebook-rce-credential-theft-2026/</loc>
    <lastmod>2026-04-12T13:37:19+05:30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://thethreatneuron.in/blog/anthropic-project-glasswing-claude-mythos-zero-day-cybersecurity-2026/</loc>
    <lastmod>2026-04-12T11:09:26+05:30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://thethreatneuron.in/blog/flowise-cve-2025-59528-rce-exploit-ai-agent-platforms-2026/</loc>
    <lastmod>2026-04-11T12:13:56+05:30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://thethreatneuron.in/blog/openclaw-ai-agent-security-crisis-malicious-marketplace-2026/</loc>
    <lastmod>2026-04-11T11:56:49+05:30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://thethreatneuron.in/blog/ai-weaponized-cyberattack-lifecycle-tycoon2fa-2026/</loc>
    <lastmod>2026-04-08T12:18:09+05:30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://thethreatneuron.in/blog/ai-device-code-phishing-bypass-mfa-attacks-2026/</loc>
    <lastmod>2026-04-07T18:00:00+05:30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://thethreatneuron.in/blog/litellm-supply-chain-attack-pypi-compromise-ai-systems-2026/</loc>
    <lastmod>2026-04-07T14:00:00+05:30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://thethreatneuron.in/blog/ai-agent-hijacking-autonomous-systems-attacks-2026/</loc>
    <lastmod>2026-04-07T10:00:00+05:30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://thethreatneuron.in/blog/understanding-prompt-injection-attacks/</loc>
    <lastmod>2026-04-04T00:00:00+00:00</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://thethreatneuron.in/blog/how-ai-is-transforming-threat-detection/</loc>
    <lastmod>2026-04-03T00:00:00+00:00</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://thethreatneuron.in/about/</loc>
    <changefreq>monthly</changefreq>
    <priority>0.3</priority>
  </url>
</urlset>
