<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://defendis.com/about</loc>
    </url>
    <url>
        <loc>https://defendis.com/learn</loc>
    </url>
    <url>
        <loc>https://defendis.com/careers</loc>
    </url>
    <url>
        <loc>https://defendis.com</loc>
    </url>
    <url>
        <loc>https://defendis.com/solutions/banks</loc>
    </url>
    <url>
        <loc>https://defendis.com/privacy</loc>
    </url>
    <url>
        <loc>https://defendis.com/terms</loc>
    </url>
    <url>
        <loc>https://defendis.com/vulnerability-disclosure</loc>
    </url>
    <url>
        <loc>https://defendis.com/solutions/gov</loc>
    </url>
    <url>
        <loc>https://defendis.com/solutions/enterprise</loc>
    </url>
    <url>
        <loc>https://defendis.com/solutions/partner</loc>
    </url>
    <url>
        <loc>https://defendis.com/legal/terms-of-use-v1</loc>
    </url>
    <url>
        <loc>https://defendis.com/learn/ai-enhanced-cybercrime-a-new-era-of-threats</loc>
    </url>
    <url>
        <loc>https://defendis.com/learn/biometrics-are-not-as-safe-as-you-think</loc>
    </url>
    <url>
        <loc>https://defendis.com/learn/cpanel-cve-2026-41940-under-active-exploitation-to-deploy-filemanager-backd</loc>
    </url>
    <url>
        <loc>https://defendis.com/learn/criminal-phishing-panel-mfa-bypass-shinyhunters-2026</loc>
    </url>
    <url>
        <loc>https://defendis.com/learn/cybersecurity-myths-why-cybersecurity-is-every-employees-problem</loc>
    </url>
    <url>
        <loc>https://defendis.com/learn/dark-web-monitoring-an-in-depth-analysis</loc>
    </url>
    <url>
        <loc>https://defendis.com/learn/deepfake-job-interviews-explained</loc>
    </url>
    <url>
        <loc>https://defendis.com/learn/evaluation-des-solutions-de-threat-intelligence-4-points-cles-a-prendre-en-consideration</loc>
    </url>
    <url>
        <loc>https://defendis.com/learn/honeypot-reveals-botnet-exploiting-scripttext-to-launch-ddos-attacks-on-gam</loc>
    </url>
    <url>
        <loc>https://defendis.com/learn/how-banks-implement-effective-zero-trust-architecture</loc>
    </url>
    <url>
        <loc>https://defendis.com/learn/how-cyber-threat-intelligence-protects-your-business</loc>
    </url>
    <url>
        <loc>https://defendis.com/learn/how-to-achieve-cyber-resilience-with-continuous-learning</loc>
    </url>
    <url>
        <loc>https://defendis.com/learn/how-to-align-threat-intelligence-with-your-business-strategy</loc>
    </url>
    <url>
        <loc>https://defendis.com/learn/how-to-build-a-security-first-culture-without-affecting-productivity</loc>
    </url>
    <url>
        <loc>https://defendis.com/learn/how-to-identify-suspicious-activity-before-it-becomes-an-attack</loc>
    </url>
    <url>
        <loc>https://defendis.com/learn/how-to-prioritize-the-cves-that-actually-get-exploited</loc>
    </url>
    <url>
        <loc>https://defendis.com/learn/jdownloader-a-diffus-des-versions-piges-votre-pc-est-peut-tre-compromis-fr</loc>
    </url>
    <url>
        <loc>https://defendis.com/learn/jenkins-botnet-ddos-gaming-servers-2026</loc>
    </url>
    <url>
        <loc>https://defendis.com/learn/lessons-from-the-most-damaging-recent-data-breaches</loc>
    </url>
    <url>
        <loc>https://defendis.com/learn/mitre-att-ck-explained-a-practical-guide-for-security-leaders</loc>
    </url>
    <url>
        <loc>https://defendis.com/learn/morocco-in-the-age-of-ai</loc>
    </url>
    <url>
        <loc>https://defendis.com/learn/mysterious-hacker-organization-operating-secretly-for-6-years-is-exploiting</loc>
    </url>
    <url>
        <loc>https://defendis.com/learn/needle-c2-crypto-stealer-malware-as-a-service-analysis</loc>
    </url>
    <url>
        <loc>https://defendis.com/learn/new-trickmo-variant-device-take-over-malware-targeting-banking-fintech-wall</loc>
    </url>
    <url>
        <loc>https://defendis.com/learn/only-big-companies-get-hacked</loc>
    </url>
    <url>
        <loc>https://defendis.com/learn/poisoning-the-well-ai-supply-chain-attacks-on-hugging-face-and-openclaw</loc>
    </url>
    <url>
        <loc>https://defendis.com/learn/protecting-yourself-against-social-engineering-attacks</loc>
    </url>
    <url>
        <loc>https://defendis.com/learn/robots-chiens-unitree-la-backdoor-que-personne-ne-corrige-fr</loc>
    </url>
    <url>
        <loc>https://defendis.com/learn/security-is-too-expensive-is-one-of-the-most-costly-misconceptions-in-business</loc>
    </url>
    <url>
        <loc>https://defendis.com/learn/shai-hulud-npm-worm-ai-driven-supply-chain-attack-and-8-5m-crypto-heist</loc>
    </url>
    <url>
        <loc>https://defendis.com/learn/the-first-ai-orchestrated-espionage-campaign</loc>
    </url>
    <url>
        <loc>https://defendis.com/learn/the-hidden-danger-of-leaked-credentials</loc>
    </url>
    <url>
        <loc>https://defendis.com/learn/the-human-factor-from-security-risk-to-security-power</loc>
    </url>
    <url>
        <loc>https://defendis.com/learn/the-macs-dont-get-viruses-myth</loc>
    </url>
    <url>
        <loc>https://defendis.com/learn/the-most-common-security-mistakes-putting-banks-at-risk</loc>
    </url>
    <url>
        <loc>https://defendis.com/learn/the-new-face-of-phishing</loc>
    </url>
    <url>
        <loc>https://defendis.com/learn/the-role-of-penetration-testing-in-a-security-plan</loc>
    </url>
    <url>
        <loc>https://defendis.com/learn/understanding-and-preventing-dos-and-ddos-cyber-threats</loc>
    </url>
    <url>
        <loc>https://defendis.com/learn/understanding-cves</loc>
    </url>
    <url>
        <loc>https://defendis.com/learn/understanding-insider-threats</loc>
    </url>
    <url>
        <loc>https://defendis.com/learn/understanding-insider-threats-why-internal-access-is-your-biggest-security-risk</loc>
    </url>
    <url>
        <loc>https://defendis.com/learn/understanding-man-in-the-middle-mitm-attacks-a-comprehensive-guide</loc>
    </url>
    <url>
        <loc>https://defendis.com/learn/what-are-indicators-of-compromise-and-why-they-matter</loc>
    </url>
    <url>
        <loc>https://defendis.com/learn/what-does-attack-surface-really-mean-for-a-business</loc>
    </url>
    <url>
        <loc>https://defendis.com/learn/what-is-a-brute-force-attack</loc>
    </url>
    <url>
        <loc>https://defendis.com/learn/what-is-dark-web-monitoring-a-plain-language-guide-for-security-teams</loc>
    </url>
    <url>
        <loc>https://defendis.com/learn/what-is-iso-27001-and-why-it-matters</loc>
    </url>
    <url>
        <loc>https://defendis.com/learn/what-to-do-when-your-companys-credentials-are-found-leaked</loc>
    </url>
    <url>
        <loc>https://defendis.com/learn/why-sms-2fa-isnt-secure</loc>
    </url>
    <url>
        <loc>https://defendis.com/learn/why-you-might-not-notice-a-cyberattack</loc>
    </url>
    <url>
        <loc>https://defendis.com/learn/why-you-need-an-incident-response-plan-for-your-company</loc>
    </url>
    <url>
        <loc>https://defendis.com/learn/zero-day-attack-and-how-to-prevent-it</loc>
    </url>
    <url>
        <loc>https://defendis.com/careers/marketing-communications-internship</loc>
    </url>
    <url>
        <loc>https://defendis.com/careers/sales-manager</loc>
    </url>
    <url>
        <loc>https://defendis.com/careers/software-engineer</loc>
    </url>
</urlset>