<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://blog.kaiju-security.com/posts/social-engineering-basics/</loc>
<lastmod>2022-11-30T09:00:00-08:00</lastmod>
</url>
<url>
<loc>https://blog.kaiju-security.com/posts/the-matrix-has-you/</loc>
<lastmod>2022-12-06T09:00:00-08:00</lastmod>
</url>
<url>
<loc>https://blog.kaiju-security.com/posts/ai-social-engineering/</loc>
<lastmod>2022-12-19T09:00:00-08:00</lastmod>
</url>
<url>
<loc>https://blog.kaiju-security.com/posts/dont-shout-at-the-cloud/</loc>
<lastmod>2022-12-26T09:00:00-08:00</lastmod>
</url>
<url>
<loc>https://blog.kaiju-security.com/posts/mandatory-remote-kill-switch-cars/</loc>
<lastmod>2023-01-03T09:00:00-08:00</lastmod>
</url>
<url>
<loc>https://blog.kaiju-security.com/posts/you-probably-dont-know-were-socially-engineered/</loc>
<lastmod>2023-01-09T09:00:00-08:00</lastmod>
</url>
<url>
<loc>https://blog.kaiju-security.com/posts/companies-falling-like-dominos/</loc>
<lastmod>2023-01-27T09:00:00-08:00</lastmod>
</url>
<url>
<loc>https://blog.kaiju-security.com/posts/get-off-my-lawn/</loc>
<lastmod>2023-04-05T10:00:00-07:00</lastmod>
</url>
<url>
<loc>https://blog.kaiju-security.com/posts/social-engineering-is-dead/</loc>
<lastmod>2023-06-21T10:00:00-07:00</lastmod>
</url>
<url>
<loc>https://blog.kaiju-security.com/posts/gov-agents-police-best-choice/</loc>
<lastmod>2023-07-19T10:00:00-07:00</lastmod>
</url>
<url>
<loc>https://blog.kaiju-security.com/posts/thats-off-limits-said-attacker/</loc>
<lastmod>2023-08-21T10:00:00-07:00</lastmod>
</url>
<url>
<loc>https://blog.kaiju-security.com/posts/its-time-stop-overlooking-social-engineering/</loc>
<lastmod>2023-09-14T10:00:00-07:00</lastmod>
</url>
<url>
<loc>https://blog.kaiju-security.com/posts/alphv-ransomware-group-original-statement/</loc>
<lastmod>2023-09-15T10:00:00-07:00</lastmod>
</url>
<url>
<loc>https://blog.kaiju-security.com/posts/the-underworld-of-ransomware/</loc>
<lastmod>2023-09-28T10:00:00-07:00</lastmod>
</url>
<url>
<loc>https://blog.kaiju-security.com/posts/scams-r-us/</loc>
<lastmod>2023-10-27T10:00:00-07:00</lastmod>
</url>
<url>
<loc>https://blog.kaiju-security.com/posts/mitre-attck-framework-misguided-approach/</loc>
<lastmod>2024-02-06T09:00:00-08:00</lastmod>
</url>
<url>
<loc>https://blog.kaiju-security.com/posts/covert-operations-cognitive-warfare/</loc>
<lastmod>2024-05-21T10:00:00-07:00</lastmod>
</url>
<url>
<loc>https://blog.kaiju-security.com/posts/corporate-greed-vs-hacker-ethos/</loc>
<lastmod>2024-07-01T10:00:00-07:00</lastmod>
</url>
<url>
<loc>https://blog.kaiju-security.com/posts/cctv-live-streaming-your-security-flaws/</loc>
<lastmod>2024-08-02T10:00:00-07:00</lastmod>
</url>
<url>
<loc>https://blog.kaiju-security.com/posts/critical-exploitation-technique-nearly-ever-edr/</loc>
<lastmod>2024-08-05T10:00:00-07:00</lastmod>
</url>
<url>
<loc>https://blog.kaiju-security.com/posts/crowdstrike-root-cause-corrective-action-severely/</loc>
<lastmod>2024-08-07T10:00:00-07:00</lastmod>
</url>
<url>
<loc>https://blog.kaiju-security.com/posts/gamings-dirty-little-secrets-how-companies-scammers-play/</loc>
<lastmod>2024-08-13T10:00:00-07:00</lastmod>
</url>
<url>
<loc>https://blog.kaiju-security.com/posts/what-humanity-got-right/</loc>
<lastmod>2025-01-25T09:00:00-08:00</lastmod>
</url>
<url>
<loc>https://blog.kaiju-security.com/posts/iowa-courthouse-settlement-pr/</loc>
<lastmod>2026-02-01T09:00:00-08:00</lastmod>
</url>
<url>
<loc>https://blog.kaiju-security.com/posts/the-job-that-changed-everything/</loc>
<lastmod>2026-02-02T09:00:00-08:00</lastmod>
</url>
<url>
<loc>https://blog.kaiju-security.com/categories/</loc>
<lastmod>2026-02-06T13:26:52-08:00</lastmod>
</url>
<url>
<loc>https://blog.kaiju-security.com/tags/</loc>
<lastmod>2026-02-06T13:26:52-08:00</lastmod>
</url>
<url>
<loc>https://blog.kaiju-security.com/archives/</loc>
<lastmod>2026-02-06T13:26:52-08:00</lastmod>
</url>
<url>
<loc>https://blog.kaiju-security.com/about/</loc>
<lastmod>2026-02-06T13:26:52-08:00</lastmod>
</url>
<url>
<loc>https://blog.kaiju-security.com/</loc>
</url>
<url>
<loc>https://blog.kaiju-security.com/tags/social-engineering/</loc>
</url>
<url>
<loc>https://blog.kaiju-security.com/tags/training/</loc>
</url>
<url>
<loc>https://blog.kaiju-security.com/tags/awareness/</loc>
</url>
<url>
<loc>https://blog.kaiju-security.com/tags/red-team/</loc>
</url>
<url>
<loc>https://blog.kaiju-security.com/tags/security-awareness/</loc>
</url>
<url>
<loc>https://blog.kaiju-security.com/tags/opsec/</loc>
</url>
<url>
<loc>https://blog.kaiju-security.com/tags/threat-modeling/</loc>
</url>
<url>
<loc>https://blog.kaiju-security.com/tags/security-culture/</loc>
</url>
<url>
<loc>https://blog.kaiju-security.com/tags/ai/</loc>
</url>
<url>
<loc>https://blog.kaiju-security.com/tags/adversary-simulation/</loc>
</url>
<url>
<loc>https://blog.kaiju-security.com/tags/human-factors/</loc>
</url>
<url>
<loc>https://blog.kaiju-security.com/tags/cloud/</loc>
</url>
<url>
<loc>https://blog.kaiju-security.com/tags/operations/</loc>
</url>
<url>
<loc>https://blog.kaiju-security.com/tags/vehicle-security/</loc>
</url>
<url>
<loc>https://blog.kaiju-security.com/tags/cyber-physical-systems/</loc>
</url>
<url>
<loc>https://blog.kaiju-security.com/tags/automotive/</loc>
</url>
<url>
<loc>https://blog.kaiju-security.com/tags/risk/</loc>
</url>
<url>
<loc>https://blog.kaiju-security.com/tags/psychology/</loc>
</url>
<url>
<loc>https://blog.kaiju-security.com/tags/breaches/</loc>
</url>
<url>
<loc>https://blog.kaiju-security.com/tags/threat/</loc>
</url>
<url>
<loc>https://blog.kaiju-security.com/tags/maturity/</loc>
</url>
<url>
<loc>https://blog.kaiju-security.com/tags/leadership/</loc>
</url>
<url>
<loc>https://blog.kaiju-security.com/tags/history/</loc>
</url>
<url>
<loc>https://blog.kaiju-security.com/tags/trends/</loc>
</url>
<url>
<loc>https://blog.kaiju-security.com/tags/incident-response/</loc>
</url>
<url>
<loc>https://blog.kaiju-security.com/tags/law-enforcement/</loc>
</url>
<url>
<loc>https://blog.kaiju-security.com/tags/offsec/</loc>
</url>
<url>
<loc>https://blog.kaiju-security.com/tags/ransomware/</loc>
</url>
<url>
<loc>https://blog.kaiju-security.com/tags/alphv/</loc>
</url>
<url>
<loc>https://blog.kaiju-security.com/tags/threat-actors/</loc>
</url>
<url>
<loc>https://blog.kaiju-security.com/tags/incident/</loc>
</url>
<url>
<loc>https://blog.kaiju-security.com/tags/digital-forensics/</loc>
</url>
<url>
<loc>https://blog.kaiju-security.com/tags/cybercrime/</loc>
</url>
<url>
<loc>https://blog.kaiju-security.com/tags/underground-economy/</loc>
</url>
<url>
<loc>https://blog.kaiju-security.com/tags/scams/</loc>
</url>
<url>
<loc>https://blog.kaiju-security.com/tags/fraud/</loc>
</url>
<url>
<loc>https://blog.kaiju-security.com/tags/mitre-attck/</loc>
</url>
<url>
<loc>https://blog.kaiju-security.com/tags/frameworks/</loc>
</url>
<url>
<loc>https://blog.kaiju-security.com/tags/defender-mindset/</loc>
</url>
<url>
<loc>https://blog.kaiju-security.com/tags/cognitive-warfare/</loc>
</url>
<url>
<loc>https://blog.kaiju-security.com/tags/influence-ops/</loc>
</url>
<url>
<loc>https://blog.kaiju-security.com/tags/hybrid-warfare/</loc>
</url>
<url>
<loc>https://blog.kaiju-security.com/tags/hacker-ethos/</loc>
</url>
<url>
<loc>https://blog.kaiju-security.com/tags/corporate-culture/</loc>
</url>
<url>
<loc>https://blog.kaiju-security.com/tags/ethics/</loc>
</url>
<url>
<loc>https://blog.kaiju-security.com/tags/security/</loc>
</url>
<url>
<loc>https://blog.kaiju-security.com/tags/cctv/</loc>
</url>
<url>
<loc>https://blog.kaiju-security.com/tags/live-streaming/</loc>
</url>
<url>
<loc>https://blog.kaiju-security.com/tags/physical-security/</loc>
</url>
<url>
<loc>https://blog.kaiju-security.com/tags/exploitation/</loc>
</url>
<url>
<loc>https://blog.kaiju-security.com/tags/edr/</loc>
</url>
<url>
<loc>https://blog.kaiju-security.com/tags/detection/</loc>
</url>
<url>
<loc>https://blog.kaiju-security.com/tags/offensive/</loc>
</url>
<url>
<loc>https://blog.kaiju-security.com/tags/crowdstrike/</loc>
</url>
<url>
<loc>https://blog.kaiju-security.com/tags/root-cause/</loc>
</url>
<url>
<loc>https://blog.kaiju-security.com/tags/corrective-action/</loc>
</url>
<url>
<loc>https://blog.kaiju-security.com/tags/threat-response/</loc>
</url>
<url>
<loc>https://blog.kaiju-security.com/tags/gaming/</loc>
</url>
<url>
<loc>https://blog.kaiju-security.com/tags/monetization/</loc>
</url>
<url>
<loc>https://blog.kaiju-security.com/tags/humanity/</loc>
</url>
<url>
<loc>https://blog.kaiju-security.com/tags/philosophy/</loc>
</url>
<url>
<loc>https://blog.kaiju-security.com/tags/technology/</loc>
</url>
<url>
<loc>https://blog.kaiju-security.com/tags/origin-story/</loc>
</url>
<url>
<loc>https://blog.kaiju-security.com/categories/security/</loc>
</url>
<url>
<loc>https://blog.kaiju-security.com/categories/kaiju/</loc>
</url>
<url>
<loc>https://blog.kaiju-security.com/page2/</loc>
</url>
<url>
<loc>https://blog.kaiju-security.com/page3/</loc>
</url>
</urlset>
