<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://cyberunfolded.in</loc>
<lastmod>2026-04-03</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/about</loc>
<lastmod>2026-04-03</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/contact</loc>
<lastmod>2026-04-03</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/community</loc>
<lastmod>2026-04-03</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/search</loc>
<lastmod>2026-04-03</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/category/cyber-attacks</loc>
<lastmod>2023-06-26</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/category/cyber-crime</loc>
<lastmod>2023-06-26</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/category/foreign-bulletin</loc>
<lastmod>2023-06-26</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/category/geopolitics</loc>
<lastmod>2023-06-26</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/category/changelog</loc>
<lastmod>2023-06-30</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/category/wide-ranging</loc>
<lastmod>2023-07-22</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/category/series</loc>
<lastmod>2023-08-01</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/category/tech</loc>
<lastmod>2023-11-06</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/category/weekly-unfoldings</loc>
<lastmod>2024-08-10</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/category/cve</loc>
<lastmod>2025-05-15</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/author/pratham</loc>
</url>
<url>
<loc>https://cyberunfolded.in/author/sahil-bansal</loc>
</url>
<url>
<loc>https://cyberunfolded.in/author/mohit</loc>
</url>
<url>
<loc>https://cyberunfolded.in/author/nitin</loc>
</url>
<url>
<loc>https://cyberunfolded.in/author/akshat-khatri</loc>
</url>
<url>
<loc>https://cyberunfolded.in/author/khushi-bagga</loc>
</url>
<url>
<loc>https://cyberunfolded.in/author/shubham-bisht</loc>
</url>
<url>
<loc>https://cyberunfolded.in/author/shruti-sharma</loc>
</url>
<url>
<loc>https://cyberunfolded.in/author/yash-khatri</loc>
</url>
<url>
<loc>https://cyberunfolded.in/author/anshul</loc>
</url>
<url>
<loc>https://cyberunfolded.in/author/avinash</loc>
</url>
<url>
<loc>https://cyberunfolded.in/author/dev-s</loc>
</url>
<url>
<loc>https://cyberunfolded.in/author/ayush-garg</loc>
</url>
<url>
<loc>https://cyberunfolded.in/author/dev-sharma</loc>
</url>
<url>
<loc>https://cyberunfolded.in/author/anjali-kharb</loc>
</url>
<url>
<loc>https://cyberunfolded.in/author/sanket-kumar-yadav</loc>
</url>
<url>
<loc>https://cyberunfolded.in/author/yash</loc>
</url>
<url>
<loc>https://cyberunfolded.in/author/babu-sasidhar</loc>
</url>
<url>
<loc>https://cyberunfolded.in/author/chirag-kumar</loc>
</url>
<url>
<loc>https://cyberunfolded.in/author/nitya-gosain</loc>
</url>
<url>
<loc>https://cyberunfolded.in/author/krish-bhardwaj</loc>
</url>
<url>
<loc>https://cyberunfolded.in/author/divya-jain</loc>
</url>
<url>
<loc>https://cyberunfolded.in/author/piyush-garg</loc>
</url>
<url>
<loc>https://cyberunfolded.in/author/gurdarshan-singh</loc>
</url>
<url>
<loc>https://cyberunfolded.in/author/harshita-dang</loc>
</url>
<url>
<loc>https://cyberunfolded.in/author/vikram-pawar</loc>
</url>
<url>
<loc>https://cyberunfolded.in/author/lenacho</loc>
</url>
<url>
<loc>https://cyberunfolded.in/author/dummy_directory</loc>
</url>
<url>
<loc>https://cyberunfolded.in/author/arihant-jain</loc>
</url>
<url>
<loc>https://cyberunfolded.in/author/rehan-malek</loc>
</url>
<url>
<loc>https://cyberunfolded.in/author/amit-kumar-singh</loc>
</url>
<url>
<loc>https://cyberunfolded.in/author/vinit-prajapati</loc>
</url>
<url>
<loc>https://cyberunfolded.in/author/yash-jain</loc>
</url>
<url>
<loc>https://cyberunfolded.in/blog/fileless-malware-2025-defense</loc>
<lastmod>2025-06-07</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/hologram-technology-future-of-3d-communication</loc>
<lastmod>2025-06-04</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/ai-uncovering-cve-2025-37899-linux-smb</loc>
<lastmod>2025-05-31</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/cve-2025-0927</loc>
<lastmod>2025-05-30</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/stealth-mode-attackers-2025</loc>
<lastmod>2025-05-30</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/beyond-penetration-testing-red-teaming-apts-2025</loc>
<lastmod>2025-05-29</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/iot-devices-silent-backdoor-to-your-network</loc>
<lastmod>2025-05-29</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/cve-2025-37899</loc>
<lastmod>2025-05-28</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/cpu-level-ransomware-undetectable-threats</loc>
<lastmod>2025-05-24</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/a-next-js-middleware-authentication-bypass-cve-2025-29927-writeup-hackdonalds-challenge-intigriti</loc>
<lastmod>2025-05-23</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/mitre-attck-framework-apt-tracking-2025</loc>
<lastmod>2025-05-19</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/weekly-unfoldings-may-12-17-2025</loc>
<lastmod>2025-05-17</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/cve-2025-1137</loc>
<lastmod>2025-05-17</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/role-of-programming-languages-in-cyber-attacks-2025</loc>
<lastmod>2025-05-15</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/secure-coding-why-developers-must-code-with-security-in-mind</loc>
<lastmod>2025-05-15</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/weekly-unfoldings-april-28-may-03-2025</loc>
<lastmod>2025-05-03</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/weekly-unfoldings-april-14-19-2025</loc>
<lastmod>2025-04-20</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/weekly-unfoldings-april-07-12-2025</loc>
<lastmod>2025-04-12</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/weekly-unfoldings-march-24-29-2024</loc>
<lastmod>2025-03-29</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/weekly-unfoldings-march-10-15-2024</loc>
<lastmod>2025-03-15</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/weekly-unfoldings-march-03-08-2024</loc>
<lastmod>2025-03-08</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/weekly-unfoldings-february-24-march-01-2025</loc>
<lastmod>2025-03-01</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/boot-2-root-ctf-h4ckp13t-0x01</loc>
<lastmod>2025-02-27</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/weekly-unfoldings-february-19-22-2025</loc>
<lastmod>2025-02-22</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/weekly-unfoldings-february-16-19-2025</loc>
<lastmod>2025-02-19</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/weekly-unfoldings-february-10-15-2025</loc>
<lastmod>2025-02-15</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/weekly-unfoldings-december-02-07-2024</loc>
<lastmod>2025-02-07</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/salt-typhoon-global-campaign-of-cyber-espionage</loc>
<lastmod>2025-02-05</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/the-impact-of-machine-learning-on-data-analysis</loc>
<lastmod>2024-12-23</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/role-of-data-visualization-tools-in-data-analysis-tableau-power-bi</loc>
<lastmod>2024-12-23</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/how-sql-is-used-in-data-analysis-for-querying-databases</loc>
<lastmod>2024-12-23</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/crypto-industry-lost-2-3-b-to-cyber-threats-in-2024</loc>
<lastmod>2024-12-22</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/weekly-unfoldings-november-02-07-2024</loc>
<lastmod>2024-12-07</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/turla-mastering-the-art-of-cyber-espionage-through-infrastructure-hijacking</loc>
<lastmod>2024-12-06</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/weekly-unfoldings-november-25-30-2024</loc>
<lastmod>2024-11-30</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/weekly-unfoldings-november-18-23-2024</loc>
<lastmod>2024-11-23</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/unlocking-data-insights-with-python</loc>
<lastmod>2024-11-15</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/data-analysis-with-google-sheets</loc>
<lastmod>2024-11-15</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/blockchain-beyond-cryptocurrency-a-comprehensive-guide</loc>
<lastmod>2024-11-10</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/okta-vulnerabilities-a-comprehensive-overview-of-recent-security-concerns</loc>
<lastmod>2024-11-10</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/weekly-unfoldings-november-04-09-2024</loc>
<lastmod>2024-11-09</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/mastering-data-analysis-with-excel</loc>
<lastmod>2024-11-06</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/idor-vulnerability-threatens-aadhaar-pan-data-security</loc>
<lastmod>2024-11-05</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/risc-v-s-rise-nvidia-qualcomm-google-and-samsung-challenge-intel-and-amd-with-open-source-computing</loc>
<lastmod>2024-10-28</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/weekly-unfoldings-october-21-26-2024</loc>
<lastmod>2024-10-26</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/oktas-ipsie-framework-a-new-security-standard-amid-rising-saa-s-data-breaches</loc>
<lastmod>2024-10-23</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/weekly-unfoldings-october-15-19-2024</loc>
<lastmod>2024-10-19</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/star-health-cyberattack-a-detailed-analysis-of-the-68-000-ransom-demand-and-data-leak</loc>
<lastmod>2024-10-17</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/tesla-optimus-robot-revolutionizing-everyday-tasks-with-advanced-ai</loc>
<lastmod>2024-10-12</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/weekly-unfoldings-september-30-october-5-2024</loc>
<lastmod>2024-10-05</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/the-ultimate-guide-to-web-application-penetration-testing</loc>
<lastmod>2024-10-04</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/the-u-s-cybersecurity-strategy-a-blueprint-for-national-defense-and-lessons-for-developing-nations</loc>
<lastmod>2024-10-02</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/pentesting-ftp</loc>
<lastmod>2024-10-01</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/the-future-of-neuromorphic-computing-how-ai-is-shaping-hardware-design</loc>
<lastmod>2024-09-28</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/weekly-unfoldings-september-23-28-2024</loc>
<lastmod>2024-09-28</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/understanding-malware-in-mobile-devices</loc>
<lastmod>2024-09-27</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/weekly-unfoldings-september-16-21-2024</loc>
<lastmod>2024-09-21</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/star-health-data-breach-sensitive-customer-information-leaked-via-telegram-chatbots</loc>
<lastmod>2024-09-21</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/understanding-the-tech-behind-the-scenes-terminal-command-line-bash-cmd-power-shell-and-more</loc>
<lastmod>2024-09-16</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/weekly-unfoldings-september-09-14-2024</loc>
<lastmod>2024-09-14</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/recon-using-asn</loc>
<lastmod>2024-09-13</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/browse-safely-and-anonymously-protecting-your-digital-identity</loc>
<lastmod>2024-09-12</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/synthetic-identity-fraud-how-data-becomes-a-deceptive-tool</loc>
<lastmod>2024-09-12</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/web-app-vulnerabilities</loc>
<lastmod>2024-09-09</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/weekly-unfoldings-september-02-07-2024</loc>
<lastmod>2024-09-07</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/weekly-unfoldings-august-26-31-2024</loc>
<lastmod>2024-08-31</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/quishing-how-scammers-use-qr-codes</loc>
<lastmod>2024-08-30</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/understanding-zero-day-attacks-on-wps-a-comprehensive-analysis</loc>
<lastmod>2024-08-28</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/the-race-to-ai-infused-hardware-apple-google-and-beyond</loc>
<lastmod>2024-08-27</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/weekly-unfoldings-august-19-24-2024</loc>
<lastmod>2024-08-24</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/navigating-cyber-threats-effective-use-of-the-mitre-att-and-ck-framework</loc>
<lastmod>2024-08-23</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/inside-the-massive-aws-cloud-breach-how-exploited-env-files-led-to-a-global-extortion-campaign</loc>
<lastmod>2024-08-20</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/pentesting-json-web-tokens</loc>
<lastmod>2024-08-20</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/weekly-unfoldings-august-12-17-2024</loc>
<lastmod>2024-08-17</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/zero-day-exploits</loc>
<lastmod>2024-08-12</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/weekly-unfoldings-august-5-10-2024</loc>
<lastmod>2024-08-10</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/graphql-api-vulnerabilities</loc>
<lastmod>2024-08-07</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/bloody-wolf-cyberattacks-targeting-kazakh-organizations-with-80-malware</loc>
<lastmod>2024-08-07</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/ansible-kickstart-for-dev-ops</loc>
<lastmod>2024-08-04</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/when-clouds-go-dark-microsoft-azures-d-do-s-induced-global-outage</loc>
<lastmod>2024-08-01</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/jenkins-basics-simplified</loc>
<lastmod>2024-07-28</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/docker-101-for-dev-ops</loc>
<lastmod>2024-07-24</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/crowd-strike-the-company-behind-the-major-microsoft-outage</loc>
<lastmod>2024-07-23</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/the-role-of-machine-learning-in-cyber-threat-intelligence-will-it-replace-human-analysts</loc>
<lastmod>2024-07-19</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/exploring-the-git-hub-student-developer-pack-what-it-offers-and-how-to-get-it-</loc>
<lastmod>2024-07-18</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/kaspersky-leaves-us-navigating-national-security-risks</loc>
<lastmod>2024-07-17</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/data-analysis-toolkit-software-and-tools-for-every-analyst</loc>
<lastmod>2024-07-12</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/google-to-soon-offer-free-dark-web-monitoring-for-all-users</loc>
<lastmod>2024-07-12</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/the-fintech-revolution-disruption-and-evolution-in-financial-services</loc>
<lastmod>2024-07-07</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/git-essentials-for-dev-ops</loc>
<lastmod>2024-07-03</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/from-code-to-customer-satisfaction-the-role-of-software-quality</loc>
<lastmod>2024-07-03</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/telematics-impact-on-industries-and-life</loc>
<lastmod>2024-07-02</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/empirical-software-engineering-bridging-the-gap-between-theory-and-practice</loc>
<lastmod>2024-06-28</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/top-5-dev-ops-tools-for-beginners</loc>
<lastmod>2024-06-26</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/indias-landmark-introduction-of-the-joint-doctrine-for-cyberspace-operations</loc>
<lastmod>2024-06-19</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/demystifying-nlp-the-future-of-human-machine-communication</loc>
<lastmod>2024-06-18</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/guardians-of-the-virtual-realm-how-al-is-revolutionizing-cyber-security</loc>
<lastmod>2024-06-17</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/beware-of-the-latest-phone-scam-targeting-parents-kidnapping-and-fake-crime-accusations</loc>
<lastmod>2024-06-14</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/the-invisible-guardians-why-software-testing-matters</loc>
<lastmod>2024-06-06</lastmod>
</url>
<url>
<loc>https://cyberunfolded.in/blog/supercharge-your-workflow-a-deep-dive-into-github-cli</loc>
<lastmod>2024-06-03</lastmod>
</url>
</urlset>
