<?xml version="1.0" encoding="UTF-8"?> <urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"> <url> <loc>https://www.defensive-security.com</loc> <lastmod>2026-04-03</lastmod> <changefreq>weekly</changefreq> </url>  <url> <loc>https://www.defensive-security.com/resources/generic-bpftrace-based-rcewebshell-prevention-technique-for-critical-linux-network-services</loc> <lastmod>2024-10-07</lastmod> <changefreq>weekly</changefreq> </url>  <url> <loc>https://www.defensive-security.com/resources/hunting-for-apache-rootkit-using-osquery</loc> <lastmod>2020-06-18</lastmod> <changefreq>weekly</changefreq> </url>  <url> <loc>https://www.defensive-security.com/blog</loc> <lastmod>2017-06-11</lastmod> <changefreq>weekly</changefreq> </url>  <url> <loc>https://www.defensive-security.com/about-defensive</loc> <lastmod>2025-07-21</lastmod> <changefreq>weekly</changefreq> </url>  <url> <loc>https://www.defensive-security.com/services/purple-teaming</loc> <lastmod>2024-01-04</lastmod> <changefreq>weekly</changefreq> </url>  <url> <loc>https://www.defensive-security.com/blog/exatel-security-days-2017</loc> <lastmod>2017-07-15</lastmod> <changefreq>weekly</changefreq> </url>  <url> <loc>https://www.defensive-security.com/resources</loc> <lastmod>2017-06-11</lastmod> <changefreq>weekly</changefreq> </url>  <url> <loc>https://www.defensive-security.com/resources/conferences</loc> <lastmod>2017-08-02</lastmod> <changefreq>weekly</changefreq> </url>  <url> <loc>https://www.defensive-security.com/blog/conferences/my-session-flocon-2018-us</loc> <lastmod>2018-08-01</lastmod> <changefreq>weekly</changefreq> </url>  <url> <loc>https://www.defensive-security.com/training-workshops</loc> <lastmod>2024-01-02</lastmod> <changefreq>weekly</changefreq> </url>  <url> <loc>https://www.defensive-security.com/services/incident-response</loc> <lastmod>2024-01-04</lastmod> <changefreq>weekly</changefreq> </url>  <url> <loc>https://www.defensive-security.com/blog/conferences</loc> <lastmod>2017-06-29</lastmod> <changefreq>weekly</changefreq> </url>  <url> <loc>https://www.defensive-security.com/resources/video</loc> <lastmod>2017-07-15</lastmod> <changefreq>weekly</changefreq> </url>  <url> <loc>https://www.defensive-security.com/resources/the-map-of-linuxopen-source-based-hardened-infrastructure</loc> <lastmod>2017-08-18</lastmod> <changefreq>weekly</changefreq> </url>  <url> <loc>https://www.defensive-security.com/blog/conferences/brucon-0x0a-post-exploitation-adversary-simulations-training</loc> <lastmod>2018-08-05</lastmod> <changefreq>weekly</changefreq> </url>  <url> <loc>https://www.defensive-security.com/training-workshops/linux-forensics</loc> <lastmod>2026-01-11</lastmod> <changefreq>weekly</changefreq> </url>  <url> <loc>https://www.defensive-security.com/services</loc> <lastmod>2024-01-04</lastmod> <changefreq>weekly</changefreq> </url>  <url> <loc>https://www.defensive-security.com/resources/files</loc> <lastmod>2017-07-15</lastmod> <changefreq>weekly</changefreq> </url>  <url> <loc>https://www.defensive-security.com/blog/conferences/hack-in-the-box-2018-dubai-in-out-network-data-exfiltration-techniques</loc> <lastmod>2018-08-05</lastmod> <changefreq>weekly</changefreq> </url>  <url> <loc>https://www.defensive-security.com/services/cyber-range</loc> <lastmod>2024-01-04</lastmod> <changefreq>weekly</changefreq> </url>  <url> <loc>https://www.defensive-security.com/contact</loc> <lastmod>2024-01-04</lastmod> <changefreq>weekly</changefreq> </url>  <url> <loc>https://www.defensive-security.com/services/linux-threat-detection</loc> <lastmod>2025-06-05</lastmod> <changefreq>weekly</changefreq> </url>  <url> <loc>https://www.defensive-security.com/blog/conferences/hack-in-the-box-2019-ams-in-out-network-data-exfiltration-techniques</loc> <lastmod>2019-02-25</lastmod> <changefreq>weekly</changefreq> </url>  <url> <loc>https://www.defensive-security.com/training-workshops/advanced-network-detection</loc> <lastmod>2021-12-15</lastmod> <changefreq>weekly</changefreq> </url>  <url> <loc>https://www.defensive-security.com/services/linux-hardening</loc> <lastmod>2024-01-04</lastmod> <changefreq>weekly</changefreq> </url>  <url> <loc>https://www.defensive-security.com/blog/conferences/secure-conference-2019-small-summary</loc> <lastmod>2020-01-08</lastmod> <changefreq>weekly</changefreq> </url>  <url> <loc>https://www.defensive-security.com/training-workshops/c2-matrix-operator</loc> <lastmod>2024-01-02</lastmod> <changefreq>weekly</changefreq> </url>  <url> <loc>https://www.defensive-security.com/edrmetry</loc> <lastmod>2025-08-01</lastmod> <changefreq>weekly</changefreq> </url>  <url> <loc>https://www.defensive-security.com/services/infrastructure-security</loc> <lastmod>2024-01-04</lastmod> <changefreq>weekly</changefreq> </url>  <url> <loc>https://www.defensive-security.com/training-workshops/adversary-emulation-and-breach-attack-simulations</loc> <lastmod>2024-01-02</lastmod> <changefreq>weekly</changefreq> </url>  <url> <loc>https://www.defensive-security.com/blog/conferences/akademia-issa-2022-proaktywna-analiza-metod-persystencyjnych-w-systemie-linux</loc> <lastmod>2022-04-08</lastmod> <changefreq>weekly</changefreq> </url>  <url> <loc>https://www.defensive-security.com/services/web-application-security</loc> <lastmod>2021-12-15</lastmod> <changefreq>weekly</changefreq> </url>  <url> <loc>https://www.defensive-security.com/training-workshops/advanced-selinux</loc> <lastmod>2021-12-15</lastmod> <changefreq>weekly</changefreq> </url>  <url> <loc>https://www.defensive-security.com/blog/conferences/black-hat-2024-usa-practical-linux-attack-paths-and-hunting-for-red-and-blue-team</loc> <lastmod>2024-03-06</lastmod> <changefreq>weekly</changefreq> </url>  <url> <loc>https://www.defensive-security.com/blog/my-training-brucon-spring-session-2017-ghent-belgium</loc> <lastmod>2017-07-31</lastmod> <changefreq>weekly</changefreq> </url>  <url> <loc>https://www.defensive-security.com/training-workshops/in-out-network-exfiltration-and-post-exploitation-techniques-red</loc> <lastmod>2021-12-15</lastmod> <changefreq>weekly</changefreq> </url>  <url> <loc>https://www.defensive-security.com/blog/conferences/orangecon-2026-practical-linux-attack-paths-and-dfirhunting-v20</loc> <lastmod>2026-03-27</lastmod> <changefreq>weekly</changefreq> </url>  <url> <loc>https://www.defensive-security.com/blog/owasp-appsec-usa-2017-orlando</loc> <lastmod>2017-07-31</lastmod> <changefreq>weekly</changefreq> </url>  <url> <loc>https://www.defensive-security.com/training-workshops/advanced-rhelcentos</loc> <lastmod>2024-01-02</lastmod> <changefreq>weekly</changefreq> </url>  <url> <loc>https://www.defensive-security.com/blog/my-workshop-brucon-2017-ghent-belgium</loc> <lastmod>2017-08-03</lastmod> <changefreq>weekly</changefreq> </url>  <url> <loc>https://www.defensive-security.com/training-workshops/freeipa</loc> <lastmod>2021-12-15</lastmod> <changefreq>weekly</changefreq> </url>  <url> <loc>https://www.defensive-security.com/blog/osds-training-brucon-spring-session-2018-ghent-belgium</loc> <lastmod>2018-08-01</lastmod> <changefreq>weekly</changefreq> </url>  <url> <loc>https://www.defensive-security.com/training-workshops/modsecurity</loc> <lastmod>2021-12-15</lastmod> <changefreq>weekly</changefreq> </url>  <url> <loc>https://www.defensive-security.com/blog/playing-with-linux-kernel-runtime-guard-lkrg</loc> <lastmod>2018-11-16</lastmod> <changefreq>weekly</changefreq> </url>  <url> <loc>https://www.defensive-security.com/training-workshops/in-out-network-exfiltration-and-post-exploitation-techniques-blue</loc> <lastmod>2021-12-15</lastmod> <changefreq>weekly</changefreq> </url>  <url> <loc>https://www.defensive-security.com/blog/freeipa-memory-exhaustion-ns-slapd-remote-dos</loc> <lastmod>2019-01-15</lastmod> <changefreq>weekly</changefreq> </url>  <url> <loc>https://www.defensive-security.com/training-workshops/docker-security</loc> <lastmod>2021-12-15</lastmod> <changefreq>weekly</changefreq> </url>  <url> <loc>https://www.defensive-security.com/blog/meterpreter-payload-delivery-using-dns-axfr-poc</loc> <lastmod>2019-03-25</lastmod> <changefreq>weekly</changefreq> </url>  <url> <loc>https://www.defensive-security.com/blog/hiding-behind-ja3-hash</loc> <lastmod>2019-10-07</lastmod> <changefreq>weekly</changefreq> </url>  <url> <loc>https://www.defensive-security.com/blog/cybersecurity-skills-gap-inspired-by-global-cybersecurity-forum-2020-saudi-arabia</loc> <lastmod>2020-02-06</lastmod> <changefreq>weekly</changefreq> </url>  <url> <loc>https://www.defensive-security.com/blog/covid-19-zoom-security-issues</loc> <lastmod>2020-04-16</lastmod> <changefreq>weekly</changefreq> </url>  <url> <loc>https://www.defensive-security.com/blog/pl-purplelabs-wartosci-i-korzysci</loc> <lastmod>2020-09-16</lastmod> <changefreq>weekly</changefreq> </url>  <url> <loc>https://www.defensive-security.com/blog/purplelabs-values-and-benefits</loc> <lastmod>2020-09-16</lastmod> <changefreq>weekly</changefreq> </url>  <url> <loc>https://www.defensive-security.com/blog/playing-with-krf-a-kernelspace-randomized-faulter</loc> <lastmod>2020-10-08</lastmod> <changefreq>weekly</changefreq> </url>  <url> <loc>https://www.defensive-security.com/blog/free-workshop-threat-detection-and-hunting-with-purplelabs-1</loc> <lastmod>2021-10-07</lastmod> <changefreq>weekly</changefreq> </url>  <url> <loc>https://www.defensive-security.com/blog/free-workshop-threat-detection-and-hunting-with-purplelabs-2</loc> <lastmod>2021-10-07</lastmod> <changefreq>weekly</changefreq> </url>  <url> <loc>https://www.defensive-security.com/blog/purplelabs-in-the-nutshell-from-end-user-perspective</loc> <lastmod>2022-01-03</lastmod> <changefreq>weekly</changefreq> </url>  <url> <loc>https://www.defensive-security.com/blog/semafor-2022-cyber-range-podnoszenie-technicznych-kompetencji-zespolow-soc-w-sposob-ciagly</loc> <lastmod>2022-04-08</lastmod> <changefreq>weekly</changefreq> </url>  <url> <loc>https://www.defensive-security.com/blog/letnia-szkola-cyberbezpieczenstwa-2022</loc> <lastmod>2023-01-31</lastmod> <changefreq>weekly</changefreq> </url>  <url> <loc>https://www.defensive-security.com/blog/you-need-to-know-more-than-just-a-little-about-linux-1-red-team-perspective</loc> <lastmod>2023-02-22</lastmod> <changefreq>weekly</changefreq> </url>  <url> <loc>https://www.defensive-security.com/blog/you-need-to-know-more-than-just-a-little-about-linux-2-blue-team-perspective</loc> <lastmod>2023-02-22</lastmod> <changefreq>weekly</changefreq> </url>  <url> <loc>https://www.defensive-security.com/blog/you-need-to-know-more-than-just-a-little-about-linux-3-secops-perspective</loc> <lastmod>2023-02-22</lastmod> <changefreq>weekly</changefreq> </url>  <url> <loc>https://www.defensive-security.com/blog/linux-ebpf-as-a-double-edged-sword</loc> <lastmod>2023-03-10</lastmod> <changefreq>weekly</changefreq> </url>  <url> <loc>https://www.defensive-security.com/blog/advancing-your-cyberlinux-skills-things-connect-together</loc> <lastmod>2023-07-27</lastmod> <changefreq>weekly</changefreq> </url>  <url> <loc>https://www.defensive-security.com/blog/preventing-modification-of-etcldsopreload-with-selinux</loc> <lastmod>2023-08-30</lastmod> <changefreq>weekly</changefreq> </url>  <url> <loc>https://www.defensive-security.com/blog/the-crucial-significance-of-modern-linux-detection-and-dfir</loc> <lastmod>2023-09-27</lastmod> <changefreq>weekly</changefreq> </url>  <url> <loc>https://www.defensive-security.com/blog/black-hat-asia-2026-effective-linux-edr-evaluation-testing-for-red-and-blue-team</loc> <lastmod>2026-01-11</lastmod> <changefreq>weekly</changefreq> </url>  <url> <loc>https://www.defensive-security.com/blog/x33fcon-2026-practical-linux-attack-paths-and-dfirhunting-v20</loc> <lastmod>2026-03-27</lastmod> <changefreq>weekly</changefreq> </url>  <url> <loc>https://www.defensive-security.com/blog/black-hat-usa-2026-practical-linux-attack-paths-and-dfirhunting-v20</loc> <lastmod>2026-03-27</lastmod> <changefreq>weekly</changefreq> </url>  <url> <loc>https://www.defensive-security.com/blog/linux-purple-team-exercises-use-case-story</loc> <lastmod>2026-04-02</lastmod> <changefreq>weekly</changefreq> </url>  </urlset>