<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://blog.intelligencex.org/data-breaches-2</loc><changefreq>daily</changefreq><lastmod>2025-09-11T12:31:15+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/cyber-attacks-cybersecurity-news</loc><changefreq>daily</changefreq><lastmod>2025-09-10T11:46:38+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/threats-exploits</loc><changefreq>weekly</changefreq><lastmod>2025-08-28T10:59:44+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/ai-security-5</loc><changefreq>daily</changefreq><lastmod>2025-09-12T12:02:53+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/cloud-devsecops-6</loc><changefreq>hourly</changefreq><lastmod>2025-09-15T12:30:43+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/compliance-regulations-7</loc><changefreq>daily</changefreq><lastmod>2025-09-12T16:16:22+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/tools-reviews-8</loc><changefreq>daily</changefreq><lastmod>2025-09-15T13:31:34+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/webinars-events-9</loc><changefreq>weekly</changefreq><lastmod>2025-09-01T18:20:54+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/threats-exploits/cves</loc><changefreq>weekly</changefreq><lastmod>2025-08-28T10:59:44+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/security-research-analysis</loc><changefreq>weekly</changefreq><lastmod>2025-08-28T16:31:15+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/offensive-security</loc><changefreq>weekly</changefreq><lastmod>2025-08-29T17:53:11+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/offensive-security/open-source-intelligence</loc><changefreq>weekly</changefreq><lastmod>2025-08-29T17:53:11+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/gdpr-nis2-dora-new-compliance-pressures-for-devsecops-teams</loc><changefreq>hourly</changefreq><lastmod>2025-09-15T12:30:43+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/pci-dss-40-devsecops-what-changed-in-2025</loc><changefreq>hourly</changefreq><lastmod>2025-09-15T11:32:27+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/california-consumer-privacy-act-ccpa</loc><changefreq>daily</changefreq><lastmod>2025-09-12T16:16:22+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/personal-information-protection-and-electronic-documents-act-pipeda</loc><changefreq>daily</changefreq><lastmod>2025-09-12T16:20:10+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/the-future-of-devsecops-ai-driven-security-by-2030</loc><changefreq>daily</changefreq><lastmod>2025-09-12T12:02:53+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/how-to-use-ai-for-threat-hunting-in-cloud-environments</loc><changefreq>daily</changefreq><lastmod>2025-09-12T11:44:26+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/prompt-injection-attacks-on-ai-tools-in-devops-real-world-examples</loc><changefreq>daily</changefreq><lastmod>2025-09-12T11:12:40+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/gdpr</loc><changefreq>daily</changefreq><lastmod>2025-09-12T16:46:54+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/agentic-ai-for-devsecops-automating-security-remediation-in-2025</loc><changefreq>daily</changefreq><lastmod>2025-09-11T17:01:01+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/ai-models-in-devsecops-how-chatgpt-copilot-can-introduce-vulnerabilities</loc><changefreq>daily</changefreq><lastmod>2025-09-11T14:34:33+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/2025s-biggest-dark-web-leaks-what-they-mean-for-devsecops</loc><changefreq>daily</changefreq><lastmod>2025-09-11T13:06:13+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/the-anatomy-of-a-ransomware-attack-on-cicd-pipelines</loc><changefreq>daily</changefreq><lastmod>2025-09-11T12:51:48+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/data-breach-deep-dive-why-retail-e-commerce-apps-keep-getting-hacked</loc><changefreq>daily</changefreq><lastmod>2025-09-11T12:31:15+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/how-hackers-exploit-shadow-apis-case-studies-from-2025-breaches</loc><changefreq>daily</changefreq><lastmod>2025-09-11T12:06:34+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/lessons-from-the-2025-okta-cloudflare-breach-what-devsecops-teams-can-learn</loc><changefreq>daily</changefreq><lastmod>2025-09-11T11:44:39+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/devsecops-zero-trust-the-real-playbook</loc><changefreq>daily</changefreq><lastmod>2025-09-10T15:39:13+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/serverless-security-in-aws-lambda-2025-attack-trends</loc><changefreq>daily</changefreq><lastmod>2025-09-10T15:21:09+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/the-role-of-dns-waf-in-devsecops-pipelines</loc><changefreq>daily</changefreq><lastmod>2025-09-10T12:33:06+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/jaguar-land-rover-shutdown-a-wake-up-call-for-automotive-cybersecurity</loc><changefreq>daily</changefreq><lastmod>2025-09-10T11:46:38+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/plex-breach-2025-change-your-password-before-its-too-late</loc><changefreq>daily</changefreq><lastmod>2025-09-10T11:08:08+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/beyond-the-ban-a-better-way-to-secure-generative-ai-applications</loc><changefreq>daily</changefreq><lastmod>2025-09-10T10:45:34+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/cicd-exploits-explained-supply-chain-attacks-in-action</loc><changefreq>daily</changefreq><lastmod>2025-09-09T17:40:39+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/devsecops-metrics-beyond-velocity-what-you-must-track-in-2025</loc><changefreq>daily</changefreq><lastmod>2025-09-09T17:21:05+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/npm-supply-chain-attack-josh-junon-packages-compromised</loc><changefreq>daily</changefreq><lastmod>2025-09-09T15:18:05+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/how-to-secure-iac-terraformcloudformation-against-drift-attacks</loc><changefreq>daily</changefreq><lastmod>2025-09-08T15:43:12+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/shift-left-security-7-mistakes-teams-still-make-in-2025</loc><changefreq>weekly</changefreq><lastmod>2025-09-08T12:08:52+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/zombie-containers-in-kubernetes-the-unseen-threat-in-production</loc><changefreq>weekly</changefreq><lastmod>2025-09-05T14:09:27+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/aws-graviton-migration-hidden-devsecops-risks-no-one-talks-about</loc><changefreq>weekly</changefreq><lastmod>2025-09-05T10:45:38+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/top-10-devsecops-vulnerabilities-found-in-2025-so-far</loc><changefreq>weekly</changefreq><lastmod>2025-09-03T18:21:38+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/bsides-ahmedabad-2025-cybersecurity-event-september</loc><changefreq>weekly</changefreq><lastmod>2025-09-01T18:20:54+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/the-future-of-devsecops-unseen-trends-nobody-is-talking-about-2025-2030</loc><changefreq>weekly</changefreq><lastmod>2025-09-01T17:39:08+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/how-to-catch-supply-chain-attacks-before-they-reach-production</loc><changefreq>weekly</changefreq><lastmod>2025-09-01T17:31:50+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/unseen-metrics-what-to-really-track-in-devsecops-beyond-deployment-speed</loc><changefreq>weekly</changefreq><lastmod>2025-09-01T17:24:45+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/dark-web-intelligence-for-devsecops-teams-finding-leaks-before-hackers-do</loc><changefreq>weekly</changefreq><lastmod>2025-09-01T17:15:12+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/cloudflare-waf-devsecops-unseen-automations-that-save-millions</loc><changefreq>weekly</changefreq><lastmod>2025-09-01T17:06:10+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/when-compliance-meets-devsecops-unseen-pci-gdpr-soc-pitfalls</loc><changefreq>weekly</changefreq><lastmod>2025-09-01T16:58:56+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/ai-in-devsecops-unseen-risks-of-using-chatgpt-copilot-in-code-pipeline</loc><changefreq>weekly</changefreq><lastmod>2025-09-01T16:49:58+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/the-unseen-role-of-dns-security-in-devsecops-pipelines</loc><changefreq>weekly</changefreq><lastmod>2025-09-01T16:41:42+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/from-code-to-compliance-unseen-devsecops-tools-that-make-audits-easy</loc><changefreq>weekly</changefreq><lastmod>2025-09-01T16:31:25+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/how-to-automate-threat-modeling-in-cicd-the-unseen-step-that-changes-everything</loc><changefreq>weekly</changefreq><lastmod>2025-09-01T16:12:06+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/unseen-logs-are-you-really-monitoring-your-cicd-and-iac-deployments</loc><changefreq>weekly</changefreq><lastmod>2025-09-01T15:05:40+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/zero-trust-in-devsecops-beyond-the-buzzword</loc><changefreq>weekly</changefreq><lastmod>2025-09-01T14:42:32+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/devsecops-red-teaming-how-attackers-actually-exploit-your-pipelines</loc><changefreq>weekly</changefreq><lastmod>2025-09-01T14:33:51+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/zombie-containers-how-abandoned-pods-can-become-an-attackers-playground</loc><changefreq>weekly</changefreq><lastmod>2025-09-01T14:19:09+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/what-no-one-tells-you-about-infrastructure-drift-in-devsecops</loc><changefreq>weekly</changefreq><lastmod>2025-09-01T14:12:07+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/the-hidden-costs-of-ignoring-sboms-in-devsecops</loc><changefreq>weekly</changefreq><lastmod>2025-09-01T14:01:52+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/unseen-attack-vectors-in-devsecops-when-bots-target-your-build-systems</loc><changefreq>weekly</changefreq><lastmod>2025-09-01T13:53:49+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/shadow-apis-the-invisible-risk-in-your-devsecops-environment</loc><changefreq>weekly</changefreq><lastmod>2025-09-01T13:43:21+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/secrets-sprawl-how-your-cicd-pipelines-are-leaking-credentials-without-you-knowing</loc><changefreq>weekly</changefreq><lastmod>2025-09-01T13:35:32+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/10-hidden-devsecops-misconfigurations-that-can-sink-your-cloud-security</loc><changefreq>weekly</changefreq><lastmod>2025-09-01T13:28:51+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/osint-more-than-googling</loc><changefreq>weekly</changefreq><lastmod>2025-08-29T17:53:11+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/cloud-security-ai-penetration-testing-trends-2025</loc><changefreq>weekly</changefreq><lastmod>2025-08-29T16:21:26+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/dell-reconnaissance-osint-bug-bounty</loc><changefreq>weekly</changefreq><lastmod>2025-09-01T16:41:28+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/compliance-trends-challenges-strategies-2025</loc><changefreq>weekly</changefreq><lastmod>2025-08-28T17:22:09+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/cpu-privilege-levels-user-kernel-hypervisor-security</loc><changefreq>weekly</changefreq><lastmod>2025-08-28T16:31:15+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/how-to-pentest-llms-ai-security-testing-guide</loc><changefreq>weekly</changefreq><lastmod>2025-08-28T11:31:59+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/inside-windows-process-creation</loc><changefreq>weekly</changefreq><lastmod>2025-08-28T11:52:05+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/rust-memory-safety-protection</loc><changefreq>weekly</changefreq><lastmod>2025-08-28T11:52:28+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/salesloft-oauth-breach-drift-ai-chat-agent-exposes-salesforce-data</loc><changefreq>weekly</changefreq><lastmod>2025-08-27T18:20:48+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/ai-security-threats-wild-2025</loc><changefreq>weekly</changefreq><lastmod>2025-08-27T18:19:23+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/critical-wing-ftp-server-vulnerability-cve-2025-47812-exploited</loc><changefreq>weekly</changefreq><lastmod>2025-08-28T10:59:44+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/cve-2025-8088-winrar-zero-day-exploit</loc><changefreq>weekly</changefreq><lastmod>2025-08-27T17:48:14+05:30</lastmod><priority>0.8</priority></url><url><loc>https://blog.intelligencex.org/social-security-data-breach-august-2025</loc><changefreq>weekly</changefreq><lastmod>2025-08-28T17:03:45+05:30</lastmod><priority>0.8</priority></url></urlset>
