<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated by All in One SEO - the original SEO plugin for WordPress. -->
<rss version="2.0">
	<channel>
		<title>Clear Infosec</title>
		<link><![CDATA[https://clearinfosec.com]]></link>
		<description><![CDATA[Clear Infosec]]></description>
		<lastBuildDate><![CDATA[2026-01-21T09:43:00+00:00]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<ttl>0</ttl>

		<item>
			<guid><![CDATA[https://clearinfosec.com/privacy-policy/]]></guid>
			<link><![CDATA[https://clearinfosec.com/privacy-policy/]]></link>
			<title>Privacy Policy</title>
			<pubDate><![CDATA[2026-01-21T09:43:00+00:00]]></pubDate>
		</item>
		<item>
			<guid><![CDATA[https://clearinfosec.com/dangerous-outlook-rce-flaw-exposed-technical-breakdown-mitigation-guide/]]></guid>
			<link><![CDATA[https://clearinfosec.com/dangerous-outlook-rce-flaw-exposed-technical-breakdown-mitigation-guide/]]></link>
			<title>Dangerous Outlook RCE Flaw Exposed: Technical Breakdown &#038; Mitigation Guide</title>
			<pubDate><![CDATA[2025-12-01T15:25:45+00:00]]></pubDate>
		</item>
		<item>
			<guid><![CDATA[https://clearinfosec.com/critical-site-takeover-flaw-affects-400k-wordpress-sites/]]></guid>
			<link><![CDATA[https://clearinfosec.com/critical-site-takeover-flaw-affects-400k-wordpress-sites/]]></link>
			<title>Critical Site Takeover Flaw Affects 400K WordPress Sites</title>
			<pubDate><![CDATA[2025-11-07T06:28:28+00:00]]></pubDate>
		</item>
		<item>
			<guid><![CDATA[https://clearinfosec.com/adopting-zero-trust-model/]]></guid>
			<link><![CDATA[https://clearinfosec.com/adopting-zero-trust-model/]]></link>
			<title>Adopting Zero Trust Model</title>
			<pubDate><![CDATA[2025-09-19T13:15:31+00:00]]></pubDate>
		</item>
		<item>
			<guid><![CDATA[https://clearinfosec.com/potato1-vulnhub-walkthrough/]]></guid>
			<link><![CDATA[https://clearinfosec.com/potato1-vulnhub-walkthrough/]]></link>
			<title>Potato:1 Vulnhub Walkthrough</title>
			<pubDate><![CDATA[2025-09-19T13:09:42+00:00]]></pubDate>
		</item>
		<item>
			<guid><![CDATA[https://clearinfosec.com/how-cisos-can-drive-secure-ai-governance/]]></guid>
			<link><![CDATA[https://clearinfosec.com/how-cisos-can-drive-secure-ai-governance/]]></link>
			<title>How CISOs Can Drive Secure AI Governance</title>
			<pubDate><![CDATA[2025-09-18T12:36:47+00:00]]></pubDate>
		</item>
		<item>
			<guid><![CDATA[https://clearinfosec.com/cpus-and-registers/]]></guid>
			<link><![CDATA[https://clearinfosec.com/cpus-and-registers/]]></link>
			<title>CPUs and Registers</title>
			<pubDate><![CDATA[2025-09-02T17:33:42+00:00]]></pubDate>
		</item>
		<item>
			<guid><![CDATA[https://clearinfosec.com/charon-ransomware-targets-middle-east-with-apt-tactics/]]></guid>
			<link><![CDATA[https://clearinfosec.com/charon-ransomware-targets-middle-east-with-apt-tactics/]]></link>
			<title>Charon Ransomware Targets Middle East with APT Tactics</title>
			<pubDate><![CDATA[2025-08-14T13:03:21+00:00]]></pubDate>
		</item>
		<item>
			<guid><![CDATA[https://clearinfosec.com/is-integrated-grc-the-future-of-compliance/]]></guid>
			<link><![CDATA[https://clearinfosec.com/is-integrated-grc-the-future-of-compliance/]]></link>
			<title>Is Integrated GRC the Future of Compliance?</title>
			<pubDate><![CDATA[2025-08-07T06:16:45+00:00]]></pubDate>
		</item>
		<item>
			<guid><![CDATA[https://clearinfosec.com/5-identity-attack-tactics-used-against-global-retail-brands/]]></guid>
			<link><![CDATA[https://clearinfosec.com/5-identity-attack-tactics-used-against-global-retail-brands/]]></link>
			<title>5 Identity Attack Tactics Used Against Global Retail Brands</title>
			<pubDate><![CDATA[2025-07-23T12:40:44+00:00]]></pubDate>
		</item>
		<item>
			<guid><![CDATA[https://clearinfosec.com/golden-dmsa-attack-a-new-stealth-technique-that-bypasses-windows-security/]]></guid>
			<link><![CDATA[https://clearinfosec.com/golden-dmsa-attack-a-new-stealth-technique-that-bypasses-windows-security/]]></link>
			<title>Golden DMSA Attack: A New Stealth Technique That Bypasses Windows Security</title>
			<pubDate><![CDATA[2025-07-16T17:54:15+00:00]]></pubDate>
		</item>
		<item>
			<guid><![CDATA[https://clearinfosec.com/ransomware-skies-crashing-defenses-a-cybersecurity-recap/]]></guid>
			<link><![CDATA[https://clearinfosec.com/ransomware-skies-crashing-defenses-a-cybersecurity-recap/]]></link>
			<title>Ransomware Skies &#038; Crashing Defenses: A Cybersecurity Recap</title>
			<pubDate><![CDATA[2025-07-04T17:04:07+00:00]]></pubDate>
		</item>
		<item>
			<guid><![CDATA[https://clearinfosec.com/security-at-a-breaking-point-key-lessons-from-this-weeks-major-exploits/]]></guid>
			<link><![CDATA[https://clearinfosec.com/security-at-a-breaking-point-key-lessons-from-this-weeks-major-exploits/]]></link>
			<title>Security at a Breaking Point? Key Lessons from This Week&#8217;s Major Exploits</title>
			<pubDate><![CDATA[2025-06-09T17:17:22+00:00]]></pubDate>
		</item>
		<item>
			<guid><![CDATA[https://clearinfosec.com/why-exposed-credentials-remain-a-security-risk/]]></guid>
			<link><![CDATA[https://clearinfosec.com/why-exposed-credentials-remain-a-security-risk/]]></link>
			<title>Why Exposed Credentials Remain a Security Risk</title>
			<pubDate><![CDATA[2025-06-02T14:11:13+00:00]]></pubDate>
		</item>
		<item>
			<guid><![CDATA[https://clearinfosec.com/the-ad-pentest-mindset/]]></guid>
			<link><![CDATA[https://clearinfosec.com/the-ad-pentest-mindset/]]></link>
			<title>The AD Pentest Mindset</title>
			<pubDate><![CDATA[2025-05-09T15:28:44+00:00]]></pubDate>
		</item>
		<item>
			<guid><![CDATA[https://clearinfosec.com/salt-typhoon-strikes-over-1000-cisco-devices-compromised/]]></guid>
			<link><![CDATA[https://clearinfosec.com/salt-typhoon-strikes-over-1000-cisco-devices-compromised/]]></link>
			<title>Salt Typhoon Strikes: Over 1,000 Cisco Devices Compromised</title>
			<pubDate><![CDATA[2025-02-14T12:39:03+00:00]]></pubDate>
		</item>
		<item>
			<guid><![CDATA[https://clearinfosec.com/openai-data-breach-exposes-20-million-user-credentials/]]></guid>
			<link><![CDATA[https://clearinfosec.com/openai-data-breach-exposes-20-million-user-credentials/]]></link>
			<title>OpenAI Data Breach Exposes 20 Million User Credentials: What You Need to Know</title>
			<pubDate><![CDATA[2025-02-06T19:06:52+00:00]]></pubDate>
		</item>
		<item>
			<guid><![CDATA[https://clearinfosec.com/connecting-kali-linux-to-active-directory-made-easy/]]></guid>
			<link><![CDATA[https://clearinfosec.com/connecting-kali-linux-to-active-directory-made-easy/]]></link>
			<title>Connecting Kali Linux to Active Directory Made Easy</title>
			<pubDate><![CDATA[2024-11-21T11:23:53+00:00]]></pubDate>
		</item>
		<item>
			<guid><![CDATA[https://clearinfosec.com/2024s-leading-malware-techniques-you-should-know/]]></guid>
			<link><![CDATA[https://clearinfosec.com/2024s-leading-malware-techniques-you-should-know/]]></link>
			<title>2024’s Leading Malware Techniques You Should Know</title>
			<pubDate><![CDATA[2024-11-11T17:18:25+00:00]]></pubDate>
		</item>
		<item>
			<guid><![CDATA[https://clearinfosec.com/gitex-global-2024/]]></guid>
			<link><![CDATA[https://clearinfosec.com/gitex-global-2024/]]></link>
			<title>GITEX Global 2024</title>
			<pubDate><![CDATA[2024-09-18T07:31:55+00:00]]></pubDate>
		</item>
		<item>
			<guid><![CDATA[https://clearinfosec.com/enhancing-digital-security-in-dubai-the-national-cybersecurity-strategy-and-key-initiatives/]]></guid>
			<link><![CDATA[https://clearinfosec.com/enhancing-digital-security-in-dubai-the-national-cybersecurity-strategy-and-key-initiatives/]]></link>
			<title>Enhancing Digital Security in Dubai: The National Cybersecurity Strategy and Key Initiatives</title>
			<pubDate><![CDATA[2024-08-20T07:19:38+00:00]]></pubDate>
		</item>
		<item>
			<guid><![CDATA[https://clearinfosec.com/email-attacks-on-the-rise-uae-faces-growing-malware-risks/]]></guid>
			<link><![CDATA[https://clearinfosec.com/email-attacks-on-the-rise-uae-faces-growing-malware-risks/]]></link>
			<title>Email Attacks on the Rise: UAE Faces Growing Malware Risks</title>
			<pubDate><![CDATA[2024-08-16T07:19:23+00:00]]></pubDate>
		</item>
		<item>
			<guid><![CDATA[https://clearinfosec.com/kerberos-the-what-how-and-why/]]></guid>
			<link><![CDATA[https://clearinfosec.com/kerberos-the-what-how-and-why/]]></link>
			<title>Kerberos – The What, How and Why?</title>
			<pubDate><![CDATA[2024-08-01T14:05:45+00:00]]></pubDate>
		</item>
		<item>
			<guid><![CDATA[https://clearinfosec.com/navigating-the-future-key-cybersecurity-trends-shaping-the-uae-in-2024/]]></guid>
			<link><![CDATA[https://clearinfosec.com/navigating-the-future-key-cybersecurity-trends-shaping-the-uae-in-2024/]]></link>
			<title>Navigating the Future: Key Cybersecurity Trends Shaping the UAE in 2024</title>
			<pubDate><![CDATA[2024-07-23T12:06:10+00:00]]></pubDate>
		</item>
		<item>
			<guid><![CDATA[https://clearinfosec.com/contact-us/]]></guid>
			<link><![CDATA[https://clearinfosec.com/contact-us/]]></link>
			<title>Contact Us</title>
			<pubDate><![CDATA[2024-07-22T03:03:43+00:00]]></pubDate>
		</item>
		<item>
			<guid><![CDATA[https://clearinfosec.com/active-directory-the-what-how-and-why/]]></guid>
			<link><![CDATA[https://clearinfosec.com/active-directory-the-what-how-and-why/]]></link>
			<title>Active Directory – The What, How and Why?</title>
			<pubDate><![CDATA[2024-06-28T14:13:06+00:00]]></pubDate>
		</item>
		<item>
			<guid><![CDATA[https://clearinfosec.com/alleged-ransomware-attack-targets-dubai-government/]]></guid>
			<link><![CDATA[https://clearinfosec.com/alleged-ransomware-attack-targets-dubai-government/]]></link>
			<title>Alleged Ransomware Attack Targets Dubai Government</title>
			<pubDate><![CDATA[2024-06-12T17:52:18+00:00]]></pubDate>
		</item>
		<item>
			<guid><![CDATA[https://clearinfosec.com/understanding-the-importance-of-a-penetration-testing-execution-standard/]]></guid>
			<link><![CDATA[https://clearinfosec.com/understanding-the-importance-of-a-penetration-testing-execution-standard/]]></link>
			<title>Understanding the Importance of a Penetration Testing Execution Standard</title>
			<pubDate><![CDATA[2024-06-04T13:35:09+00:00]]></pubDate>
		</item>
		<item>
			<guid><![CDATA[https://clearinfosec.com/2025-comprehensive-guide-to-saas-security-posture-management/]]></guid>
			<link><![CDATA[https://clearinfosec.com/2025-comprehensive-guide-to-saas-security-posture-management/]]></link>
			<title>2025 Comprehensive Guide to SaaS Security Posture Management</title>
			<pubDate><![CDATA[2024-05-28T15:28:21+00:00]]></pubDate>
		</item>
		<item>
			<guid><![CDATA[https://clearinfosec.com/black-basta-ransomware-targets-over-500-entities-globally/]]></guid>
			<link><![CDATA[https://clearinfosec.com/black-basta-ransomware-targets-over-500-entities-globally/]]></link>
			<title>Black Basta Ransomware Targets Over 500 Entities Globally</title>
			<pubDate><![CDATA[2024-05-16T17:02:03+00:00]]></pubDate>
		</item>
		<item>
			<guid><![CDATA[https://clearinfosec.com/iso-270012013-vs-iso-270012022/]]></guid>
			<link><![CDATA[https://clearinfosec.com/iso-270012013-vs-iso-270012022/]]></link>
			<title>ISO 27001:2013 vs. ISO 27001:2022</title>
			<pubDate><![CDATA[2024-04-30T18:26:52+00:00]]></pubDate>
		</item>
		<item>
			<guid><![CDATA[https://clearinfosec.com/maximizing-data-governance-and-privacy-a-holistic-approach-with-grc-tools/]]></guid>
			<link><![CDATA[https://clearinfosec.com/maximizing-data-governance-and-privacy-a-holistic-approach-with-grc-tools/]]></link>
			<title>Maximizing Data Governance and Privacy: A Holistic Approach with GRC Tools</title>
			<pubDate><![CDATA[2024-04-05T13:44:30+00:00]]></pubDate>
		</item>
		<item>
			<guid><![CDATA[https://clearinfosec.com/strelastealer-the-growing-threat-landscape/]]></guid>
			<link><![CDATA[https://clearinfosec.com/strelastealer-the-growing-threat-landscape/]]></link>
			<title>StrelaStealer: The Growing Threat Landscape</title>
			<pubDate><![CDATA[2024-04-01T14:46:27+00:00]]></pubDate>
		</item>
		<item>
			<guid><![CDATA[https://clearinfosec.com/unveiling-the-menace-loop-denial-of-service-dos-attacks/]]></guid>
			<link><![CDATA[https://clearinfosec.com/unveiling-the-menace-loop-denial-of-service-dos-attacks/]]></link>
			<title>Unveiling the Menace: Loop Denial-of-Service (DoS) Attacks</title>
			<pubDate><![CDATA[2024-03-26T20:53:40+00:00]]></pubDate>
		</item>
		<item>
			<guid><![CDATA[https://clearinfosec.com/network-visibility-assessments-2/]]></guid>
			<link><![CDATA[https://clearinfosec.com/network-visibility-assessments-2/]]></link>
			<title>Network Visibility Assessments</title>
			<pubDate><![CDATA[2024-03-21T10:22:44+00:00]]></pubDate>
		</item>
		<item>
			<guid><![CDATA[https://clearinfosec.com/network-visibility-assessments/]]></guid>
			<link><![CDATA[https://clearinfosec.com/network-visibility-assessments/]]></link>
			<title>Network Visibility Assessments &#8211; old</title>
			<pubDate><![CDATA[2024-03-21T08:56:30+00:00]]></pubDate>
		</item>
		<item>
			<guid><![CDATA[https://clearinfosec.com/advanced-threat-modeling-with-nist-csf-technical-strategies-for-effective-risk-management/]]></guid>
			<link><![CDATA[https://clearinfosec.com/advanced-threat-modeling-with-nist-csf-technical-strategies-for-effective-risk-management/]]></link>
			<title>Advanced Threat Modeling with NIST CSF: Technical Strategies for Effective Risk Management</title>
			<pubDate><![CDATA[2024-03-18T14:14:15+00:00]]></pubDate>
		</item>
		<item>
			<guid><![CDATA[https://clearinfosec.com/nist-cybersecurity-framework-2-0-a-comprehensive-guide-to-enhanced-digital-defense/]]></guid>
			<link><![CDATA[https://clearinfosec.com/nist-cybersecurity-framework-2-0-a-comprehensive-guide-to-enhanced-digital-defense/]]></link>
			<title>NIST Cybersecurity Framework 2.0: A Comprehensive Guide to Enhanced Digital Defense</title>
			<pubDate><![CDATA[2024-02-28T11:50:24+00:00]]></pubDate>
		</item>
		<item>
			<guid><![CDATA[https://clearinfosec.com/microsoft-azures-biggest-security-crisis-massive-data-breach-puts-executive-accounts-at-risk/]]></guid>
			<link><![CDATA[https://clearinfosec.com/microsoft-azures-biggest-security-crisis-massive-data-breach-puts-executive-accounts-at-risk/]]></link>
			<title>Microsoft Azure&#8217;s Biggest Security Crisis: : Massive Data Breach Puts Executive Accounts at Risk</title>
			<pubDate><![CDATA[2024-02-26T12:36:14+00:00]]></pubDate>
		</item>
		<item>
			<guid><![CDATA[https://clearinfosec.com/security-awareness-training/]]></guid>
			<link><![CDATA[https://clearinfosec.com/security-awareness-training/]]></link>
			<title>Security Awareness Training</title>
			<pubDate><![CDATA[2024-01-25T13:57:05+00:00]]></pubDate>
		</item>
		<item>
			<guid><![CDATA[https://clearinfosec.com/be-diligent-while-watching-or-skipping-ads-in-between-your-favourite-youtube-videos/]]></guid>
			<link><![CDATA[https://clearinfosec.com/be-diligent-while-watching-or-skipping-ads-in-between-your-favourite-youtube-videos/]]></link>
			<title>Be diligent while watching or skipping ads in between your favourite youtube videos</title>
			<pubDate><![CDATA[2024-01-22T18:41:16+00:00]]></pubDate>
		</item>
		<item>
			<guid><![CDATA[https://clearinfosec.com/compliance-advisory/]]></guid>
			<link><![CDATA[https://clearinfosec.com/compliance-advisory/]]></link>
			<title>Compliance Advisory</title>
			<pubDate><![CDATA[2024-01-18T16:14:54+00:00]]></pubDate>
		</item>
		<item>
			<guid><![CDATA[https://clearinfosec.com/risk-advisory/]]></guid>
			<link><![CDATA[https://clearinfosec.com/risk-advisory/]]></link>
			<title>Risk Advisory</title>
			<pubDate><![CDATA[2024-01-18T15:58:30+00:00]]></pubDate>
		</item>
		<item>
			<guid><![CDATA[https://clearinfosec.com/soc-services/]]></guid>
			<link><![CDATA[https://clearinfosec.com/soc-services/]]></link>
			<title>SOC Services</title>
			<pubDate><![CDATA[2024-01-12T13:42:14+00:00]]></pubDate>
		</item>
		<item>
			<guid><![CDATA[https://clearinfosec.com/mdr-services/]]></guid>
			<link><![CDATA[https://clearinfosec.com/mdr-services/]]></link>
			<title>MDR Services</title>
			<pubDate><![CDATA[2024-01-12T13:09:38+00:00]]></pubDate>
		</item>
		<item>
			<guid><![CDATA[https://clearinfosec.com/unveiling-how-malware-defies-password-resets-via-google-multilogin-exploit/]]></guid>
			<link><![CDATA[https://clearinfosec.com/unveiling-how-malware-defies-password-resets-via-google-multilogin-exploit/]]></link>
			<title>Unveiling How Malware Defies Password Resets via Google MultiLogin Exploit</title>
			<pubDate><![CDATA[2024-01-11T18:31:07+00:00]]></pubDate>
		</item>
		<item>
			<guid><![CDATA[https://clearinfosec.com/end-point-protection/]]></guid>
			<link><![CDATA[https://clearinfosec.com/end-point-protection/]]></link>
			<title>End Point Protection</title>
			<pubDate><![CDATA[2024-01-11T07:19:20+00:00]]></pubDate>
		</item>
		<item>
			<guid><![CDATA[https://clearinfosec.com/ciso-as-a-service/]]></guid>
			<link><![CDATA[https://clearinfosec.com/ciso-as-a-service/]]></link>
			<title>CISO as a Service</title>
			<pubDate><![CDATA[2024-01-09T19:18:24+00:00]]></pubDate>
		</item>
		<item>
			<guid><![CDATA[https://clearinfosec.com/exploiting-google-oauth-endpoint-for-unauthorized-user-session-hijacking/]]></guid>
			<link><![CDATA[https://clearinfosec.com/exploiting-google-oauth-endpoint-for-unauthorized-user-session-hijacking/]]></link>
			<title>Exploiting Google OAuth Endpoint for Unauthorized User Session Hijacking</title>
			<pubDate><![CDATA[2024-01-04T16:31:06+00:00]]></pubDate>
		</item>
		<item>
			<guid><![CDATA[https://clearinfosec.com/incident-response/]]></guid>
			<link><![CDATA[https://clearinfosec.com/incident-response/]]></link>
			<title>Incident Response</title>
			<pubDate><![CDATA[2023-12-01T15:35:00+00:00]]></pubDate>
		</item>
	</channel>
</rss>