<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
	xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"
	xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
	xmlns:news="http://www.google.com/schemas/sitemap-news/0.9"
	xmlns:image="http://www.google.com/schemas/sitemap-image/1.1"
	>
<url><loc>https://cisspmadeeasy.com/2026/05/14/privilege-escalation-ibm-security-tip/</loc><news:news><news:publication><news:name>CISSP Made Easy</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-14T00:16:55+00:00</news:publication_date><news:title>Privilege Escalation: How Attackers Gain Unauthorised System Control</news:title><news:keywords>Attack, Privilege Escalation, Access Control</news:keywords></news:news></url><url><loc>https://cisspmadeeasy.com/2026/05/14/zero-day-attacks-ibm-security-tip/</loc><news:news><news:publication><news:name>CISSP Made Easy</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-14T00:15:27+00:00</news:publication_date><news:title>Zero-Day Attacks: What They Are and How to Defend Against Them</news:title><news:keywords>Defence, Zero-Day, Vulnerability, Exploit</news:keywords></news:news></url><url><loc>https://cisspmadeeasy.com/2026/05/14/brute-force-attacks-ibm-security-tip/</loc><news:news><news:publication><news:name>CISSP Made Easy</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-14T00:14:03+00:00</news:publication_date><news:title>Brute Force Attacks: How Attackers Crack Passwords and How to Stop Them</news:title><news:keywords>Attack, Brute Force, Authentication, Password Security</news:keywords></news:news></url><url><loc>https://cisspmadeeasy.com/2026/05/14/directory-indexing-ibm-security-tip/</loc><news:news><news:publication><news:name>CISSP Made Easy</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-14T00:12:39+00:00</news:publication_date><news:title>Directory Indexing Attacks: When Your Web Server Reveals Too Much</news:title><news:keywords>Attack, Directory Indexing, Information Disclosure, Web Security</news:keywords></news:news></url><url><loc>https://cisspmadeeasy.com/2026/05/14/information-leakage-ibm-security-tip/</loc><news:news><news:publication><news:name>CISSP Made Easy</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-14T00:11:38+00:00</news:publication_date><news:title>Information Leakage Attacks: How Applications Unintentionally Reveal Sensitive Data</news:title><news:keywords>Attack, Web Security, Information Leakage, SQL Injection</news:keywords></news:news></url><url><loc>https://cisspmadeeasy.com/2026/05/14/smtp-auth-ibm-security-tip/</loc><news:news><news:publication><news:name>CISSP Made Easy</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-14T00:10:10+00:00</news:publication_date><news:title>SMTP-AUTH: Securing Email Transmission and Preventing Spam Relay</news:title><news:keywords>Protocol, Authentication, SMTP, Email Security</news:keywords></news:news></url><url><loc>https://cisspmadeeasy.com/2026/05/14/http-verb-tampering-ibm-security-tip/</loc><news:news><news:publication><news:name>CISSP Made Easy</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-14T00:07:59+00:00</news:publication_date><news:title>HTTP Verb Tampering: Bypassing Security Controls with Unexpected HTTP Methods</news:title><news:keywords>Attack, Access Control, Web Security, HTTP</news:keywords></news:news></url><url><loc>https://cisspmadeeasy.com/2026/05/14/site-probing-ibm-security-tip/</loc><news:news><news:publication><news:name>CISSP Made Easy</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-14T00:05:07+00:00</news:publication_date><news:title>Site Probing: How Attackers Scan and Map Your Web Application</news:title><news:keywords>Attack, Web Security, Reconnaissance</news:keywords></news:news></url><url><loc>https://cisspmadeeasy.com/2026/05/14/email-spoofing-ibm-security-tip/</loc><news:news><news:publication><news:name>CISSP Made Easy</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-14T00:03:04+00:00</news:publication_date><news:title>E-mail Spoofing: Forged Emails and How to Detect and Prevent Them</news:title><news:keywords>Attack, Social Engineering, SMTP, Email Security</news:keywords></news:news></url><url><loc>https://cisspmadeeasy.com/2026/05/14/scareware-ibm-security-tip/</loc><news:news><news:publication><news:name>CISSP Made Easy</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-14T00:00:53+00:00</news:publication_date><news:title>Scareware: How Fake Security Alerts Trick Users into Installing Malware</news:title><news:keywords>malware, Scareware, Social Engineering, User Awareness</news:keywords></news:news></url><url><loc>https://cisspmadeeasy.com/2026/05/14/tls-ibm-security-tip/</loc><news:news><news:publication><news:name>CISSP Made Easy</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-13T23:59:34+00:00</news:publication_date><news:title>Transport Layer Security (TLS): How It Protects Your Data in Transit</news:title><news:keywords>encryption, Defence, TLS, SSL, Protocol</news:keywords></news:news></url><url><loc>https://cisspmadeeasy.com/2026/05/14/sandboxing-ibm-security-tip/</loc><news:news><news:publication><news:name>CISSP Made Easy</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-13T23:58:01+00:00</news:publication_date><news:title>Sandboxing: Running Untrusted Code Safely</news:title><news:keywords>malware, Defence, Sandboxing, Isolation</news:keywords></news:news></url><url><loc>https://cisspmadeeasy.com/2026/05/14/footprinting-ibm-security-tip/</loc><news:news><news:publication><news:name>CISSP Made Easy</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-13T23:56:27+00:00</news:publication_date><news:title>Footprinting: How Hackers Build a Profile of Your Organisation</news:title><news:keywords>Reconnaissance, OSINT, Network Security, Footprinting</news:keywords></news:news></url><url><loc>https://cisspmadeeasy.com/2026/05/14/os-commanding-ibm-security-tip/</loc><news:news><news:publication><news:name>CISSP Made Easy</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-13T23:55:14+00:00</news:publication_date><news:title>OS Commanding Attacks: Injecting System Commands Through Web Applications</news:title><news:keywords>Attack, Web Security, Injection, OS Commanding</news:keywords></news:news></url><url><loc>https://cisspmadeeasy.com/2026/05/14/xpath-injection-ibm-security-tip/</loc><news:news><news:publication><news:name>CISSP Made Easy</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-13T23:54:15+00:00</news:publication_date><news:title>XPath Injection Attacks: SQL Injection&#8217;s XML Counterpart</news:title><news:keywords>Attack, Injection, XPath Injection, XML Security</news:keywords></news:news></url><url><loc>https://cisspmadeeasy.com/2026/05/14/reverse-social-engineering-ibm-security-tip/</loc><news:news><news:publication><news:name>CISSP Made Easy</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-13T23:51:37+00:00</news:publication_date><news:title>Reverse Social Engineering: When the Attacker Becomes the Expert You Trust</news:title><news:keywords>Attack, Social Engineering, User Awareness</news:keywords></news:news></url><url><loc>https://cisspmadeeasy.com/2026/05/14/format-string-attacks-ibm-security-tip/</loc><news:news><news:publication><news:name>CISSP Made Easy</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-13T23:47:51+00:00</news:publication_date><news:title>Format String Attacks: How Printf Vulnerabilities Enable Memory Exploitation</news:title><news:keywords>Attack, Format String, Memory Exploitation</news:keywords></news:news></url><url><loc>https://cisspmadeeasy.com/2026/05/14/ftp-security-ibm-security-tip/</loc><news:news><news:publication><news:name>CISSP Made Easy</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-13T23:45:08+00:00</news:publication_date><news:title>FTP Security: Risks, SFTP Migration, and Securing File Transfer</news:title><news:keywords>Attack, Protocol, FTP, File Transfer</news:keywords></news:news></url><url><loc>https://cisspmadeeasy.com/2026/05/13/code-signing-ibm-security-tip/</loc><news:news><news:publication><news:name>CISSP Made Easy</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-13T10:32:50+00:00</news:publication_date><news:title>Code Signing: Establishing Trust in Internet-Distributed Software</news:title><news:keywords>Defence, Code Signing, PKI</news:keywords></news:news></url><url><loc>https://cisspmadeeasy.com/2026/05/13/sql-injection-ibm-security-tip/</loc><news:news><news:publication><news:name>CISSP Made Easy</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-13T10:30:27+00:00</news:publication_date><news:title>SQL Injection: The Attack That Can Empty Your Entire Database</news:title><news:keywords>Attack, Web Security, SQL Injection, Database Security</news:keywords></news:news></url><url><loc>https://cisspmadeeasy.com/2026/05/13/dmz-protocol-attacks-ibm-security-tip/</loc><news:news><news:publication><news:name>CISSP Made Easy</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-13T10:26:06+00:00</news:publication_date><news:title>DMZ Protocol Attacks: Threats to Your Network&#8217;s Buffer Zone</news:title><news:keywords>Attack, Protocol, Network Security, DMZ</news:keywords></news:news></url><url><loc>https://cisspmadeeasy.com/2026/05/13/npm-supply-chain-attack-tanstack-mistral-2026/</loc><news:news><news:publication><news:name>CISSP Made Easy</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-13T08:00:00+00:00</news:publication_date><news:title>The npm Supply Chain Attack</news:title><news:keywords>CISSP, CCSP, malware, npm, Supply Chain Attack, AAISM, Zero Trust, Mistral AI, Developer Security</news:keywords></news:news></url></urlset>
