<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//asecurityguru.com/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://asecurityguru.com/</loc>
		<lastmod>2026-05-22T12:00:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://asecurityguru.com/cve-2026-42897-complete-security-analysis/</loc>
		<lastmod>2026-05-22T12:00:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://asecurityguru.com/target-corporation-breach-2013-when-alerts-were-ignored-and-292-million-was-lost/</loc>
		<lastmod>2026-02-23T06:04:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://asecurityguru.com/the-jpmorgan-chase-data-breach-2014-when-compromised-credentials-led-to-the-largest-bank-hack-in-history/</loc>
		<lastmod>2026-02-23T05:31:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://asecurityguru.com/the-capital-one-data-breach-2019-lessons-in-cloud-security-and-misconfiguration/</loc>
		<lastmod>2026-02-23T05:21:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://asecurityguru.com/lead-security-engineer/</loc>
		<lastmod>2026-01-19T05:56:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://asecurityguru.com/principal-security-engineer/</loc>
		<lastmod>2026-01-19T05:55:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://asecurityguru.com/senior-product-security-engineer/</loc>
		<lastmod>2026-01-19T05:53:46+00:00</lastmod>
		<image:image>
			<image:loc>http://asecurityguru.com/wp-content/uploads/2026/01/image-2.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://asecurityguru.com/associate-security-consultant/</loc>
		<lastmod>2026-01-19T05:49:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://asecurityguru.com/cyber-security-analyst/</loc>
		<lastmod>2026-01-19T05:44:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://asecurityguru.com/mastering-prompt-engineering-with-github-copilot/</loc>
		<lastmod>2025-02-20T08:07:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://asecurityguru.com/master-gitops-with-terraform-aks-and-aws/</loc>
		<lastmod>2025-02-14T06:32:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://asecurityguru.com/learn-about-gitops/</loc>
		<lastmod>2025-02-10T08:23:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://asecurityguru.com/learn-to-deploy-argocd-on-azure-kubernetes/</loc>
		<lastmod>2025-02-03T07:43:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://asecurityguru.com/create-an-ec2-instance-using-terraform/</loc>
		<lastmod>2025-01-31T07:09:16+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Rank Math SEO Plugin (c) Rank Math - rankmath.com -->