<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" generatedBy="WIX">
<url>
<loc>https://www.aquilai.ae/post/what-is-domain-spoofing</loc>
<lastmod>2025-10-28</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/cb82e0_c9cec76718c14af7a03364781f0a6547~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/automating-threat-validation-with-aquila-i-s-bas-platform</loc>
<lastmod>2025-08-13</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/cb82e0_98d66cb125be4d658f622dd04153c9ea~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/integrating-bas-into-soc-workflows</loc>
<lastmod>2025-08-13</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/cb82e0_cdfa14ba224b441ba895bf8bdbfab983~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/how-digital-risk-monitoring-helps-in-fraud-detection</loc>
<lastmod>2025-08-24</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/cb82e0_4b81a003ccaa48e687555b4e077b4877~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/gisec-2023-dubai</loc>
<lastmod>2023-03-13</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/835840_25c5b943cee04ad4bd78048d3ebe9d29~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/cybercriminals-use-svb-s-collapse-to-steal-customer-funds-data</loc>
<lastmod>2023-03-21</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/835840_61c972e01bc94072b990b7f9c39fa60a~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/email-security-meet-2023</loc>
<lastmod>2023-03-09</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/835840_c3bdeebcf2aa4d18af7d4bf5345d033f~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/what-is-breach-attack-simulation-bas-and-why-every-business-needs-it</loc>
<lastmod>2025-05-14</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/589544_c976a34d3411404ca622905c7ab8c9a6~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/ransomware-attack-on-fruit-giant</loc>
<lastmod>2023-03-14</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/835840_bb8fa7696c3a4462bae115c24e521421~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/digital-risk-monitoring-in-preventing-phishing-and-domain-spoofing</loc>
<lastmod>2025-08-24</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/cb82e0_eb3ff8229f0d4e4fa24242b946d9f876~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/monitoring-the-dark-web-for-corporate-threats</loc>
<lastmod>2025-08-24</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/cb82e0_37f7314a0aad4aacad83721c7b613a21~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/drm-for-brand-protection-and-reputation-management</loc>
<lastmod>2025-08-24</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/cb82e0_2aca817898784909b5cf8f570b4212fc~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/digital-risk-monitoring-and-regulatory-compliance-a-perfect-match</loc>
<lastmod>2025-08-24</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/cb82e0_2bb54c04062f4743b20b1154d0afeed8~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/jaguar-land-rover-cyber-attack-hackers-shutdowns-and-the-case-for-breach-attack-simulation</loc>
<lastmod>2025-09-12</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/cb82e0_68663ba7929d4fbcbb3141f5bde00cb1~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/hackers-widely-exploited-gitlab-s-unauthenticated-rce-flaw</loc>
<lastmod>2023-02-03</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/835840_bf57fd07e5444ddd846413b3613dacf6~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/google-issues-a-security-alert-to-around-2-billion-chrome-users</loc>
<lastmod>2023-02-03</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/835840_664d33e0341d4dd68cc342e8ef61cf4a~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/aquila-i-innovation-from-vision-to-global-cybersecurity-leader</loc>
<lastmod>2025-11-25</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/cb82e0_d26d62ea55f34f19884e050d5557bb4f~mv2.png</image:loc>
<image:title>Aquila I Innovation: From Vision to Global Cybersecurity Leader</image:title>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/mapping-breach-and-attack-simulation-bas-findings-to-the-mitre-att-ck-framework</loc>
<lastmod>2025-08-13</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/cb82e0_a49630fa754349239b4356faabfad0cf~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/reducing-dwell-time-through-continuous-simulation</loc>
<lastmod>2025-08-13</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/cb82e0_ace7ff41ae9b4e9b90002e9632892f59~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/turning-unknown-risks-into-actionable-insights-with-continuous-exposure-management</loc>
<lastmod>2025-12-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/cb82e0_ce0a69b7a96d419a8baf69d155011913~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/why-should-the-pharmaceutical-industry-pay-attention-to-cybersecurity</loc>
<lastmod>2023-06-01</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/835840_8aee55b19e584e07ba4a5c44d7c20265~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/government-alerts-google-chrome-users-to-critical-risks-urges-immediate-browser-update</loc>
<lastmod>2023-08-17</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/835840_fa776fee441a4c0b9fab21ba11550286~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/continuous-automated-red-teaming-for-insider-threat-detection</loc>
<lastmod>2025-08-13</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/cb82e0_b1ea1e565ac545bfafde993ea4c8ba20~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/protecting-executive-identities-with-digital-risk-monitoring</loc>
<lastmod>2025-08-24</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/cb82e0_5d6d7a05cb774aa88ffcc9ccef7bda2d~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/what-is-cyber-threat-intelligence-cti</loc>
<lastmod>2025-09-29</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/cb82e0_891e69dd044540d39ca9724e14e517c7~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/what-are-pig-butchering-scams</loc>
<lastmod>2023-02-07</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/835840_8b3ea63cea1a46c092c8cb43fc587e2c~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/how-breach-attack-simulation-bas-complements-traditional-penetration-testing</loc>
<lastmod>2025-08-12</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/cb82e0_c7e32b982e9e4870aae39ad8a2149ff2~mv2.png</image:loc>
<image:title>How Breach Attack Simulation (BAS) Complements Traditional Penetration Testing</image:title>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/what-is-digital-risk-monitoring-and-why-it-s-crucial-in-2025</loc>
<lastmod>2025-08-24</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/cb82e0_2a895551bcba410aaaadddfd0c5a8f18~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/understanding-breach-and-attack-simulation-a-2025-perspective</loc>
<lastmod>2025-11-27</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/cb82e0_6f485dc1c25f4e8ab591fb4cb6d1567b~mv2.png</image:loc>
<image:title>Understanding Breach and Attack Simulation: A 2025 Perspective</image:title>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/what-is-phishing-simulation</loc>
<lastmod>2025-09-29</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/cb82e0_65c954e5881d4340b1ecfc706ae5b2aa~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/how-spear-phishing-emails-can-still-reach-inboxes-despite-failure-of-spf-dkim-and-dmarc</loc>
<lastmod>2023-04-11</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/835840_bca8fbcf69d7470eaded5380c2b9b2d9~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/what-is-continuous-automated-red-teaming-cart</loc>
<lastmod>2025-08-24</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/cb82e0_d5670675cb454fae9161f53fd2b37104~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/real-world-use-cases-of-digital-risk-monitoring-in-banking-and-finance</loc>
<lastmod>2025-08-24</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/cb82e0_55b567b0a8e3495d980183bcfee29c46~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/canara-bank-s-x-handle-hacked-what-you-need-to-know</loc>
<lastmod>2024-06-25</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/589544_798e011b4fbf460e8fc591779ba865c3~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/dmarc-can-help-mitigate-phishing-attacks</loc>
<lastmod>2023-05-09</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/835840_3f9ad6b4dfd74d84b92f23f3d988842e~mv2.jpeg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/kpis-and-metrics-for-measuring-cart-effectiveness</loc>
<lastmod>2025-08-22</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/cb82e0_cce71b042d61472b8df13c9f1bab4246~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/6-tips-to-stay-safe-from-catfishing</loc>
<lastmod>2023-02-03</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/835840_387f37c0ea5c4e71814dc41cfbbff70e~mv2.jpeg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/5-years-of-wannacry-ransomware-attack</loc>
<lastmod>2023-01-28</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/835840_24c52bd6b1d7420f849e9dfd50fbeb07~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/what-is-data-leakage</loc>
<lastmod>2025-10-14</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/cb82e0_860d22d0954440cab6f4c7014d92b72d~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/hackers-seek-196-bitcoins-as-ransom-for-india-s-second-largest-government-owned-hydrocarbon-producer</loc>
<lastmod>2023-02-03</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/835840_82d3653b80584964b8576ce944773505~mv2.jpeg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/reducing-attack-surface-through-continuous-red-teaming</loc>
<lastmod>2025-08-22</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/cb82e0_4b13df35c2814145809833bcc3ac0ed3~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/world-marketing-congress-2023</loc>
<lastmod>2022-11-25</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/835840_f13e3ce1283f447e843325beb0cd362e~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/how-ctem-helps-organizations-stay-ahead-of-emerging-threats-in-real-time</loc>
<lastmod>2025-12-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/cb82e0_f662040169bb4489a6d4f31eec6e0ed0~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/big5-cso-priorities-2023</loc>
<lastmod>2023-05-26</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/835840_1321110c7c554aef896b433441a0a797~mv2.jpeg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/what-is-threat-exposure-management</loc>
<lastmod>2025-11-03</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/cb82e0_abacfb83a4e64fee9026211d2d68af04~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/cio-choice-2023</loc>
<lastmod>2022-12-31</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/835840_499354c1a53743f381c00afffcf20adf~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/a-critical-zero-day-vulnerability-in-atlassian-confluence-has-been-exploited-by-hackers</loc>
<lastmod>2023-02-03</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/835840_884dc365b7304ceabab25e14bf4c3a12~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/what-is-the-mitre-att-ck-framework</loc>
<lastmod>2025-11-03</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/cb82e0_b91ddc5ab386410a96489ce5317c0cd6~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/the-role-of-ctem-in-building-enterprise-wide-security-confidence</loc>
<lastmod>2025-12-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/cb82e0_8fd2848b8def476099c07fa81c182098~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/simulating-real-world-adversaries-with-continuous-automated-red-teaming</loc>
<lastmod>2025-08-13</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/cb82e0_5a0f596868b7443dbf0b65ba25b8b4a8~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/60-million-crypto-heist-via-deceptive-google-x-ads</loc>
<lastmod>2024-01-12</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/589544_53e9aa184c53486da7e9696431380fd7~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/cart-in-highly-regulated-industries-bfsi-healthcare</loc>
<lastmod>2025-08-22</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/cb82e0_22d682fb0a9e4283811bede597a000ee~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/what-is-cloud-security-posture-management-cspm</loc>
<lastmod>2025-12-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/cb82e0_7960b484ae934f90ac3bf3e268dad35c~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/hackers-use-microsoft-exchange-flaws-to-distribute-the-babuk-ransomware</loc>
<lastmod>2023-02-03</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/835840_e179234f8fb540ff9cc7a882900c77ee~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/enhancing-incident-response-plans-using-continuous-automated-red-teaming-results</loc>
<lastmod>2025-08-13</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/cb82e0_7e201c689fe149c594810167b88fad08~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/critical-security-flaws-in-apache-http-server-allow-hackers-to-execute-arbitrary-code-remotely</loc>
<lastmod>2023-02-03</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/835840_7fa71dce29de431abd085d1fe31855f1~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/aligning-cart-exercises-with-threat-intelligence-feeds</loc>
<lastmod>2025-08-22</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/cb82e0_2115cbac41eb440eb6f925ca90d89965~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/common-security-gaps-revealed-by-breach-attack-simulation-bas</loc>
<lastmod>2025-08-13</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/cb82e0_c00be8d950b14462895f9af785098ed8~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/cyber-fraud-in-mumbai-senior-citizen-lost-rs-1-38-lakh-to-cyber-fraud-while-purchasing-a-bottle-of</loc>
<lastmod>2023-04-12</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/835840_c19e589afc274626850f6dd91911136e~mv2.jpeg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/what-is-breach-and-attack-simulation-bas</loc>
<lastmod>2025-08-24</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/cb82e0_ca1dd58daf2248b4ad951b67af095e23~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/maximus-data-breach-might-affect-over-11-million-people</loc>
<lastmod>2023-08-21</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/835840_7fb672efb7a54b82b3d1976700c5f948~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/cybersecurity-awareness-training-at-alkem</loc>
<lastmod>2023-02-19</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/835840_7575f0100723494abb71ba4d1c45c683~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/what-is-digital-risk-monitoring-drm</loc>
<lastmod>2025-08-24</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/cb82e0_222e7165f0b64b91885cff1ff9b6abb1~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/cyber-security-basics-all-employees-should-know</loc>
<lastmod>2023-02-03</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/835840_0799f0caf6794299ad8456b14de1e9d4~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/what-is-attack-surface-management-asm</loc>
<lastmod>2025-08-24</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/cb82e0_f10944493d2f43f481a682e8d258041c~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/several-vmware-products-affected-by-heap-overflow-vulnerability</loc>
<lastmod>2023-02-03</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/835840_c80f696a3919499b93c4dc2cfa476bdd~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/dkim-1024-vs-2048-bit-keys-what-s-the-difference-and-why-it-matters</loc>
<lastmod>2025-05-22</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/cb82e0_58216d05351f4ef08bc0a2f8c94ff054~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/crypto-exchange-wazirx-offers-rs-188-crore-bounty-following-major-security-breach</loc>
<lastmod>2024-07-26</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/589544_5d335565da1343ebb8ce955341ef4e1f~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/bas-for-cloud-environments-key-considerations</loc>
<lastmod>2025-08-13</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/cb82e0_8b2f0285a45f4c658fcb8ba0bccdd5b1~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/mind-the-gap-wormgpt-s-emergence-sounds-the-alarm-for-enterprise-cybersecurity-upskilling</loc>
<lastmod>2023-07-28</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/835840_9dd414cbe3594aef8227279e6f73ce50~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/what-is-the-zero-trust-security-model</loc>
<lastmod>2025-09-29</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/cb82e0_fb5027afc43a47e5bf7a994a0e565d07~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/measuring-security-team-readiness-with-breach-attack-simulation-bas</loc>
<lastmod>2025-08-13</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/cb82e0_2fae1ec3337147439bc2300fa8647148~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/beware-of-facebook-ads-malicious-links-lurking-for-your-passwords</loc>
<lastmod>2024-02-19</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/589544_56d89ec44c9a4a4eba62c05eb455130a~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/why-continuous-threat-exposure-management-is-shaping-the-future-of-cybersecurity</loc>
<lastmod>2025-12-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/cb82e0_2f5f338655ef4252a30589106f40e37e~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/what-is-continuous-threat-exposure-management-ctem</loc>
<lastmod>2025-08-24</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/cb82e0_d7999e5d73dd470282de27509f04164f~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/building-threat-scenarios-for-continuous-automated-red-teaming-operations</loc>
<lastmod>2025-08-13</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/cb82e0_ab005be104a149e6a4223c01eeb62382~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/continuous-automated-red-teaming-vs-point-in-time-red-teaming-why-it-matters</loc>
<lastmod>2025-08-13</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/cb82e0_eaf676a34db649f097850741565d74a9~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/cisco-issues-a-patch-for-a-new-ios-xr-zero-day-vulnerability-that-has-been-discovered-in-the-wild</loc>
<lastmod>2023-02-03</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/835840_6f8755a0975740e48cf127b4efcee70e~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/what-is-continuous-security-validation</loc>
<lastmod>2025-09-29</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/cb82e0_c1833d8b65354f60bb824937ec8f9fe5~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/hackers-use-fake-windows-11-downloads-to-spread-vidar-malware</loc>
<lastmod>2023-02-03</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/835840_e3f7ad5e862e4fa792de8591e23b1ffa~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/what-is-business-email-compromise-bec</loc>
<lastmod>2025-09-29</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/cb82e0_01fb05aa50324193a5d8daa188ddc37a~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/closing-the-gap-between-application-security-and-observation</loc>
<lastmod>2023-02-03</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/835840_05117252f14d42cead8ab8e41b4a4191~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/what-is-dark-web-monitoring</loc>
<lastmod>2025-10-28</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/cb82e0_c0969b40f3c3440b88c69d0200ba8df2~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/combining-digital-risk-monitoring-with-threat-intelligence-platforms</loc>
<lastmod>2025-08-24</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/cb82e0_d232ccceee9e45749d91e7cd16672edd~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/aquila-i-at-gartner-india-security-risk-management-summit-2023</loc>
<lastmod>2023-05-26</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/835840_3a43a337a9c94e6eb5689239b332c940~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/black-basta-ransomware-outbreak-targets-international-tech-company-abb</loc>
<lastmod>2023-05-16</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/835840_bdd42f1c1c954b788f094ede1e2d96ce~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/google-chrome-has-issued-second-a-warning-following-the-discovery-of-critical-and-high-risk-security</loc>
<lastmod>2023-02-03</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/835840_664d33e0341d4dd68cc342e8ef61cf4a~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/what-is-ransomware-as-a-service-raas</loc>
<lastmod>2025-09-29</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/cb82e0_c1ffeef22a1f4d0abc4d839d5f826ae7~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/healthcare-hub-for-cyber-attacks</loc>
<lastmod>2022-12-21</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/835840_1e93054570b94d14a27fcad61a64cd11~mv2.jpeg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/protect-your-bank-account-from-aeps-scams-by-locking-your-aadhaar-online</loc>
<lastmod>2023-11-17</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/589544_a94db8df2556414b8ec8608459623962~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/what-is-a-digital-footprint</loc>
<lastmod>2025-11-03</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/cb82e0_835ffb6849d346388a0560864c9bb1fe~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/critical-security-flaws-in-apache-http-server-allow-hackers-to-execute-arbitrary-code-remotely-1</loc>
<lastmod>2025-05-20</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/835840_92cb625d0a944d2793aa4049428ff3f4~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/what-is-multi-factor-authentication-mfa</loc>
<lastmod>2025-09-29</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/cb82e0_c973b3898a05428899c0874a50de3d02~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/how-cart-differs-from-traditional-red-team-engagements</loc>
<lastmod>2025-08-13</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/cb82e0_8f71d39a480f4df0bbd664e8244a17be~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/prime-day-2024-gear-up-for-deals-but-don-t-forget-cybercriminals</loc>
<lastmod>2024-07-18</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/589544_b93a6ff05bed48a29352d876daf3b066~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/what-s-a-whatsapp-pink-scam-how-to-keep-yourself-protected</loc>
<lastmod>2023-07-07</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/835840_6f24a25eb7e4469a86d1b35bdc280883~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/data-breach-by-lapsus-affects-globant</loc>
<lastmod>2023-02-03</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/835840_6f2b09634da047b7bba3cc614e488a71~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/spf-flattening</loc>
<lastmod>2025-05-14</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/cb82e0_e5d5c615cd804dfaa48c444ca27b52c7~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/identifying-data-leaks-through-drm-solutions</loc>
<lastmod>2025-08-24</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/cb82e0_a003ba36be624df2af21e528c7b26986~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/data-privacy</loc>
<lastmod>2022-07-19</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/835840_75454f0fc81f4251a4f98de953fbea35~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/prime-insights-magazine</loc>
<lastmod>2023-05-26</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/835840_718e942942b344c09383b41074123541~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/second-data-breach-reported-by-samsung-in-the-past-six-months</loc>
<lastmod>2022-08-09</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/835840_384d17260c34497aab04581a0ecf58f7~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/what-is-malware</loc>
<lastmod>2022-07-12</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/835840_bbd289f270f04c369c16207f45b32da1~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/aquila-i-at-comex-technology-show-2021</loc>
<lastmod>2022-05-26</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/835840_2cb89ae0deb446a9981682b4c0469c58~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/cybersecurity-awareness-training-2022</loc>
<lastmod>2022-10-17</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/835840_45974c86ce4a468db60319675b4617ca~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/cybercriminals-use-svb-s-collapse-to-steal-customer-funds-data-1</loc>
<lastmod>2022-09-13</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/835840_3dff86cb80324fbf9d7069d501b18c9f~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/phishing-attacks-doubled-at-the-fifa-world-cup</loc>
<lastmod>2022-11-15</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/835840_8a484a290554413fb3387a71ab57ce98~mv2.jpeg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.aquilai.ae/post/prevention-from-cyber-attacks</loc>
<lastmod>2022-08-09</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/835840_62024e5b36c74e86aabbcd545db429f0~mv2.png</image:loc>
</image:image>
</url>
</urlset>