<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://bytewhispersecurity.com/2024/05/31/social-engineering-at-scale.html</loc>
<lastmod>2024-05-31T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://bytewhispersecurity.com/2024/07/04/ai-code-peril-and-promise.html</loc>
<lastmod>2024-07-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://bytewhispersecurity.com/2024/11/07/using-llms-wrong.html</loc>
<lastmod>2024-11-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://bytewhispersecurity.com/2025/03/31/defense-against-prompt-injection.html</loc>
<lastmod>2025-03-31T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://bytewhispersecurity.com/2025/07/07/defense-against-prompt-injection-ii.html</loc>
<lastmod>2025-07-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://bytewhispersecurity.com/2025/08/04/attacking-agentic-ai.html</loc>
<lastmod>2025-08-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://bytewhispersecurity.com/2025/08/15/dependency-woes.html</loc>
<lastmod>2025-08-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://bytewhispersecurity.com/2025/11/15/Hou-Sec-2025.html</loc>
<lastmod>2025-11-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://bytewhispersecurity.com/2026/03/11/ai-cybersecurity-use-cases-real-vs-hype.html</loc>
<lastmod>2026-03-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://bytewhispersecurity.com/press/2025-04-28-rsa-shadow-ai.html</loc>
<lastmod>2025-04-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://bytewhispersecurity.com/press/2025-04-29-rsa-threat-modeling-connect.html</loc>
<lastmod>2025-04-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://bytewhispersecurity.com/press/2025-07-25-comet.html</loc>
<lastmod>2025-07-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://bytewhispersecurity.com/test/404.html</loc>
</url>
<url>
<loc>https://bytewhispersecurity.com/test/about.html</loc>
</url>
<url>
<loc>https://bytewhispersecurity.com/about.html</loc>
</url>
<url>
<loc>https://bytewhispersecurity.com/test/archive.html</loc>
</url>
<url>
<loc>https://bytewhispersecurity.com/archive.html</loc>
</url>
<url>
<loc>https://bytewhispersecurity.com/blog.html</loc>
</url>
<url>
<loc>https://bytewhispersecurity.com/test/</loc>
</url>
<url>
<loc>https://bytewhispersecurity.com/</loc>
</url>
<url>
<loc>https://bytewhispersecurity.com/press.html</loc>
</url>
<url>
<loc>https://bytewhispersecurity.com/services.html</loc>
</url>
<url>
<loc>https://bytewhispersecurity.com/page2/</loc>
</url>
</urlset>
