<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://aacyber.uk/2024/04/23/cve-2024-31497-putty-key-recovery-attack/</loc><image:image><image:loc>https://aacyber.uk/wp-content/uploads/2024/04/pexels-photo-101808.jpeg</image:loc><image:title>black handled key on key hole</image:title><image:caption>Photo by PhotoMIX Company on &lt;a href="https://www.pexels.com/photo/black-handled-key-on-key-hole-101808/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2024-04-23T19:12:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://aacyber.uk/2024/04/17/we-are-back/</loc><image:image><image:loc>https://aacyber.uk/wp-content/uploads/2024/04/pexels-photo-271639.jpeg</image:loc><image:title>person holding on door lever inside room</image:title><image:caption>Photo by Pixabay on &lt;a href="https://www.pexels.com/photo/person-holding-on-door-lever-inside-room-271639/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://aacyber.uk/wp-content/uploads/2024/04/pexels-photo-3769979.jpeg</image:loc><image:title>key with trinket in shabby door</image:title><image:caption>Photo by Andrea Piacquadio on &lt;a href="https://www.pexels.com/photo/key-with-trinket-in-shabby-door-3769979/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://aacyber.uk/wp-content/uploads/2024/04/x3000_network-storage.jpg</image:loc><image:title>x3000_network-storage</image:title></image:image><lastmod>2024-04-17T21:28:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://aacyber.uk/2022/09/24/gear-review-netally-linksprinter-300/</loc><image:image><image:loc>https://aacyber.uk/wp-content/uploads/2022/09/ns-linksprinter_10a_c_b.jpg</image:loc><image:title>NS-LinkSprinter_10a_c_B</image:title></image:image><lastmod>2022-09-24T22:18:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://aacyber.uk/2022/06/20/con-games/</loc><image:image><image:loc>https://aacyber.uk/wp-content/uploads/2022/06/pexels-photo-7111492.jpeg</image:loc><image:title>notebook writing mathematics notes</image:title><image:caption>Photo by Tara Winstead on &lt;a href="https://www.pexels.com/photo/notebook-writing-mathematics-notes-7111492/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://aacyber.uk/wp-content/uploads/2022/06/phishing-example-authority-1.jpeg</image:loc><image:title>phishing-example-authority-1</image:title></image:image><image:image><image:loc>https://aacyber.uk/wp-content/uploads/2022/06/consensus-phishing-example.png</image:loc><image:title>consensus-phishing-example</image:title></image:image><image:image><image:loc>https://aacyber.uk/wp-content/uploads/2022/06/phisahing-example-scarcity.png</image:loc><image:title>phisahing-example-scarcity</image:title></image:image><image:image><image:loc>https://aacyber.uk/wp-content/uploads/2022/06/phishing-example-authority.jpeg</image:loc><image:title>phishing-example-authority</image:title></image:image><lastmod>2022-06-20T18:52:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://aacyber.uk/2022/06/17/hertzbleed/</loc><image:image><image:loc>https://aacyber.uk/wp-content/uploads/2022/06/hertzbleed-logo-with-text-1.png</image:loc><image:title>Hertzbleed-logo-with-text</image:title></image:image><lastmod>2022-06-17T13:58:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://aacyber.uk/2022/06/03/h4cked-write-up/</loc><image:image><image:loc>https://aacyber.uk/wp-content/uploads/2022/06/pexels-photo-5935791.jpeg</image:loc><image:title>unrecognizable hacker with smartphone typing on laptop at desk</image:title><image:caption>Photo by Sora Shimazaki on &lt;a href="https://www.pexels.com/photo/unrecognizable-hacker-with-smartphone-typing-on-laptop-at-desk-5935791/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://aacyber.uk/wp-content/uploads/2022/06/tower-bridge-thames-river-water-161990.jpeg</image:loc><image:title>twin bridge under clear sky</image:title><image:caption>Photo by Pixabay on &lt;a href="https://www.pexels.com/photo/twin-bridge-under-clear-sky-161990/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2022-06-04T20:01:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://aacyber.uk/2022/05/16/1-year-learning-together/</loc><image:image><image:loc>https://aacyber.uk/wp-content/uploads/2022/05/pexels-photo-1887992.jpeg</image:loc><image:title>yellow letter tiles on blue background</image:title><image:caption>Photo by Ann H on &lt;a href="https://www.pexels.com/photo/yellow-letter-tiles-on-blue-background-1887992/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2022-05-16T19:11:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://aacyber.uk/2022/03/22/the-argument-for-password-managers/</loc><image:image><image:loc>https://aacyber.uk/wp-content/uploads/2022/03/censorship-limitations-freedom-of-expression-restricted-39584.jpeg</image:loc><image:title>black android smartphone on top of white book</image:title><image:caption>Photo by Pixabay on &lt;a href="https://www.pexels.com/photo/black-android-smartphone-on-top-of-white-book-39584/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2022-05-11T21:09:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://aacyber.uk/2022/03/21/phishing/</loc><image:image><image:loc>https://aacyber.uk/wp-content/uploads/2022/03/pexels-photo-8369520.jpeg</image:loc><image:title>man in gray long sleeve suit holding a pen</image:title><image:caption>Photo by cottonbro on &lt;a href="https://www.pexels.com/photo/man-in-gray-long-sleeve-suit-holding-a-pen-8369520/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2022-05-11T21:06:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://aacyber.uk/2022/03/29/multi-factor-authentication-whats-all-the-fuss/</loc><image:image><image:loc>https://aacyber.uk/wp-content/uploads/2022/03/642815_5355ea0f.jpg</image:loc><image:title>High security compound</image:title><image:caption>&lt;a href="http://www.geograph.org.uk/photo/642815" rel="nofollow"&gt;High security compound&lt;/a&gt; by &lt;a href="http://geograph.org.uk/profile/20032" rel="nofollow"&gt;Richard Dorrell&lt;/a&gt; is licensed under &lt;a href="https://creativecommons.org/licenses/by-sa/2.0/" rel="nofollow"&gt;CC-BY-SA 2.0&lt;/a&gt;</image:caption></image:image><lastmod>2022-05-11T20:54:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://aacyber.uk/2022/03/31/mitre-attckcon-3-0/</loc><lastmod>2022-05-11T20:18:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://aacyber.uk/2022/03/29/backup-codes/</loc><image:image><image:loc>https://aacyber.uk/wp-content/uploads/2022/03/pexels-photo-6310044.jpeg</image:loc><image:title>industry technology computer power</image:title><image:caption>Photo by Ivo Brasil on &lt;a href="https://www.pexels.com/photo/industry-technology-computer-power-6310044/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2022-03-31T12:51:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://aacyber.uk/2022/03/24/that-wasnt-supposed-to-happen/</loc><image:image><image:loc>https://aacyber.uk/wp-content/uploads/2022/03/8279097320_2df8cac8a2_b.jpg</image:loc><image:title>Broken Nvidia GeForce 4 Ti : Broken GPU Chip 3/4</image:title><image:caption>&lt;a href="https://www.flickr.com/photos/21051491@N02/8279097320" rel="nofollow"&gt;Broken Nvidia GeForce 4 Ti : Broken GPU Chip 3/4&lt;/a&gt; by &lt;a href="https://www.flickr.com/photos/21051491@N02" rel="nofollow"&gt;qubodup&lt;/a&gt; is licensed under &lt;a href="https://creativecommons.org/publicdomain/zero/1.0/" rel="nofollow"&gt;CC-CC0 1.0&lt;/a&gt;</image:caption></image:image><lastmod>2022-03-27T21:14:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://aacyber.uk/2022/03/13/planes-are-pretty-cool-food-for-thought-4/</loc><image:image><image:loc>https://aacyber.uk/wp-content/uploads/2022/03/pexels-photo-3768652.jpeg</image:loc><image:title>photo of airplane flying from runway</image:title><image:caption>Photo by Jerry Wang on &lt;a href="https://www.pexels.com/photo/photo-of-airplane-flying-from-runway-3768652/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://aacyber.uk/wp-content/uploads/2022/03/pexels-photo-442158.jpeg</image:loc><image:title>crop focused black engineer with handset checking connection</image:title><image:caption>Photo by Field Engineer on &lt;a href="https://www.pexels.com/photo/crop-focused-black-engineer-with-handset-checking-connection-442158/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2022-03-20T14:10:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://aacyber.uk/2021/07/05/massive-ransom-contingency-planning-food-for-thought-3/</loc><lastmod>2022-03-20T14:10:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://aacyber.uk/2021/12/12/remote-code-execution-in-java-apache-log4j-2-cve-2021-44228/</loc><lastmod>2022-03-20T14:08:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://aacyber.uk/categories/</loc><lastmod>2022-03-20T14:05:37+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://aacyber.uk/2022/03/19/coming-soon-home-internet-security-guides/</loc><image:image><image:loc>https://aacyber.uk/wp-content/uploads/2022/03/pexels-photo-5474298.jpeg</image:loc><image:title>hand holding a key with a usb flash drive</image:title><image:caption>Photo by cottonbro on &lt;a href="https://www.pexels.com/photo/hand-holding-a-key-with-a-usb-flash-drive-5474298/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2022-03-19T14:43:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://aacyber.uk/2022/02/27/here-comes-the-cyber-army/</loc><image:image><image:loc>https://aacyber.uk/wp-content/uploads/2022/02/pexels-photo-11291157.jpeg</image:loc><image:title>people holding anti war signs and protesting in the street</image:title><image:caption>Photo by Katie Godowski on &lt;a href="https://www.pexels.com/photo/people-holding-anti-war-signs-and-protesting-in-the-street-11291157/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2022-02-27T15:15:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://aacyber.uk/2022/01/22/russian-threat-actors/</loc><image:image><image:loc>https://aacyber.uk/wp-content/uploads/2022/01/pexels-photo-2317711.jpeg</image:loc><image:title>close up photo of blue liquid</image:title><image:caption>Photo by Anni Roenkae on &lt;a href="https://www.pexels.com/photo/close-up-photo-of-blue-liquid-2317711/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://aacyber.uk/wp-content/uploads/2022/01/pexels-photo-1098515.jpeg</image:loc><image:title>shallow focus photo of world globe</image:title><image:caption>Photo by Suzy Hazelwood on &lt;a href="https://www.pexels.com/photo/shallow-focus-photo-of-world-globe-1098515/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2022-01-22T14:20:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://aacyber.uk/2022/01/04/2021review/</loc><image:image><image:loc>https://aacyber.uk/wp-content/uploads/2022/01/fireworks-sky-party-new-year-s-eve-128872.jpeg</image:loc><image:title>painting of fireworks</image:title><image:caption>Photo by Pixabay on &lt;a href="https://www.pexels.com/photo/painting-of-fireworks-128872/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2022-01-05T16:04:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://aacyber.uk/2021/11/23/yubikeys/</loc><lastmod>2021-11-23T20:17:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://aacyber.uk/2021/11/09/revil-on-the-run/</loc><image:image><image:loc>https://aacyber.uk/wp-content/uploads/2021/11/wana_decrypt0r_screenshot.png</image:loc><image:title>Wana_Decrypt0r_screenshot</image:title></image:image><image:image><image:loc>https://aacyber.uk/wp-content/uploads/2021/11/kaseya.jpg</image:loc><image:title>kaseya</image:title></image:image><image:image><image:loc>https://aacyber.uk/wp-content/uploads/2021/11/itsolutions-kaseya-large.jpg</image:loc><image:title>itsolutions-kaseya-large</image:title></image:image><lastmod>2021-11-09T16:25:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://aacyber.uk/2021/09/30/undetected-brute-force-attacks-in-microsoft-azure-ad/</loc><image:image><image:loc>https://aacyber.uk/wp-content/uploads/2021/09/avvxsehhkplzpnjpke9gv7xbgd2ipnni8wej6rrngrmiafjbj6m7ydofnpi5d2q4bz-16ywtlmbmebn_x5dz0qqqmvevazpqfu_lsqddx9mspzfepifum-cie2o_ffrdlitoqz6rji1thrsluehj-l0hiu1s1mvockpjcimrvwodzl4judlx31l9g4.jpg</image:loc><image:title>AVvXsEhHKplzPNjpKe9gV7xBgD2IPNNI8wej6RrngrMiAFJbj6M7yDOFNPi5d2Q4Bz-16ywtlMbmEBN_x5dz0QqQMvevazpqfU_LSqdDX9MSPzFePIFuM-cIE2o_ffrdlItoqZ6rJi1tHRsLuEHJ-l0hiu1s1MVockPJciMrVwODzL4Judlx31l9g46IKBTu</image:title></image:image><image:image><image:loc>https://aacyber.uk/wp-content/uploads/2021/09/sso14.png</image:loc><image:title>sso14</image:title></image:image><lastmod>2021-09-30T17:34:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://aacyber.uk/2021/09/22/operation-layover-attack-campaign-against-aviation-sector-uncovered/</loc><image:image><image:loc>https://aacyber.uk/wp-content/uploads/2021/09/e1inmv9uyaa89wq.jpg</image:loc><image:title>E1InMv9UYAA89wq</image:title></image:image><image:image><image:loc>https://aacyber.uk/wp-content/uploads/2021/09/cyberattack.jpg</image:loc><image:title>cyberattack</image:title></image:image><lastmod>2021-09-22T14:55:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://aacyber.uk/2021/06/16/p2/</loc><lastmod>2021-07-26T19:27:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://aacyber.uk/2021/07/18/another-google-chrome-patch/</loc><lastmod>2021-07-18T14:51:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://aacyber.uk/2021/07/04/android-apps-caught-stealing-facebook-passwords-removed-from-play-store/</loc><lastmod>2021-07-04T18:00:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://aacyber.uk/2021/06/22/crypto-waning-in-an-open-source-eco-friendly-world/</loc><lastmod>2021-06-22T12:01:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://aacyber.uk/2021/06/19/credential-marketplace-shut-down-by-fbi/</loc><lastmod>2021-06-19T12:42:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://aacyber.uk/2021/06/15/p1/</loc><lastmod>2021-06-17T00:48:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://aacyber.uk/blog/</loc><lastmod>2021-06-15T23:53:32+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://aacyber.uk</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2024-04-23T19:12:09+00:00</lastmod></url></urlset>
