<?xml version="1.0" encoding="UTF-8"?>
<urlset
      xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
      xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
      xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9
            http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd">
<url>
  <loc>https://www.hedgehogsecurity.co.uk/</loc>
  <lastmod>2026-04-12T22:26:49+00:00</lastmod>
  <priority>1.00</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/penetration-testing</loc>
  <lastmod>2026-04-12T22:26:49+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/cyber-essentials</loc>
  <lastmod>2026-04-12T22:26:49+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/airspace-security</loc>
  <lastmod>2026-04-12T22:26:49+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/wireless-spectrum-security</loc>
  <lastmod>2026-04-12T22:26:49+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/about</loc>
  <lastmod>2026-04-12T22:26:49+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/faq</loc>
  <lastmod>2026-04-12T22:26:49+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog</loc>
  <lastmod>2026-04-12T22:26:49+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/buyers-guide</loc>
  <lastmod>2026-04-12T22:26:49+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/case-studies</loc>
  <lastmod>2026-04-12T22:26:49+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/responsible-disclosure</loc>
  <lastmod>2026-04-12T22:26:49+00:00</lastmod>
  <priority>0.60</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/privacy-policy</loc>
  <lastmod>2026-04-12T22:26:49+00:00</lastmod>
  <priority>0.60</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/terms-of-service</loc>
  <lastmod>2026-04-12T22:26:49+00:00</lastmod>
  <priority>0.60</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/cookie-policy</loc>
  <lastmod>2026-04-12T22:26:49+00:00</lastmod>
  <priority>0.60</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/chrome-zero-day-cve-2026-3909-3910-patch-now</loc>
  <lastmod>2026-04-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/uk-government-breaches-2026-update</loc>
  <lastmod>2026-04-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/78-percent-uk-manufacturers-cyber-incidents-2026</loc>
  <lastmod>2026-04-10T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/cyber-essentials-demystified-action-plan</loc>
  <lastmod>2026-04-09T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/smart-slider-wordpress-supply-chain-attack-april-2026</loc>
  <lastmod>2026-04-09T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/cyber-security-resilience-bill-what-uk-businesses-need-to-know</loc>
  <lastmod>2026-04-07T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/cyber-essentials-demystified-ce-vs-ce-plus</loc>
  <lastmod>2026-04-02T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/companies-house-webfiling-flaw-directors-exposed</loc>
  <lastmod>2026-04-01T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-eu-commission-stryker</loc>
  <lastmod>2026-03-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/cyber-essentials-demystified-danzell-changes</loc>
  <lastmod>2026-03-26T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/the-digital-parasite-why-attackers-stopped-breaking-things-and-started-moving-in</loc>
  <lastmod>2026-03-24T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/cyber-essentials-demystified-malware-protection</loc>
  <lastmod>2026-03-19T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/openvas-deep-dive-vulnerability-scanning</loc>
  <lastmod>2026-03-17T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/cyber-essentials-demystified-access-control</loc>
  <lastmod>2026-03-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/business-guide-to-penetration-testing-long-term-programme</loc>
  <lastmod>2026-03-10T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/cyber-essentials-demystified-security-updates</loc>
  <lastmod>2026-03-05T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/business-guide-to-penetration-testing-remediation</loc>
  <lastmod>2026-03-03T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-bridgepay-healthcare</loc>
  <lastmod>2026-02-28T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/cyber-essentials-demystified-secure-configuration</loc>
  <lastmod>2026-02-26T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/business-guide-to-penetration-testing-understanding-your-report</loc>
  <lastmod>2026-02-24T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/cyber-essentials-demystified-firewalls</loc>
  <lastmod>2026-02-19T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/business-guide-to-penetration-testing-during-the-test</loc>
  <lastmod>2026-02-17T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/cyber-essentials-demystified-five-controls-overview</loc>
  <lastmod>2026-02-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/sector-under-the-microscope-submersible-uav-security</loc>
  <lastmod>2026-02-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/business-guide-to-penetration-testing-preparation</loc>
  <lastmod>2026-02-10T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/questions-before-commissioning-penetration-test</loc>
  <lastmod>2026-02-10T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/cyber-essentials-demystified-what-is-cyber-essentials</loc>
  <lastmod>2026-02-05T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/sector-under-the-microscope-aerial-uav-security</loc>
  <lastmod>2026-02-05T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/business-guide-to-penetration-testing-scoping</loc>
  <lastmod>2026-02-03T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/choosing-penetration-testing-provider-methodology-quality-expertise</loc>
  <lastmod>2026-02-03T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/from-the-hacker-desk-mfa-not-multi-factor</loc>
  <lastmod>2026-02-03T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/from-the-hacker-desk-smart-building-management-system</loc>
  <lastmod>2026-02-03T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-match-group-eurail</loc>
  <lastmod>2026-01-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/sector-under-the-microscope-defence-supply-chain</loc>
  <lastmod>2026-01-29T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/business-guide-to-penetration-testing-choosing-a-provider</loc>
  <lastmod>2026-01-27T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/penetration-testing-challenge-assumptions-not-confirm-comfort</loc>
  <lastmod>2026-01-27T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/sector-under-the-microscope-local-government</loc>
  <lastmod>2026-01-22T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/business-guide-to-penetration-testing-when-to-test</loc>
  <lastmod>2026-01-20T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/penetration-testing-incident-preparedness-breach-pathways</loc>
  <lastmod>2026-01-20T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/sector-under-the-microscope-professional-services</loc>
  <lastmod>2026-01-15T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/business-guide-to-penetration-testing-types-of-test</loc>
  <lastmod>2026-01-13T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/measuring-real-value-penetration-testing</loc>
  <lastmod>2026-01-13T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/sector-under-the-microscope-retail</loc>
  <lastmod>2026-01-08T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/apt15</loc>
  <lastmod>2026-01-06T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/apt27</loc>
  <lastmod>2026-01-06T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/apt3</loc>
  <lastmod>2026-01-06T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/business-guide-to-penetration-testing-what-is-it</loc>
  <lastmod>2026-01-06T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/from-the-hacker-desk-drone-to-network-pivot</loc>
  <lastmod>2026-01-06T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/transparency-penetration-testing-builds-trust</loc>
  <lastmod>2026-01-06T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/apt10</loc>
  <lastmod>2026-01-05T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/apt41</loc>
  <lastmod>2026-01-05T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/mustang-panda</loc>
  <lastmod>2026-01-05T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/salt-typhoon</loc>
  <lastmod>2026-01-05T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/volt-typhoon</loc>
  <lastmod>2026-01-05T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/sector-under-the-microscope-construction</loc>
  <lastmod>2026-01-01T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-2025-year-review</loc>
  <lastmod>2025-12-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/pen-test-reports-prioritise-security-investment</loc>
  <lastmod>2025-12-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/sector-under-the-microscope-manufacturing</loc>
  <lastmod>2025-12-25T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/penetration-testing-secure-architecture-design</loc>
  <lastmod>2025-12-23T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/sector-under-the-microscope-education</loc>
  <lastmod>2025-12-18T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/penetration-testing-evolves-with-business</loc>
  <lastmod>2025-12-16T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/sector-under-the-microscope-healthcare</loc>
  <lastmod>2025-12-11T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/dora-requirements-penetration-testing-deep-dive</loc>
  <lastmod>2025-12-09T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/sector-under-the-microscope-financial-services</loc>
  <lastmod>2025-12-04T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/from-the-hacker-desk-drone-controller-firmware</loc>
  <lastmod>2025-12-02T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/jlr-breach-deep-dive</loc>
  <lastmod>2025-12-02T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/penetration-testing-risk-management-governance</loc>
  <lastmod>2025-12-02T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-16-billion-credentials</loc>
  <lastmod>2025-11-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/sector-under-the-microscope-legal</loc>
  <lastmod>2025-11-27T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/penetration-testing-elevates-cyber-essentials-plus</loc>
  <lastmod>2025-11-25T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/mature-penetration-testing-programme-multi-year</loc>
  <lastmod>2025-11-18T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/remediation-validation-retesting-close-the-loop</loc>
  <lastmod>2025-11-11T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/custom-payloads-encoding-evasion-metasploit</loc>
  <lastmod>2025-11-04T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/from-the-hacker-desk-gps-spoofing-patrol-drone</loc>
  <lastmod>2025-11-04T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-salesforce-ecosystem</loc>
  <lastmod>2025-10-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/metasploit-deep-dive-exploitation-framework</loc>
  <lastmod>2025-10-28T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/no-critical-findings-does-not-mean-secure</loc>
  <lastmod>2025-10-21T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/no-critical-findings-does-not-mean-secure</loc>
  <lastmod>2025-10-21T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/common-mistakes-interpreting-pen-test-reports</loc>
  <lastmod>2025-10-14T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/from-the-hacker-desk-drone-airborne-recon</loc>
  <lastmod>2025-10-07T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/pen-test-reports-regulatory-legal-insurance</loc>
  <lastmod>2025-10-07T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-jlr-2025</loc>
  <lastmod>2025-09-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/executive-summaries-fund-or-fail-remediation</loc>
  <lastmod>2025-09-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/netcat-deep-dive-the-swiss-army-knife-of-networking</loc>
  <lastmod>2025-09-23T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/evidence-screenshots-and-reproduction-steps</loc>
  <lastmod>2025-09-16T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/writing-findings-teams-can-remediate</loc>
  <lastmod>2025-09-09T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/from-the-hacker-desk-drone-hijack-construction</loc>
  <lastmod>2025-09-02T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/real-world-risk-score-vs-cvss</loc>
  <lastmod>2025-09-02T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-collins-airports</loc>
  <lastmod>2025-08-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/vulnerability-list-vs-narrative-report</loc>
  <lastmod>2025-08-26T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/translating-technical-findings-into-business-risk</loc>
  <lastmod>2025-08-19T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/the-report-is-the-deliverable</loc>
  <lastmod>2025-08-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/from-the-hacker-desk-guest-wifi-sensitive-data</loc>
  <lastmod>2025-08-05T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-a-good-penetration-test-report-looks-like</loc>
  <lastmod>2025-08-05T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-sharepoint-zero-day</loc>
  <lastmod>2025-07-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/pentesting-ai-engines-and-guardrails</loc>
  <lastmod>2025-07-29T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/detection-gaps-more-valuable-than-vulnerabilities</loc>
  <lastmod>2025-07-22T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/nmap-deep-dive-vulnerability-scanning-and-penetration-testing</loc>
  <lastmod>2025-07-15T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/penetration-testing-and-defensive-security</loc>
  <lastmod>2025-07-08T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/from-the-hacker-desk-cracking-passwords-afternoon</loc>
  <lastmod>2025-07-01T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/the-human-element-of-penetration-testing</loc>
  <lastmod>2025-07-01T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-sap-netweaver</loc>
  <lastmod>2025-06-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/testing-saas-and-shared-responsibility</loc>
  <lastmod>2025-06-24T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/netntlmv2-hash-cracking-and-legacy-authentication</loc>
  <lastmod>2025-06-17T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/cloud-penetration-testing</loc>
  <lastmod>2025-06-03T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/from-the-hacker-desk-cctv-intelligence-hub</loc>
  <lastmod>2025-06-03T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/privilege-escalation-explained</loc>
  <lastmod>2025-06-03T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-uk-retail-siege</loc>
  <lastmod>2025-05-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/identity-authentication-access-control</loc>
  <lastmod>2025-05-27T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/internal-vs-external-penetration-testing</loc>
  <lastmod>2025-05-20T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/responsible-proof-of-concept</loc>
  <lastmod>2025-05-13T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/from-the-hacker-desk-misconfigured-api-endpoints</loc>
  <lastmod>2025-05-06T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-exploitation-means-in-a-pen-test</loc>
  <lastmod>2025-05-06T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-marks-spencer</loc>
  <lastmod>2025-04-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/chaining-low-risk-findings</loc>
  <lastmod>2025-04-29T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/penetration-testing-methodology-walkthrough</loc>
  <lastmod>2025-04-22T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/why-automated-tools-are-not-enough</loc>
  <lastmod>2025-04-15T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/attack-surface-mapping</loc>
  <lastmod>2025-04-08T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/from-the-hacker-desk-usb-opened-the-door</loc>
  <lastmod>2025-04-01T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/reconnaissance-and-osint-in-penetration-testing</loc>
  <lastmod>2025-04-01T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-oracle-cloud-nyu</loc>
  <lastmod>2025-03-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/modelling-real-world-threat-scenarios</loc>
  <lastmod>2025-03-25T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/why-bad-scoping-is-worse-than-no-testing</loc>
  <lastmod>2025-03-18T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-happens-before-a-penetration-test</loc>
  <lastmod>2025-03-11T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/penetration-testing-enables-decisions-resilience-confidence</loc>
  <lastmod>2025-03-10T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/common-penetration-testing-types-explained</loc>
  <lastmod>2025-03-04T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/from-the-hacker-desk-default-credentials-ics</loc>
  <lastmod>2025-03-04T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-bybit</loc>
  <lastmod>2025-02-28T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-attackers-think</loc>
  <lastmod>2025-02-25T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/compliance-vs-threat-led-testing</loc>
  <lastmod>2025-02-18T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/penetration-testing-business-risk</loc>
  <lastmod>2025-02-11T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/from-the-hacker-desk-wifi-car-park</loc>
  <lastmod>2025-02-04T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/introduction-to-penetration-testing</loc>
  <lastmod>2025-02-04T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-powerschool</loc>
  <lastmod>2025-01-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/understanding-pass-the-hash-attack-how-hackers-exploit-password-vulnerabilities</loc>
  <lastmod>2025-01-28T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/penetration-testing-relevant-despite-automation-ai</loc>
  <lastmod>2025-01-24T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/apt39-a-closer-look</loc>
  <lastmod>2025-01-21T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/penetration-testing-vs-red-teaming-differences</loc>
  <lastmod>2025-01-17T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/teamviewer-hack---what-you-need-to-know</loc>
  <lastmod>2025-01-14T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/apt33-the-aerospace-stalker</loc>
  <lastmod>2025-01-07T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/from-the-hacker-desk-backup-systems-attack-vector</loc>
  <lastmod>2025-01-07T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/cve-2024-21410</loc>
  <lastmod>2025-01-01T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-2024-year-review</loc>
  <lastmod>2024-12-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-are-tarpits</loc>
  <lastmod>2024-12-25T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/apt42</loc>
  <lastmod>2024-12-18T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/apt12-the-prcs-cyber-operative</loc>
  <lastmod>2024-12-11T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/apt35</loc>
  <lastmod>2024-12-04T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/from-the-hacker-desk-cloud-permissions-escalation</loc>
  <lastmod>2024-12-03T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-blue-yonder</loc>
  <lastmod>2024-11-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/apt34</loc>
  <lastmod>2024-11-27T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/muddywater</loc>
  <lastmod>2024-11-20T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/capgemini-data-breach-20gb-of-sensitive-information-stolen</loc>
  <lastmod>2024-11-13T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-is-a-threat-led-penetration-test-tlpt</loc>
  <lastmod>2024-11-06T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/from-the-hacker-desk-social-engineering-reception</loc>
  <lastmod>2024-11-05T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/penetration-testing-checklist-for-business-owners</loc>
  <lastmod>2024-11-05T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-internet-archive</loc>
  <lastmod>2024-10-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/apt1-the-persistent-data-hoarder</loc>
  <lastmod>2024-10-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/xml-external-entity-attack</loc>
  <lastmod>2024-10-16T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-is-spear-phishing</loc>
  <lastmod>2024-10-09T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-to-choose-a-penetration-testing-provider</loc>
  <lastmod>2024-10-08T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-is-hipaa</loc>
  <lastmod>2024-10-02T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/from-the-hacker-desk-vlan-not-segmented</loc>
  <lastmod>2024-10-01T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-tfl</loc>
  <lastmod>2024-09-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/airspace-penetration-testing</loc>
  <lastmod>2024-09-25T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/difference-between-a-penetration-test-and-a-vulnerability-scan</loc>
  <lastmod>2024-09-18T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/wifi-penetration-testing-of-companies</loc>
  <lastmod>2024-09-11T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/annual-penetration-testing-requirements-uk-gdpr</loc>
  <lastmod>2024-09-10T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/from-the-hacker-desk-forgotten-test-server</loc>
  <lastmod>2024-09-03T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-national-public-data</loc>
  <lastmod>2024-08-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/penetration-test-report-explained</loc>
  <lastmod>2024-08-13T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/from-the-hacker-desk-intern-laptop-beachhead</loc>
  <lastmod>2024-08-06T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-crowdstrike-outage</loc>
  <lastmod>2024-07-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/from-the-hacker-desk-exploiting-trust-between-offices</loc>
  <lastmod>2024-07-02T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-to-prepare-for-a-penetration-test</loc>
  <lastmod>2024-07-02T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-synnovis-nhs-london</loc>
  <lastmod>2024-06-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/crest-approved-penetration-testing-company</loc>
  <lastmod>2024-06-11T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/from-the-hacker-desk-coffee-machine</loc>
  <lastmod>2024-06-04T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-snowflake-campaign</loc>
  <lastmod>2024-05-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/difference-between-vulnerability-scan-and-penetration-test</loc>
  <lastmod>2024-05-14T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/uk-government-breaches-six-month-update</loc>
  <lastmod>2024-05-08T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/from-the-hacker-desk-phishing-finance-director</loc>
  <lastmod>2024-05-07T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-att-73m</loc>
  <lastmod>2024-04-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/penetration-testing-for-small-business-uk</loc>
  <lastmod>2024-04-09T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/from-the-hacker-desk-printer-domain-admin</loc>
  <lastmod>2024-04-02T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-change-healthcare</loc>
  <lastmod>2024-03-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-much-does-a-penetration-test-cost-uk</loc>
  <lastmod>2024-03-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/from-the-hacker-desk-superyacht-keylock</loc>
  <lastmod>2024-03-05T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-lockbit-takedown</loc>
  <lastmod>2024-02-28T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/from-the-hacker-desk-lift-reconnaissance-platform</loc>
  <lastmod>2024-02-06T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-is-a-penetration-test-and-do-i-need-one</loc>
  <lastmod>2024-02-06T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-microsoft-midnight-blizzard</loc>
  <lastmod>2024-01-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/from-the-hacker-desk-boardroom-tv</loc>
  <lastmod>2024-01-02T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-2023-year-review</loc>
  <lastmod>2023-12-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-actually-happens-during-a-professional-penetration-test-from-day-one-to-final-report</loc>
  <lastmod>2023-12-26T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-do-ethical-hackers-think-differently-from-traditional-it-security-teams</loc>
  <lastmod>2023-12-25T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-is-the-difference-between-a-vulnerability-scan-and-a-penetration-test-and-why-does-it-matter</loc>
  <lastmod>2023-12-24T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/when-should-a-business-choose-a-red-team-engagement-instead-of-a-standard-penetration-test</loc>
  <lastmod>2023-12-23T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-do-penetration-testers-prioritise-findings-based-on-real-world-exploitability-rather-than-theoretical-risk</loc>
  <lastmod>2023-12-22T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/can-a-penetration-test-measure-business-impact-not-just-technical-weakness</loc>
  <lastmod>2023-12-21T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-evidence-makes-a-penetration-test-report-credible-at-board-level</loc>
  <lastmod>2023-12-20T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/why-do-many-penetration-test-reports-fail-to-drive-meaningful-remediation</loc>
  <lastmod>2023-12-19T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-often-should-an-organisation-conduct-external-and-internal-penetration-tests</loc>
  <lastmod>2023-12-18T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-is-the-role-of-threat-intelligence-in-modern-penetration-testing</loc>
  <lastmod>2023-12-17T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-do-testers-validate-whether-a-vulnerability-is-truly-exploitable-in-your-environment</loc>
  <lastmod>2023-12-16T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-are-the-most-common-misconfigurations-discovered-during-internal-network-tests</loc>
  <lastmod>2023-12-15T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-do-phishing-simulations-differ-from-real-adversary-social-engineering-campaigns</loc>
  <lastmod>2023-12-14T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-does-a-crest-aligned-penetration-testing-methodology-actually-involve</loc>
  <lastmod>2023-12-13T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-can-penetration-testing-support-iso-27001-compliance-rather-than-simply-tick-a-box</loc>
  <lastmod>2023-12-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-makes-a-web-application-penetration-test-genuinely-thorough</loc>
  <lastmod>2023-12-11T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-do-testers-assess-authentication-and-session-management-weaknesses</loc>
  <lastmod>2023-12-10T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/why-is-lateral-movement-often-the-most-damaging-phase-of-an-attack</loc>
  <lastmod>2023-12-09T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-do-testers-approach-active-directory-security-in-complex-enterprise-environments</loc>
  <lastmod>2023-12-08T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-is-privilege-escalation-and-how-easily-can-it-occur-in-mature-organisations</loc>
  <lastmod>2023-12-07T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-do-testers-safely-exploit-vulnerabilities-without-disrupting-live-business-systems</loc>
  <lastmod>2023-12-06T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-are-the-biggest-misconceptions-boards-have-about-penetration-testing</loc>
  <lastmod>2023-12-05T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-do-penetration-testers-evaluate-third-party-and-supply-chain-exposure</loc>
  <lastmod>2023-12-04T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-are-the-risks-of-relying-solely-on-automated-testing-tools</loc>
  <lastmod>2023-12-03T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-do-testers-assess-cloud-environments-differently-from-on-premise-infrastructure</loc>
  <lastmod>2023-12-02T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/can-penetration-testing-uncover-weaknesses-in-remote-working-and-vpn-architectures</loc>
  <lastmod>2023-12-01T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-icbc-lockbit</loc>
  <lastmod>2023-11-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-should-findings-from-a-penetration-test-feed-into-a-vulnerability-management-programme</loc>
  <lastmod>2023-11-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-does-a-high-quality-executive-summary-in-a-penetration-test-report-look-like</loc>
  <lastmod>2023-11-29T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-do-testers-quantify-the-likelihood-of-exploitation-in-the-wild</loc>
  <lastmod>2023-11-28T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-are-the-typical-root-causes-behind-recurring-critical-vulnerabilities</loc>
  <lastmod>2023-11-27T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-does-physical-penetration-testing-differ-from-digital-testing</loc>
  <lastmod>2023-11-26T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/can-a-penetration-test-demonstrate-resilience-against-ransomware</loc>
  <lastmod>2023-11-25T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-do-testers-approach-api-security-assessments</loc>
  <lastmod>2023-11-24T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-are-the-early-warning-signs-that-your-organisation-is-ready-for-a-red-team-simulation</loc>
  <lastmod>2023-11-23T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-can-businesses-ensure-their-remediation-actions-are-effective-after-a-test</loc>
  <lastmod>2023-11-22T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-is-the-value-of-retesting-and-when-should-it-be-conducted</loc>
  <lastmod>2023-11-21T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-do-testers-simulate-insider-threat-scenarios</loc>
  <lastmod>2023-11-20T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-role-does-password-hygiene-still-play-in-modern-breach-scenarios</loc>
  <lastmod>2023-11-19T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-are-wireless-networks-typically-compromised-during-an-engagement</loc>
  <lastmod>2023-11-18T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-is-the-real-impact-of-outdated-ssltls-configurations</loc>
  <lastmod>2023-11-17T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-do-testers-measure-attack-surface-exposure-from-publicly-available-information</loc>
  <lastmod>2023-11-16T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-does-exploitation-proof-of-concept-actually-mean-in-a-report</loc>
  <lastmod>2023-11-15T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-can-penetration-testing-reduce-cyber-insurance-premiums</loc>
  <lastmod>2023-11-14T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-are-the-ethical-boundaries-of-professional-hacking</loc>
  <lastmod>2023-11-13T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-do-penetration-testers-balance-stealth-with-evidence-gathering</loc>
  <lastmod>2023-11-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-makes-a-penetration-test-valuable-to-security-operations-teams</loc>
  <lastmod>2023-11-11T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-should-organisations-prepare-internally-before-commissioning-a-penetration-test</loc>
  <lastmod>2023-11-10T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-differentiates-a-high-assurance-testing-firm-from-a-commodity-provider</loc>
  <lastmod>2023-11-09T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-do-testers-adapt-methodology-when-targeting-operational-technology-or-iot-environments</loc>
  <lastmod>2023-11-08T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/uk-government-breaches-pattern-of-failure</loc>
  <lastmod>2023-11-08T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-does-penetration-testing-fit-into-a-broader-detect-defend-and-disrupt-cyber-strategy</loc>
  <lastmod>2023-11-07T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-23andme</loc>
  <lastmod>2023-10-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-much-does-a-penetration-test-cost-for-a-medium-sized-uk-business</loc>
  <lastmod>2023-10-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-factors-influence-the-price-of-a-penetration-test</loc>
  <lastmod>2023-10-24T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-long-does-a-typical-penetration-test-take-to-complete</loc>
  <lastmod>2023-10-17T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-do-i-compare-penetration-testing-quotes-from-different-providers</loc>
  <lastmod>2023-10-10T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-credentials-should-a-penetration-testing-company-hold</loc>
  <lastmod>2023-10-03T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-mgm-caesars</loc>
  <lastmod>2023-09-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-is-the-difference-between-crest-check-and-cyber-scheme-certifications</loc>
  <lastmod>2023-09-26T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/can-penetration-testing-disrupt-our-live-production-systems</loc>
  <lastmod>2023-09-19T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/do-i-need-board-approval-before-commissioning-a-penetration-test</loc>
  <lastmod>2023-09-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-information-does-a-penetration-testing-provider-need-before-starting</loc>
  <lastmod>2023-09-05T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-uk-electoral-commission</loc>
  <lastmod>2023-08-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-do-we-define-the-scope-of-a-penetration-test-properly</loc>
  <lastmod>2023-08-29T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-happens-if-critical-vulnerabilities-are-found-during-testing</loc>
  <lastmod>2023-08-22T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/will-the-testers-require-administrative-credentials</loc>
  <lastmod>2023-08-15T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/should-we-inform-staff-before-conducting-an-internal-penetration-test</loc>
  <lastmod>2023-08-08T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-confidential-is-the-penetration-testing-report</loc>
  <lastmod>2023-08-01T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-barracuda-esg</loc>
  <lastmod>2023-07-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/who-owns-the-data-generated-during-a-penetration-test</loc>
  <lastmod>2023-07-25T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-do-penetration-testers-protect-sensitive-information-discovered-during-testing</loc>
  <lastmod>2023-07-18T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/can-penetration-testing-be-done-remotely</loc>
  <lastmod>2023-07-11T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/do-we-need-cyber-insurance-before-commissioning-a-penetration-test</loc>
  <lastmod>2023-07-04T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-often-do-regulators-expect-penetration-testing-to-be-performed</loc>
  <lastmod>2023-06-27T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-evidence-will-i-receive-for-audit-or-compliance-purposes</loc>
  <lastmod>2023-06-20T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/can-penetration-testing-help-with-cyber-essentials-plus-certification</loc>
  <lastmod>2023-06-13T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-is-the-difference-between-black-box-grey-box-and-white-box-testing-and-which-should-i-choose</loc>
  <lastmod>2023-06-06T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-moveit-clop</loc>
  <lastmod>2023-05-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-do-i-ensure-the-penetration-test-aligns-with-our-specific-industry-risks</loc>
  <lastmod>2023-05-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/can-we-limit-testing-to-out-of-hours-activity</loc>
  <lastmod>2023-05-23T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-level-of-reporting-detail-should-i-expect-for-technical-teams-versus-executives</loc>
  <lastmod>2023-05-16T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/will-testers-attempt-password-spraying-or-brute-force-attacks</loc>
  <lastmod>2023-05-09T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-do-providers-ensure-testing-is-legal-and-authorised</loc>
  <lastmod>2023-05-02T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-western-digital</loc>
  <lastmod>2023-04-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-contractual-protections-should-be-in-place-before-testing-begins</loc>
  <lastmod>2023-04-25T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/can-penetration-testing-identify-insider-threats</loc>
  <lastmod>2023-04-18T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-do-we-validate-that-remediation-actions-have-fully-resolved-issues</loc>
  <lastmod>2023-04-11T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-is-the-difference-between-annual-testing-and-continuous-testing</loc>
  <lastmod>2023-04-04T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-3cx-supply-chain</loc>
  <lastmod>2023-03-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/is-it-better-to-use-the-same-provider-each-year-or-rotate-suppliers</loc>
  <lastmod>2023-03-28T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-do-i-evaluate-the-real-world-experience-of-a-penetration-testing-team</loc>
  <lastmod>2023-03-21T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-tools-do-professional-penetration-testers-typically-use</loc>
  <lastmod>2023-03-14T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/can-penetration-testing-simulate-ransomware-deployment-safely</loc>
  <lastmod>2023-03-07T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-t-mobile-37m-api</loc>
  <lastmod>2023-02-28T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-kpis-should-i-measure-to-assess-penetration-testing-effectiveness</loc>
  <lastmod>2023-02-28T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-do-penetration-testing-results-integrate-with-a-siem-or-soc</loc>
  <lastmod>2023-02-21T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-is-the-typical-turnaround-time-for-a-final-report</loc>
  <lastmod>2023-02-14T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/are-penetration-tests-covered-under-gdpr-processing-agreements</loc>
  <lastmod>2023-02-07T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-royal-mail-lockbit</loc>
  <lastmod>2023-01-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/can-testing-be-tailored-to-mergers-and-acquisitions-due-diligence</loc>
  <lastmod>2023-01-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-is-included-in-a-retest-and-is-it-charged-separately</loc>
  <lastmod>2023-01-24T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-do-penetration-testers-assess-third-party-saas-platforms</loc>
  <lastmod>2023-01-17T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/can-testing-cover-mobile-applications-and-apis-together</loc>
  <lastmod>2023-01-10T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-do-we-ensure-minimal-reputational-risk-during-testing</loc>
  <lastmod>2023-01-03T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-2022-year-review</loc>
  <lastmod>2022-12-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-cyber-maturity-level-should-we-reach-before-commissioning-a-red-team</loc>
  <lastmod>2022-12-27T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-do-we-prepare-our-incident-response-team-for-a-live-test</loc>
  <lastmod>2022-12-20T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-are-the-warning-signs-of-a-low-quality-penetration-testing-provider</loc>
  <lastmod>2022-12-13T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/should-penetration-testing-be-combined-with-a-vulnerability-management-programme</loc>
  <lastmod>2022-12-06T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-dropbox-source-code</loc>
  <lastmod>2022-11-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/how-do-i-justify-penetration-testing-expenditure-to-the-board</loc>
  <lastmod>2022-11-29T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/what-questions-should-i-ask-before-signing-a-penetration-testing-contract</loc>
  <lastmod>2022-11-22T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-medibank</loc>
  <lastmod>2022-10-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-uber-2022</loc>
  <lastmod>2022-09-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-nhs-advanced-lastpass</loc>
  <lastmod>2022-08-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-twitter-54m-api</loc>
  <lastmod>2022-07-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-cash-app-insider</loc>
  <lastmod>2022-06-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-costa-rica-conti</loc>
  <lastmod>2022-05-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-ronin-axie</loc>
  <lastmod>2022-04-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-lapsus</loc>
  <lastmod>2022-03-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-ukraine-cyber-warfare</loc>
  <lastmod>2022-02-28T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-red-cross-icrc</loc>
  <lastmod>2022-01-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-2021-year-review</loc>
  <lastmod>2021-12-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-godaddy</loc>
  <lastmod>2021-11-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-twitch</loc>
  <lastmod>2021-10-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-epik</loc>
  <lastmod>2021-09-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-t-mobile-us-2021</loc>
  <lastmod>2021-08-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-kaseya-vsa</loc>
  <lastmod>2021-07-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-hse-jbs-ransomware</loc>
  <lastmod>2021-06-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-colonial-pipeline</loc>
  <lastmod>2021-05-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-facebook-533m-leak</loc>
  <lastmod>2021-04-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-hafnium-exchange</loc>
  <lastmod>2021-03-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-oldsmar-water</loc>
  <lastmod>2021-02-28T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-mimecast</loc>
  <lastmod>2021-01-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-2020-year-review</loc>
  <lastmod>2020-12-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-manchester-united</loc>
  <lastmod>2020-11-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-hackney-council</loc>
  <lastmod>2020-10-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-dusseldorf-hospital</loc>
  <lastmod>2020-09-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-garmin-wastedlocker</loc>
  <lastmod>2020-08-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-twitter-hack</loc>
  <lastmod>2020-07-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-blackbaud</loc>
  <lastmod>2020-06-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-easyjet</loc>
  <lastmod>2020-05-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-zoom-security</loc>
  <lastmod>2020-04-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-covid-remote-working</loc>
  <lastmod>2020-03-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-clearview-ai</loc>
  <lastmod>2020-02-28T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-microsoft-250m</loc>
  <lastmod>2020-01-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-2019-year-review</loc>
  <lastmod>2019-12-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-labour-party-ddos</loc>
  <lastmod>2019-11-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-nordvpn</loc>
  <lastmod>2019-10-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-ecuador</loc>
  <lastmod>2019-09-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-imperva</loc>
  <lastmod>2019-08-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-capital-one</loc>
  <lastmod>2019-07-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-baltimore-ransomware</loc>
  <lastmod>2019-06-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-whatsapp-nso-pegasus</loc>
  <lastmod>2019-05-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-facebook-plaintext-passwords</loc>
  <lastmod>2019-04-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-norsk-hydro</loc>
  <lastmod>2019-03-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-620m-accounts</loc>
  <lastmod>2019-02-28T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-collection-1</loc>
  <lastmod>2019-01-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-2018-year-review</loc>
  <lastmod>2018-12-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/cambridge-analytica-breach-six-month-update</loc>
  <lastmod>2018-12-17T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-marriott-starwood</loc>
  <lastmod>2018-11-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-facebook-access-tokens</loc>
  <lastmod>2018-10-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-british-airways-magecart</loc>
  <lastmod>2018-09-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-t-mobile-us-2018</loc>
  <lastmod>2018-08-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-singhealth</loc>
  <lastmod>2018-07-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-ticketmaster-dixons</loc>
  <lastmod>2018-06-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/cambridge-analytica-breach-deep-dive</loc>
  <lastmod>2018-06-17T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-gdpr-enforcement</loc>
  <lastmod>2018-05-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-atlanta-samsam</loc>
  <lastmod>2018-04-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-cambridge-analytica</loc>
  <lastmod>2018-03-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-olympic-destroyer</loc>
  <lastmod>2018-02-28T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-spectre-meltdown</loc>
  <lastmod>2018-01-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-2017-year-review</loc>
  <lastmod>2017-12-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-uber</loc>
  <lastmod>2017-11-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-bad-rabbit-krack</loc>
  <lastmod>2017-10-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-equifax</loc>
  <lastmod>2017-09-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-hbo-hack</loc>
  <lastmod>2017-08-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-uk-parliament-email</loc>
  <lastmod>2017-07-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-notpetya</loc>
  <lastmod>2017-06-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-wannacry</loc>
  <lastmod>2017-05-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-eternalblue-released</loc>
  <lastmod>2017-04-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-vault-7</loc>
  <lastmod>2017-03-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-cloudbleed</loc>
  <lastmod>2017-02-28T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-mongodb-ransomware</loc>
  <lastmod>2017-01-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/panama-papers-breach-six-month-update</loc>
  <lastmod>2017-01-03T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-2016-year-review</loc>
  <lastmod>2016-12-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-tesco-bank</loc>
  <lastmod>2016-11-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-dyn-mirai</loc>
  <lastmod>2016-10-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-yahoo-500m</loc>
  <lastmod>2016-09-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-shadow-brokers</loc>
  <lastmod>2016-08-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-credential-stuffing-epidemic</loc>
  <lastmod>2016-07-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/panama-papers-breach-deep-dive</loc>
  <lastmod>2016-07-03T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-dnc-hack</loc>
  <lastmod>2016-06-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-mega-breach-dumps</loc>
  <lastmod>2016-05-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-philippines-comelec</loc>
  <lastmod>2016-04-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/ashley-madison-breach-six-month-update</loc>
  <lastmod>2016-04-19T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-panama-papers</loc>
  <lastmod>2016-03-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-hollywood-presbyterian-ransomware</loc>
  <lastmod>2016-02-28T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-bangladesh-bank-swift</loc>
  <lastmod>2016-01-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-2015-year-review</loc>
  <lastmod>2015-12-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-vtech</loc>
  <lastmod>2015-11-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-talktalk</loc>
  <lastmod>2015-10-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/ashley-madison-breach-deep-dive</loc>
  <lastmod>2015-10-19T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-carphone-warehouse</loc>
  <lastmod>2015-09-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-ashley-madison</loc>
  <lastmod>2015-08-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/sony-pictures-breach-six-month-update</loc>
  <lastmod>2015-08-24T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-hacking-team</loc>
  <lastmod>2015-07-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-lastpass</loc>
  <lastmod>2015-06-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-opm</loc>
  <lastmod>2015-05-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-github-great-cannon</loc>
  <lastmod>2015-04-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-premera-blue-cross</loc>
  <lastmod>2015-03-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-anthem</loc>
  <lastmod>2015-02-28T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/sony-pictures-breach-deep-dive</loc>
  <lastmod>2015-02-24T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-moonpig</loc>
  <lastmod>2015-01-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-2014-year-review</loc>
  <lastmod>2014-12-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-sony-pictures</loc>
  <lastmod>2014-11-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-shellshock</loc>
  <lastmod>2014-10-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-home-depot</loc>
  <lastmod>2014-09-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-icloud-photos</loc>
  <lastmod>2014-08-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-jp-morgan-chase</loc>
  <lastmod>2014-07-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-operation-tovar</loc>
  <lastmod>2014-06-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-ebay</loc>
  <lastmod>2014-05-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-heartbleed</loc>
  <lastmod>2014-04-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-morrisons-insider</loc>
  <lastmod>2014-03-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/snowden-nsa-leak-six-month-update</loc>
  <lastmod>2014-03-05T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-korea-credit-bureau</loc>
  <lastmod>2014-02-28T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-snapchat</loc>
  <lastmod>2014-01-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-2013-year-review</loc>
  <lastmod>2013-12-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-target</loc>
  <lastmod>2013-11-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-cryptolocker</loc>
  <lastmod>2013-10-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-adobe</loc>
  <lastmod>2013-09-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/snowden-nsa-leak-deep-dive</loc>
  <lastmod>2013-09-05T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-vodafone-germany-insider</loc>
  <lastmod>2013-08-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-ubuntu-forums</loc>
  <lastmod>2013-07-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-snowden-nsa</loc>
  <lastmod>2013-06-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-livingsocial</loc>
  <lastmod>2013-05-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-ap-twitter-sea</loc>
  <lastmod>2013-04-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-spamhaus-ddos</loc>
  <lastmod>2013-03-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-watering-hole-silicon-valley</loc>
  <lastmod>2013-02-28T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-new-york-times-china</loc>
  <lastmod>2013-01-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-2012-year-review</loc>
  <lastmod>2012-12-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-uk-ico-enforcement-2012</loc>
  <lastmod>2012-11-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-south-carolina-dor</loc>
  <lastmod>2012-10-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-gmp-memory-stick</loc>
  <lastmod>2012-09-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-saudi-aramco-shamoon</loc>
  <lastmod>2012-08-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-credential-dump-summer</loc>
  <lastmod>2012-07-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-linkedin</loc>
  <lastmod>2012-06-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-flame-malware</loc>
  <lastmod>2012-05-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-anonymous-uk-government</loc>
  <lastmod>2012-04-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-global-payments</loc>
  <lastmod>2012-03-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-nortel-networks</loc>
  <lastmod>2012-02-28T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-zappos</loc>
  <lastmod>2012-01-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-2011-year-review</loc>
  <lastmod>2011-12-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-steam-valve</loc>
  <lastmod>2011-11-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-nhs-trust-fines-2011</loc>
  <lastmod>2011-10-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-diginotar-ca</loc>
  <lastmod>2011-09-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-operation-shady-rat</loc>
  <lastmod>2011-08-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-news-of-the-world</loc>
  <lastmod>2011-07-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-lulzsec</loc>
  <lastmod>2011-06-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-lockheed-martin</loc>
  <lastmod>2011-05-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-sony-psn</loc>
  <lastmod>2011-04-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-comodo-ca</loc>
  <lastmod>2011-03-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-rsa-securid</loc>
  <lastmod>2011-02-28T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-hbgary-federal</loc>
  <lastmod>2011-01-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-2010-year-review</loc>
  <lastmod>2010-12-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-zeus-botnet-arrests</loc>
  <lastmod>2010-11-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-nhs-hard-drives-ebay</loc>
  <lastmod>2010-10-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-acs-law-anonymous</loc>
  <lastmod>2010-09-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-zurich-insurance-uk</loc>
  <lastmod>2010-08-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-att-ipad-email</loc>
  <lastmod>2010-07-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-stuxnet</loc>
  <lastmod>2010-06-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-wikileaks-manning</loc>
  <lastmod>2010-05-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-belvoir-park-hospital</loc>
  <lastmod>2010-04-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-gonzalez-sentenced</loc>
  <lastmod>2010-03-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-mariposa-botnet</loc>
  <lastmod>2010-02-28T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-operation-aurora</loc>
  <lastmod>2010-01-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-2009-year-in-review</loc>
  <lastmod>2009-12-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-uk-government-data-loss-epidemic</loc>
  <lastmod>2009-11-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-sidekick-cloud-data-loss</loc>
  <lastmod>2009-10-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-network-solutions</loc>
  <lastmod>2009-09-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-gonzalez-indictment</loc>
  <lastmod>2009-08-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-t-mobile-uk-insider</loc>
  <lastmod>2009-07-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-virginia-prescription-ransom</loc>
  <lastmod>2009-06-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-tjx-tk-maxx</loc>
  <lastmod>2009-05-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-mod-laptop-theft</loc>
  <lastmod>2009-04-30T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-rbs-worldpay</loc>
  <lastmod>2009-03-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-heartland-payment-systems</loc>
  <lastmod>2009-02-28T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.hedgehogsecurity.co.uk/blog/anatomy-of-a-breach-hmrc-child-benefit-data-loss</loc>
  <lastmod>2009-01-31T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>


</urlset>
