<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://cybersom.org/wp-sitemap.xsl" ?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://cybersom.org/episode/the-double-edged-sword-how-ai-is-changing-cybersecurity/</loc><lastmod>2026-03-09T04:11:21+00:00</lastmod></url><url><loc>https://cybersom.org/episode/ransomware-3-0-from-data-encryption-to-triple-extortion/</loc><lastmod>2026-03-09T05:01:48+00:00</lastmod></url><url><loc>https://cybersom.org/episode/understanding-social-engineering-why-humans-are-the-weakest-link/</loc><lastmod>2026-03-09T04:14:42+00:00</lastmod></url></urlset>
