<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://threatintel.eu/publications-presentations/</loc><lastmod>2025-08-07T10:53:03+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://threatintel.eu/upcoming-trainings-presentations/</loc><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2024/04/1632838506202-2.jpg</image:loc><image:title>1632838506202 (2)</image:title></image:image><lastmod>2025-08-07T07:50:14+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://threatintel.eu/2024/09/17/8th-nmiotc-conference-on-cyber-security-in-maritime-domain/</loc><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2024/09/8th-nmiotc-cyber-conference-website-banner.jpg</image:loc><image:title>8th-NMIOTC-Cyber-Conference-website-banner</image:title></image:image><lastmod>2026-02-25T07:50:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatintel.eu/2024/09/16/cfp-first-cti-conference-2025/</loc><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2024/09/firstcti25-cfp.jpg</image:loc><image:title>firstcti25-CFP</image:title></image:image><lastmod>2024-09-16T21:52:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatintel.eu/2024/09/16/cfp-sans-cti-summit-2025/</loc><lastmod>2024-09-16T21:44:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatintel.eu/2024/09/16/sans-webcast-on-past-sans-cti-surveys/</loc><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2024/09/screenshot-2024-09-17-003824.jpg</image:loc><image:title>Screenshot 2024-09-17 003824</image:title></image:image><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2024/09/screenshot-2024-09-17-003707.jpg</image:loc><image:title>Screenshot 2024-09-17 003707</image:title></image:image><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2024/09/screenshot-2024-09-17-003428.jpg</image:loc><image:title>Screenshot 2024-09-17 003428</image:title></image:image><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2024/09/screenshot-2024-09-17-003111.jpg</image:loc><image:title>Screenshot 2024-09-17 003111</image:title></image:image><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2024/09/screenshot-2024-09-17-002921.jpg</image:loc><image:title>Screenshot 2024-09-17 002921</image:title></image:image><lastmod>2024-09-16T21:38:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatintel.eu/2024/06/24/presenting-bsides-athens-2024/</loc><lastmod>2024-06-24T20:26:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatintel.eu/2024/06/24/sans-cti-survey-2024-report-and-webcast/</loc><lastmod>2024-06-24T20:20:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatintel.eu/2024/04/03/cyber-shield-up-they-shall-not-pass-presentation-uoc/</loc><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2024/04/first_slide.png</image:loc><image:title>first_slide</image:title></image:image><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2024/04/pxl_20240402_111810083.jpg</image:loc><image:title>pxl_20240402_111810083</image:title></image:image><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2024/04/pxl_20240402_110539726.mp_.jpg</image:loc><image:title>pxl_20240402_110539726.mp_</image:title></image:image><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2024/04/pxl_20240402_110526259.jpg</image:loc><image:title>pxl_20240402_110526259</image:title></image:image><lastmod>2024-04-22T12:23:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatintel.eu/2024/02/16/first-cti-2024-agenda-is-out/</loc><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2024/02/firstcti24.jpg</image:loc><image:title>firstcti24</image:title></image:image><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2024/02/image-2.png</image:loc><image:title>image-2</image:title></image:image><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2024/02/image-1.png</image:loc><image:title>image-1</image:title></image:image><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2024/02/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-02-16T15:32:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatintel.eu/about/</loc><lastmod>2024-02-06T18:24:34+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://threatintel.eu/2024/01/30/spin-your-cti-process-round/</loc><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2024/01/screenshot-2024-01-30-at-10.59.43-am.png</image:loc><image:title>Screenshot 2024-01-30 at 10.59.43 AM</image:title></image:image><lastmod>2024-01-30T09:11:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatintel.eu/2023/11/13/first-cti-2023-recap/</loc><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2023/11/img_7062.jpg</image:loc><image:title>img_7062</image:title></image:image><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2023/11/img_6949.jpg</image:loc><image:title>img_6949</image:title></image:image><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2023/11/img_6994.jpg</image:loc><image:title>img_6994</image:title></image:image><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2023/11/img_6987.jpg</image:loc><image:title>img_6987</image:title></image:image><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2023/11/img_6988.jpg</image:loc><image:title>img_6988</image:title></image:image><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2023/11/img_6944.jpg</image:loc><image:title>img_6944</image:title></image:image><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2023/11/img_6943.jpg</image:loc><image:title>img_6943</image:title></image:image><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2023/11/img_6935.jpg</image:loc><image:title>img_6935</image:title></image:image><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2023/11/img_6931.jpg</image:loc><image:title>img_6931</image:title></image:image><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2023/11/img_6916.jpg</image:loc><image:title>img_6916</image:title></image:image><lastmod>2023-11-18T07:44:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatintel.eu/2023/11/04/call-for-papers-first-cti-2024/</loc><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2023/11/firstcti24-cfp.jpg</image:loc><image:title>firstcti24-CFP</image:title></image:image><lastmod>2023-11-13T12:49:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatintel.eu/2023/11/01/presenting-at-first-cti-2023/</loc><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2023/11/screenshot-2023-11-13-at-11.50.21-am.png</image:loc><image:title>Screenshot 2023-11-13 at 11.50.21 AM</image:title></image:image><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2023/11/1699216080735.jpeg</image:loc><image:title>1699216080735</image:title></image:image><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2023/11/screenshot-2023-11-13-at-11.42.33-am.png</image:loc><image:title>screenshot-2023-11-13-at-11.42.33-am</image:title></image:image><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2023/11/screenshot-2023-11-13-at-11.41.15-am.png</image:loc><image:title>Screenshot 2023-11-13 at 11.41.15 AM</image:title></image:image><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2023/11/screenshot-2023-11-13-at-11.41.00-am.png</image:loc><image:title>Screenshot 2023-11-13 at 11.41.00 AM</image:title></image:image><lastmod>2023-11-13T09:51:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatintel.eu/2023/10/20/enisa-threat-landscape-2023/</loc><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2023/11/72e5e7a8-2033-4aac-be77-20c28af932ca.jpeg</image:loc><image:title>72e5e7a8-2033-4aac-be77-20c28af932ca</image:title></image:image><lastmod>2023-11-13T09:36:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatintel.eu/2023/10/08/sans-dfir-prague-2023/</loc><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2023/11/1696846118501.jpeg</image:loc><image:title>1696846118501</image:title></image:image><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2023/11/1696846111664.jpeg</image:loc><image:title>1696846111664</image:title></image:image><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2023/11/1696846120620.jpeg</image:loc><image:title>1696846120620</image:title></image:image><lastmod>2023-11-13T09:28:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatintel.eu/2023/09/30/2nd-enisa-cybersecurity-market-analysis-conference/</loc><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2023/09/1696183371461.jpeg</image:loc><image:title>1696183371461</image:title></image:image><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2023/09/1696183376238.jpeg</image:loc><image:title>1696183376238</image:title></image:image><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2023/09/1696183371153.jpeg</image:loc><image:title>1696183371153</image:title></image:image><lastmod>2023-11-13T08:23:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatintel.eu/2023/09/03/first-cti-symposium-2023-agenda-is-out/</loc><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2023/09/test_first.jpg</image:loc><image:title>test_first</image:title></image:image><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2023/09/screenshot-2023-09-18-at-9.13.59-am.png</image:loc><image:title>Screenshot 2023-09-18 at 9.13.59 AM</image:title></image:image><lastmod>2023-09-18T06:24:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatintel.eu/2023/09/17/when-cyber-meets-physical/</loc><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2023/09/victor_ua.jpeg</image:loc><image:title>victor_ua</image:title></image:image><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2023/09/enisa_another.jpg</image:loc><image:title>enisa_another</image:title></image:image><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2023/09/enisa_other_resized.jpg</image:loc><image:title>enisa_other_resized</image:title></image:image><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2023/09/enisa_resized.jpg</image:loc><image:title>enisa_resized</image:title></image:image><lastmod>2023-09-18T05:56:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatintel.eu/2023/07/01/role-of-cyber-in-hybrid-threats/</loc><lastmod>2023-09-17T12:56:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatintel.eu/2022/12/13/setting-your-cti-process-in-motion/</loc><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2022/12/img-3710.jpg</image:loc><image:title>img-3710</image:title></image:image><lastmod>2022-12-13T11:06:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatintel.eu/2022/11/10/enisa-cti-eu-2022-conference/</loc><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2022/11/be90e829-18f2-431f-b212-61066a785003.jpeg</image:loc><image:title>be90e829-18f2-431f-b212-61066a785003</image:title></image:image><lastmod>2022-12-08T08:53:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatintel.eu/2022/11/14/enisa-threat-landscape-2022-threat-actor-trends/</loc><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2022/11/f5ab03ab-28e9-485c-abf0-bdb9e4cf4560.png</image:loc><image:title>f5ab03ab-28e9-485c-abf0-bdb9e4cf4560</image:title></image:image><lastmod>2023-05-06T04:23:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatintel.eu/2022/11/05/first-cti-symposium-2022-recap/</loc><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2022/11/image-8.png</image:loc><image:title>image-8</image:title></image:image><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2022/11/image-7.png</image:loc><image:title>image-7</image:title></image:image><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2022/11/image-6.png</image:loc><image:title>image-6</image:title></image:image><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2022/11/image-5.png</image:loc><image:title>image-5</image:title></image:image><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2022/11/image-4.png</image:loc><image:title>image-4</image:title></image:image><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2022/11/image-3.png</image:loc><image:title>image-3</image:title></image:image><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2022/11/fgo7vuywqaeuppq.jpeg</image:loc><image:title>Fgo7vuYWQAEuppQ</image:title></image:image><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2022/11/screenshot-2022-11-05-at-15.11.11.png</image:loc><image:title>Screenshot 2022-11-05 at 15.11.11</image:title></image:image><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2022/11/fgpctsawyaasyxk.jpeg</image:loc><image:title>FgpCTSaWYAASYXK</image:title></image:image><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2022/11/fgochtaxeaaaxbz.jpeg</image:loc><image:title>FgoCHtaXEAAAXbZ</image:title></image:image><lastmod>2022-11-05T14:06:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatintel.eu/2021/05/04/enisas-ad-hoc-working-group-on-cyber-threat-landscapes/</loc><lastmod>2021-11-14T20:38:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatintel.eu/2021/04/28/guest-lecture-dtu-welcome-to-the-world-of-cti/</loc><lastmod>2021-04-28T10:17:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatintel.eu/2021/03/19/sans-cti-summit-2021-video-recording/</loc><lastmod>2021-04-05T23:46:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatintel.eu/2021/01/22/exceling-at-threat-intelligence-platform-tip-requirements/</loc><lastmod>2021-03-27T02:46:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatintel.eu/2021/03/09/top-25-cti-presos-for-2020/</loc><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2021/03/cti_stroopwafel.jpeg</image:loc><image:title>cti_stroopwafel</image:title></image:image><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2021/03/viber_image_2021-03-08_21-28-00.jpg</image:loc><image:title>viber_image_2021-03-08_21-28-00</image:title></image:image><lastmod>2021-03-12T13:57:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatintel.eu/2020/11/17/sans-cti-2020-video-recording/</loc><lastmod>2020-11-17T21:31:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatintel.eu/2020/02/25/on-sea-turtle-campaign-targeting-greek-governmental-organisations-timeline/</loc><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2020/02/screenshot-2020-02-25-at-13.58.58.png</image:loc><image:title>Screenshot 2020-02-25 at 13.58.58</image:title></image:image><lastmod>2020-02-25T20:03:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatintel.eu/2020/02/04/enisa-cti-eu-2020-recap/</loc><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2020/02/andreas.jpeg</image:loc><image:title>andreas</image:title></image:image><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2020/02/andreas_2.jpg</image:loc><image:title>andreas_2</image:title></image:image><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2020/02/marco.jpeg</image:loc><image:title>marco</image:title></image:image><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2020/02/louis.jpg</image:loc><image:title>louis</image:title></image:image><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2020/02/c44cb598-344c-475a-95a4-879972466ca0.jpeg</image:loc><image:title>c44cb598-344c-475a-95a4-879972466ca0</image:title></image:image><lastmod>2020-02-06T01:50:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatintel.eu/2020/02/04/sans-cti-summit-2020-recap/</loc><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2020/02/eowhrpzuuaaq7gn.jpeg</image:loc><image:title>EOwHRPZUUAAq7gN</image:title></image:image><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2020/02/journalism.jpeg</image:loc><image:title>journalism</image:title></image:image><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2020/02/andreas.jpg</image:loc><image:title>andreas</image:title></image:image><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2020/02/lenny_2.jpeg</image:loc><image:title>lenny_2</image:title></image:image><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2020/02/cristin_1.jpeg</image:loc><image:title>cristin_1</image:title></image:image><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2020/02/apt_as_bur.jpeg</image:loc><image:title>apt_as_bur</image:title></image:image><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2020/02/attribution.jpeg</image:loc><image:title>attribution</image:title></image:image><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2020/02/cristin.jpeg</image:loc><image:title>cristin</image:title></image:image><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2020/02/lenny.jpeg</image:loc><image:title>lenny</image:title></image:image><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2020/02/joe.jpeg</image:loc><image:title>joe</image:title></image:image><lastmod>2020-02-04T22:17:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatintel.eu/2020/02/04/first-cti-symposium-2020-agenda-is-out/</loc><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2020/02/symposium-zurich2020-navbar.jpg</image:loc><image:title>symposium-zurich2020-navbar</image:title></image:image><lastmod>2020-02-04T15:44:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatintel.eu/2020/01/09/top-20-cti-presos-for-2019/</loc><lastmod>2020-02-04T14:57:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatintel.eu/2019/11/20/presenting-at-sans-cti-summit-2020/</loc><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2019/11/1024x512_cti-2020.jpg</image:loc><image:title>1024x512_CTI-2020</image:title></image:image><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2019/11/sfakianakis_1024x512_speaker_cti-2020.png</image:loc><image:title>Sfakianakis_1024x512_Speaker_CTI-2020</image:title></image:image><lastmod>2019-11-20T23:41:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatintel.eu/2019/09/24/intelligence-requirements-and-don-quixote/</loc><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2019/09/img_2302.jpg</image:loc><image:title>IMG_2302</image:title></image:image><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2019/09/img_2285.jpg</image:loc><image:title>IMG_2285</image:title></image:image><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2019/09/img_2286.jpg</image:loc><image:title>IMG_2286</image:title></image:image><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2019/09/img_2284.jpg</image:loc><image:title>IMG_2284</image:title></image:image><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2019/09/screen-shot-2019-09-25-at-00.39.39.png</image:loc><image:title>Screen Shot 2019-09-25 at 00.39.39</image:title></image:image><lastmod>2019-10-06T08:26:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatintel.eu/2019/02/02/threat-intel-reads-january-2019/</loc><lastmod>2024-05-17T06:46:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatintel.eu/2019/02/02/enisa-threat-landscape-2018-report/</loc><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2019/02/screen-shot-2019-02-02-at-13.53.46.png</image:loc><image:title>Screen Shot 2019-02-02 at 13.53.46</image:title></image:image><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2019/02/screen-shot-2019-02-02-at-13.53.34.png</image:loc><image:title>Screen Shot 2019-02-02 at 13.53.34</image:title></image:image><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2019/02/screen-shot-2019-02-02-at-13.53.15.png</image:loc><image:title>Screen Shot 2019-02-02 at 13.53.15</image:title></image:image><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2019/02/screen-shot-2019-02-02-at-13.52.58.png</image:loc><image:title>Screen Shot 2019-02-02 at 13.52.58</image:title></image:image><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2019/02/enisa_top15.png</image:loc><image:title>enisa_top15</image:title></image:image><lastmod>2019-02-02T13:06:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatintel.eu/2019/01/13/my-top-20-cti-dfir-talks-for-2018/</loc><lastmod>2019-01-13T21:54:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatintel.eu/2019/01/09/cooperation-between-csirts-and-law-enforcement-interaction-with-the-judiciary/</loc><lastmod>2019-01-09T23:33:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatintel.eu/2018/11/10/lets-make-cti-great-again/</loc><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2018/11/cti_great_again.jpeg</image:loc><image:title>cti_great_again</image:title></image:image><lastmod>2022-12-29T11:07:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatintel.eu/2018/10/19/ncsc-uk-annual-review-2018-and-active-defence/</loc><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2018/10/screen-shot-2018-10-20-at-00-21-00.png</image:loc><image:title>Screen Shot 2018-10-20 at 00.21.00</image:title></image:image><lastmod>2018-10-19T23:34:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatintel.eu/2018/10/13/crowdstrikes-2018-mid-year-review/</loc><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2018/10/screen-shot-2018-10-13-at-10-27-571.png</image:loc><image:title>Screen Shot 2018-10-13 at 10.27.57</image:title></image:image><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2018/10/screen-shot-2018-10-13-at-10-25-341.png</image:loc><image:title>Screen Shot 2018-10-13 at 10.25.34</image:title></image:image><lastmod>2018-10-13T09:48:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatintel.eu/2018/10/06/costin-raiu-on-future-sophisticated-attacks/</loc><lastmod>2018-10-06T12:14:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatintel.eu/2018/10/06/anti-virus-log-analysis-cheat-sheet-v1-5/</loc><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2018/10/av_1_5.png</image:loc><image:title>av_1_5</image:title></image:image><lastmod>2018-10-06T12:14:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatintel.eu/2018/10/06/latest-advances-in-mitres-attck-framework/</loc><lastmod>2018-10-06T12:04:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatintel.eu/2018/07/25/mapping-threat-actor-ttps-to-attck-framework/</loc><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2018/07/mitre-attck-and-the-mueller-gru-indictment-lessons-for-organizations-1-1024.jpg</image:loc><image:title>mitre-attck-and-the-mueller-gru-indictment-lessons-for-organizations-1-1024</image:title></image:image><lastmod>2018-07-25T22:30:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatintel.eu/2018/07/25/ghostpack-c-offensive-framework/</loc><lastmod>2018-07-25T22:20:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatintel.eu/2018/02/01/there-is-still-life-for-offensive-powershell/</loc><lastmod>2018-06-05T18:01:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatintel.eu/2018/04/04/a-study-on-threat-intelligence-platforms/</loc><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2018/04/index.jpg</image:loc><image:title>index</image:title></image:image><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2018/04/contents.jpg</image:loc><image:title>contents</image:title></image:image><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2018/04/tips.jpg</image:loc><image:title>tips</image:title></image:image><lastmod>2018-06-05T18:01:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatintel.eu/2018/06/05/on-reported-apt-trends/</loc><lastmod>2018-06-05T17:59:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatintel.eu/2018/06/05/kevin-mandia-on-apt-actors/</loc><lastmod>2018-06-05T17:58:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatintel.eu/2018/03/10/crysys-analysis-on-nsas-territorial-dispute/</loc><lastmod>2018-03-10T18:13:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatintel.eu/2018/02/01/wmi-persistence-goes-mainstream/</loc><lastmod>2018-02-01T18:42:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatintel.eu/2018/02/01/enisa-csirt-lea-collaboration/</loc><lastmod>2018-02-01T18:25:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatintel.eu/2018/02/01/post-exploitation-101/</loc><lastmod>2018-02-01T18:08:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatintel.eu/2017/06/03/red-teaming-tips-by-vincent-yiu/</loc><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2017/06/keep-calm-the-red-team-will-win.png</image:loc><image:title>keep-calm-the-red-team-will-win</image:title></image:image><lastmod>2017-06-24T12:15:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatintel.eu/2017/02/27/tips-an-exploratory-study-of-software-vendors-and-research-perspectives/</loc><lastmod>2017-02-27T13:04:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatintel.eu/2017/02/09/enisa-threat-landscape-2016/</loc><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2017/02/enisa-threat-landscape-report-2016.jpg</image:loc><image:title>enisa-threat-landscape-report-2016</image:title></image:image><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2017/02/screen-shot-2017-02-09-at-23-39-19.png</image:loc><image:title>screen-shot-2017-02-09-at-23-39-19</image:title></image:image><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2017/02/screen-shot-2017-02-09-at-23-40-43.png</image:loc><image:title>screen-shot-2017-02-09-at-23-40-43</image:title></image:image><lastmod>2017-02-10T00:20:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatintel.eu/2016/12/30/my-favorite-dfir-presentations-for-2016/</loc><lastmod>2020-09-03T21:43:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatintel.eu/2016/12/27/threat-intel-annual-reads-2016/</loc><lastmod>2016-12-29T13:55:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatintel.eu/2016/04/21/cyber-threat-intelligence-q-n-as-aka-ctijam/</loc><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2016/04/info-vs-intel.gif</image:loc><image:title>info-vs-intel</image:title></image:image><lastmod>2016-12-08T17:22:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatintel.eu/2016/02/29/adi-shamir-makes-15-predictions-for-the-next-15-years/</loc><image:image><image:loc>https://threatintel.eu/wp-content/uploads/2016/02/aaeaaqaaaaaaaavvaaaajgjjmjy3ytlllwy0ndmtngmzzi05zjm4lwziywrkmmqxnwuyyg.jpg</image:loc><image:title>aaeaaqaaaaaaaavvaaaajgjjmjy3ytlllwy0ndmtngmzzi05zjm4lwziywrkmmqxnwuyyg</image:title></image:image><lastmod>2016-12-08T16:51:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatintel.eu</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2026-02-25T07:50:46+00:00</lastmod></url></urlset>
