<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 3, 2026 at 6:19 pm by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://blog.isecurion.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>isecurion blog</title>
		<link><![CDATA[https://blog.isecurion.com]]></link>
		<description><![CDATA[isecurion blog]]></description>
		<lastBuildDate><![CDATA[Wed, 14 Nov 2018 07:56:21 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://blog.isecurion.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://blog.isecurion.com/2018/11/14/information-security-monthly-newsletter-nov-2018/]]></guid>
			<link><![CDATA[https://blog.isecurion.com/2018/11/14/information-security-monthly-newsletter-nov-2018/]]></link>
			<title>Information Security Monthly Newsletter – Nov 2018</title>
			<pubDate><![CDATA[Wed, 14 Nov 2018 07:56:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.isecurion.com/2018/09/12/information-security-monthly-newsletter-sep-2018/]]></guid>
			<link><![CDATA[https://blog.isecurion.com/2018/09/12/information-security-monthly-newsletter-sep-2018/]]></link>
			<title>Information Security Monthly Newsletter – Sep 2018</title>
			<pubDate><![CDATA[Wed, 12 Sep 2018 11:58:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.isecurion.com/2018/12/06/xml-external-entity-attacks/]]></guid>
			<link><![CDATA[https://blog.isecurion.com/2018/12/06/xml-external-entity-attacks/]]></link>
			<title>XML External Entity Attacks</title>
			<pubDate><![CDATA[Thu, 06 Dec 2018 13:16:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.isecurion.com/2018/12/06/android-mobile-application-penetration-testing/]]></guid>
			<link><![CDATA[https://blog.isecurion.com/2018/12/06/android-mobile-application-penetration-testing/]]></link>
			<title>Android Mobile Application Penetration Testing</title>
			<pubDate><![CDATA[Thu, 06 Dec 2018 13:12:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.isecurion.com/2018/10/01/information-gathering-through-ms-office-macros/]]></guid>
			<link><![CDATA[https://blog.isecurion.com/2018/10/01/information-gathering-through-ms-office-macros/]]></link>
			<title>Information Gathering through MS-Office Macros</title>
			<pubDate><![CDATA[Mon, 01 Oct 2018 12:41:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.isecurion.com/2018/08/17/information-security-monthly-newsletter-aug-2018/]]></guid>
			<link><![CDATA[https://blog.isecurion.com/2018/08/17/information-security-monthly-newsletter-aug-2018/]]></link>
			<title>Information Security Monthly Newsletter – Aug 2018</title>
			<pubDate><![CDATA[Fri, 17 Aug 2018 17:03:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.isecurion.com/2018/08/17/best-practices-for-securing-crypto-currency-exchange/]]></guid>
			<link><![CDATA[https://blog.isecurion.com/2018/08/17/best-practices-for-securing-crypto-currency-exchange/]]></link>
			<title>Best Practices for Securing Crypto Currency exchange</title>
			<pubDate><![CDATA[Fri, 17 Aug 2018 13:52:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.isecurion.com/2018/10/11/information-security-monthly-newsletter-oct-2018/]]></guid>
			<link><![CDATA[https://blog.isecurion.com/2018/10/11/information-security-monthly-newsletter-oct-2018/]]></link>
			<title>Information Security Monthly Newsletter – Oct 2018</title>
			<pubDate><![CDATA[Fri, 12 Oct 2018 05:44:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.isecurion.com/2018/07/11/information-security-monthly-newsletter-july-2018/]]></guid>
			<link><![CDATA[https://blog.isecurion.com/2018/07/11/information-security-monthly-newsletter-july-2018/]]></link>
			<title>Information Security Monthly Newsletter – July 2018</title>
			<pubDate><![CDATA[Wed, 11 Jul 2018 10:55:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.isecurion.com/2018/06/13/information-security-monthly-newsletter-june-2018/]]></guid>
			<link><![CDATA[https://blog.isecurion.com/2018/06/13/information-security-monthly-newsletter-june-2018/]]></link>
			<title>Information Security Monthly Newsletter &#8211; June 2018</title>
			<pubDate><![CDATA[Wed, 13 Jun 2018 10:18:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.isecurion.com/2018/05/09/impinj-speedway-r420-rfid-reader/]]></guid>
			<link><![CDATA[https://blog.isecurion.com/2018/05/09/impinj-speedway-r420-rfid-reader/]]></link>
			<title>IMPINJ SPEEDWAY R420 RFID READER</title>
			<pubDate><![CDATA[Thu, 31 May 2018 10:29:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.isecurion.com/2017/08/08/clickjacking-attacks-mitigation-methods/]]></guid>
			<link><![CDATA[https://blog.isecurion.com/2017/08/08/clickjacking-attacks-mitigation-methods/]]></link>
			<title>ClickJacking Attacks &amp; Mitigation Methods</title>
			<pubDate><![CDATA[Wed, 09 Aug 2017 08:35:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.isecurion.com/2018/04/23/invoice-plane-v1-5-cross-site-scripting-vulnerability/]]></guid>
			<link><![CDATA[https://blog.isecurion.com/2018/04/23/invoice-plane-v1-5-cross-site-scripting-vulnerability/]]></link>
			<title>Invoice Plane V 1.5 Cross Site Scripting Vulnerability-CVE-2017-18217</title>
			<pubDate><![CDATA[Tue, 24 Apr 2018 07:31:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.isecurion.com/2017/10/10/penetration-testing-restful-web-services/]]></guid>
			<link><![CDATA[https://blog.isecurion.com/2017/10/10/penetration-testing-restful-web-services/]]></link>
			<title>Penetration Testing RESTful Web Services</title>
			<pubDate><![CDATA[Tue, 10 Oct 2017 09:59:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.isecurion.com/2018/05/09/information-security-monthly-newsletter-may/]]></guid>
			<link><![CDATA[https://blog.isecurion.com/2018/05/09/information-security-monthly-newsletter-may/]]></link>
			<title>Information Security Monthly Newsletter-May 2018</title>
			<pubDate><![CDATA[Thu, 10 May 2018 04:06:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.isecurion.com/2018/04/23/case-study-penetration-testing-crypto-currency-exchange/]]></guid>
			<link><![CDATA[https://blog.isecurion.com/2018/04/23/case-study-penetration-testing-crypto-currency-exchange/]]></link>
			<title>Case Study – Penetration Testing Crypto Currency Exchange</title>
			<pubDate><![CDATA[Mon, 23 Apr 2018 13:15:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.isecurion.com/2017/05/16/wannacry-ransomware-prevention-methods-for-end-users-system-administrators/]]></guid>
			<link><![CDATA[https://blog.isecurion.com/2017/05/16/wannacry-ransomware-prevention-methods-for-end-users-system-administrators/]]></link>
			<title>Wannacry Ransomware Prevention Methods for End Users &#038; System Administrators</title>
			<pubDate><![CDATA[Fri, 14 Jul 2017 10:57:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.isecurion.com/2017/07/06/dumping-the-firmware-from-the-device-using-buspirate/]]></guid>
			<link><![CDATA[https://blog.isecurion.com/2017/07/06/dumping-the-firmware-from-the-device-using-buspirate/]]></link>
			<title>Dumping the Firmware from the device Using buspirate</title>
			<pubDate><![CDATA[Fri, 14 Jul 2017 10:56:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.isecurion.com/2017/07/14/security-controls-requirements-for-aadhaar-api-providers/]]></guid>
			<link><![CDATA[https://blog.isecurion.com/2017/07/14/security-controls-requirements-for-aadhaar-api-providers/]]></link>
			<title>Security Controls Requirements for Aadhaar API providers</title>
			<pubDate><![CDATA[Fri, 14 Jul 2017 07:17:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.isecurion.com/2018/12/14/information-security-monthly-newsletter-dec-2018/]]></guid>
			<link><![CDATA[https://blog.isecurion.com/2018/12/14/information-security-monthly-newsletter-dec-2018/]]></link>
			<title>Information Security Monthly Newsletter – Dec 2018</title>
			<pubDate><![CDATA[Fri, 14 Dec 2018 06:12:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.isecurion.com/2016/12/08/scada-360-threat-landscape/]]></guid>
			<link><![CDATA[https://blog.isecurion.com/2016/12/08/scada-360-threat-landscape/]]></link>
			<title>SCADA 360° Threat Landscape</title>
			<pubDate><![CDATA[Wed, 14 Dec 2016 11:26:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.isecurion.com/2017/05/11/iot-communication-protocols/]]></guid>
			<link><![CDATA[https://blog.isecurion.com/2017/05/11/iot-communication-protocols/]]></link>
			<title>IOT Communication Protocols</title>
			<pubDate><![CDATA[Thu, 11 May 2017 05:47:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.isecurion.com/2017/05/09/legal-and-technical-perspective-towards-cryptocurrency-bitcoin/]]></guid>
			<link><![CDATA[https://blog.isecurion.com/2017/05/09/legal-and-technical-perspective-towards-cryptocurrency-bitcoin/]]></link>
			<title>Legal and Technical perspective towards Cryptocurrency in India-Bitcoin</title>
			<pubDate><![CDATA[Tue, 09 May 2017 11:11:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.isecurion.com/2018/05/09/regexp-for-pentesters/]]></guid>
			<link><![CDATA[https://blog.isecurion.com/2018/05/09/regexp-for-pentesters/]]></link>
			<title>Regular Expressions for Pentesters</title>
			<pubDate><![CDATA[Thu, 10 May 2018 09:26:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.isecurion.com/2016/07/07/nesa-uae-ia-standards-the-framework-driving-uaes-information-security/]]></guid>
			<link><![CDATA[https://blog.isecurion.com/2016/07/07/nesa-uae-ia-standards-the-framework-driving-uaes-information-security/]]></link>
			<title>NESA-UAE IA Standards: The framework driving UAE’s Information Security</title>
			<pubDate><![CDATA[Wed, 17 Aug 2016 14:44:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.isecurion.com/2020/01/28/csv-injection/]]></guid>
			<link><![CDATA[https://blog.isecurion.com/2020/01/28/csv-injection/]]></link>
			<title>CSV Injection</title>
			<pubDate><![CDATA[Fri, 31 Jan 2020 10:42:38 +0000]]></pubDate>
		</item>
				</channel>
</rss>
