<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://cyberintelligencehub.com/2025/10/19/cybercrime-at-scale-lessons-from-the-asds-2024-25-cyber-threat-report/</loc><image:image><image:loc>https://cyberintelligencehub.com/wp-content/uploads/2025/10/8.png</image:loc><image:title>8</image:title></image:image><lastmod>2025-10-19T13:45:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberintelligencehub.com/2025/10/19/electronic-warfare-and-the-critical-need-to-protect-mission-objectives/</loc><image:image><image:loc>https://cyberintelligencehub.com/wp-content/uploads/2025/10/7.png</image:loc><image:title>7</image:title></image:image><lastmod>2025-10-19T13:39:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberintelligencehub.com/2025/10/19/the-next-strategic-vulnerability-when-commercial-space-becomes-critical-national-infrastructure/</loc><image:image><image:loc>https://cyberintelligencehub.com/wp-content/uploads/2025/10/6.png</image:loc><image:title>6</image:title></image:image><lastmod>2025-10-19T13:36:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberintelligencehub.com/2025/10/19/counterspace-capabilities-and-the-role-of-cyber-the-quiet-war-above-us/</loc><image:image><image:loc>https://cyberintelligencehub.com/wp-content/uploads/2025/10/4.png</image:loc><image:title>4</image:title></image:image><lastmod>2025-10-19T13:34:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberintelligencehub.com/2025/10/19/intelligence-led-secure-by-default-lessons-from-seeing-the-cloud-before-the-cloud/</loc><image:image><image:loc>https://cyberintelligencehub.com/wp-content/uploads/2025/10/3.png</image:loc><image:title>3</image:title></image:image><image:image><image:loc>https://cyberintelligencehub.com/wp-content/uploads/2025/10/screenshot-2025-10-19-at-14.18.04.png</image:loc><image:title>Screenshot 2025-10-19 at 14.18.04</image:title></image:image><image:image><image:loc>https://cyberintelligencehub.com/wp-content/uploads/2025/10/image.gif</image:loc><image:title>image</image:title></image:image><lastmod>2025-10-19T13:31:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberintelligencehub.com/2025/10/19/salt-typhoon-is-a-wake-up-call-the-silence-is-the-threat/</loc><image:image><image:loc>https://cyberintelligencehub.com/wp-content/uploads/2025/10/2.png</image:loc><image:title>2</image:title></image:image><image:image><image:loc>https://cyberintelligencehub.com/wp-content/uploads/2025/10/screenshot-2025-10-19-at-14.21.29.png</image:loc><image:title>Screenshot 2025-10-19 at 14.21.29</image:title></image:image><lastmod>2025-10-19T13:30:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberintelligencehub.com/2025/10/19/australias-super-fund-breaches-are-a-strategic-failure-not-just-a-technical-one/</loc><image:image><image:loc>https://cyberintelligencehub.com/wp-content/uploads/2025/10/1.png</image:loc><image:title>1</image:title></image:image><image:image><image:loc>https://cyberintelligencehub.com/wp-content/uploads/2025/10/screenshot-2025-10-19-at-14.23.08.png</image:loc><image:title>Screenshot 2025-10-19 at 14.23.08</image:title></image:image><lastmod>2025-10-19T13:28:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberintelligencehub.com/2025/09/16/protecting-the-three-pillars-of-universities/</loc><image:image><image:loc>https://cyberintelligencehub.com/wp-content/uploads/2025/09/space.png</image:loc><image:title>space</image:title></image:image><lastmod>2025-09-16T10:34:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberintelligencehub.com/131-2/</loc><lastmod>2025-03-10T11:25:42+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cyberintelligencehub.com/2025/03/10/defending-the-future-securing-military-technology-in-the-age-of-cyber-warfare/</loc><image:image><image:loc>https://cyberintelligencehub.com/wp-content/uploads/2025/03/scarticle.png</image:loc><image:title>SCarticle</image:title></image:image><lastmod>2025-03-10T06:37:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberintelligencehub.com/2025/03/10/cybersecurity-and-the-modern-battlefield-key-takeaways-from-idex-2025/</loc><image:image><image:loc>https://cyberintelligencehub.com/wp-content/uploads/2025/03/idex.png</image:loc><image:title>IDEX</image:title></image:image><lastmod>2025-03-10T06:37:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberintelligencehub.com/podcasts-events/</loc><image:image><image:loc>https://cyberintelligencehub.com/wp-content/uploads/2024/11/64b3c171c5c9414b8b2ea6e4_blog-cover_2023_07_8-benefits-of-podcasting-_-why-you-must-start-a-podcast-p-500.webp</image:loc><image:title>64b3c171c5c9414b8b2ea6e4_Blog Cover_2023_07_8 Benefits of Podcasting _ Why You Must Start a Podcast-p-500</image:title></image:image><image:image><image:loc>https://cyberintelligencehub.com/wp-content/uploads/2024/11/podcast.png</image:loc><image:title>podcast</image:title></image:image><lastmod>2024-11-19T16:35:56+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cyberintelligencehub.com/about/</loc><image:image><image:loc>https://cyberintelligencehub.com/wp-content/uploads/2024/11/steve-banner-1.png</image:loc><image:title>steve banner</image:title></image:image><lastmod>2024-11-19T16:35:49+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cyberintelligencehub.com/articles/</loc><lastmod>2024-11-19T16:35:23+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cyberintelligencehub.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2025-10-19T13:45:29+00:00</lastmod></url></urlset>
