<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://www.defencenet.ai</loc>
<lastmod>2026-02-13T17:58:23.330Z</lastmod>
<changefreq>weekly</changefreq>
<priority>1</priority>
</url>
<url>
<loc>https://www.defencenet.ai/terms</loc>
<lastmod>2026-02-13T17:58:23.330Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.3</priority>
</url>
<url>
<loc>https://www.defencenet.ai/privacy</loc>
<lastmod>2026-02-13T17:58:23.330Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.3</priority>
</url>
<url>
<loc>https://www.defencenet.ai/safety</loc>
<lastmod>2026-02-13T17:58:23.330Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.defencenet.ai/blogs</loc>
<lastmod>2026-02-13T17:58:23.330Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://www.defencenet.ai/blogs/email-fraud-still-works-why-trust-and-familiarity-remain-the-weakest-link</loc>
<lastmod>2026-01-28T09:15:00.000+00:00</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.defencenet.ai/blogs/mobile-became-the-primary-interface-fraud-followed</loc>
<lastmod>2026-01-26T07:40:00.000+00:00</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.defencenet.ai/blogs/when-trust-becomes-a-weapon-understanding-smishing-attacks-and-how-to-stop-them</loc>
<lastmod>2026-01-24T10:05:00.000+00:00</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.defencenet.ai/blogs/the-qr-code-scam-problem-when-convenience-becomes-the-attack-vector</loc>
<lastmod>2026-01-22T06:20:15.000+00:00</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.defencenet.ai/blogs/why-some-messages-put-you-at-risk-and-how-smart-protection-stops-them</loc>
<lastmod>2026-01-20T08:50:48.135+00:00</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
</urlset>
