<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//cybersapiens.com.au/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://cybersapiens.com.au/case-study/ransomware-attack-on-a-financial-institution/</loc>
		<lastmod>2026-03-21T11:56:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersapiens.com.au/case-study/exposed-s3-bucket-leads-to-major-data-leak-in-fintech-firm/</loc>
		<lastmod>2026-03-21T11:55:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersapiens.com.au/case-study/the-supply-chain-attack-on-a-tech-company/</loc>
		<lastmod>2026-03-21T11:54:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersapiens.com.au/case-study/shielding-apis-for-a-rising-fintech-innovator/</loc>
		<lastmod>2025-10-14T09:54:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersapiens.com.au/case-study/how-we-secured-a-cloud-service-providers-network-in-5-days/</loc>
		<lastmod>2025-10-14T09:32:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersapiens.com.au/case-study/security-testing-of-a-cultural-mobile-application/</loc>
		<lastmod>2025-10-14T09:30:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersapiens.com.au/case-study/security-assessment-of-a-crm-application/</loc>
		<lastmod>2025-10-14T09:29:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersapiens.com.au/case-study/security-testing-of-a-web-application/</loc>
		<lastmod>2025-10-14T09:27:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersapiens.com.au/case-study/empowering-a-leading-automotive-components-manufacturer-with-phishcare-to-combat-phishing-risks/</loc>
		<lastmod>2025-10-14T09:26:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersapiens.com.au/case-study/phishcare-for-a-leading-digital-dictation-and-transcription-service-provider/</loc>
		<lastmod>2025-10-14T09:25:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersapiens.com.au/case-study/boosting-phishing-resilience-with-phishcare-for-a-leading-bi-analytics-firm/</loc>
		<lastmod>2025-10-14T09:23:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersapiens.com.au/case-study/securing-apis-for-a-software-development-company/</loc>
		<lastmod>2025-10-14T09:22:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersapiens.com.au/case-study/strengthening-azure-security-for-a-fintech-company/</loc>
		<lastmod>2025-10-14T09:21:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersapiens.com.au/case-study/strengthening-the-cloud-environment-of-a-tech-driven-safety-solutions-provider/</loc>
		<lastmod>2025-10-14T09:19:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersapiens.com.au/case-study/strengthening-phishing-awareness-at-a-leading-co-operative-bank-in-india/</loc>
		<lastmod>2025-10-14T09:16:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersapiens.com.au/case-study/enhancing-phishing-resilience-for-a-leading-banking-institution-with-phishcare/</loc>
		<lastmod>2025-07-22T11:04:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersapiens.com.au/case-study/securing-apis-for-a-software-provider/</loc>
		<lastmod>2025-07-21T10:51:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersapiens.com.au/case-study/security-assessment-of-an-ai-powered-review-writing-platform/</loc>
		<lastmod>2025-07-18T11:40:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersapiens.com.au/case-study/security-assessment-of-a-digital-signage-android-application/</loc>
		<lastmod>2025-07-18T10:58:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersapiens.com.au/case-study/firewall-rule-review-for-a-research-organization/</loc>
		<lastmod>2025-07-16T09:30:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersapiens.com.au/case-study/strengthening-network-security-for-a-data-intelligence-and-asset-management-firm/</loc>
		<lastmod>2025-07-16T09:30:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersapiens.com.au/case-study/enhancing-network-security-for-a-leading-business-services-provider/</loc>
		<lastmod>2025-07-16T09:18:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersapiens.com.au/case-study/enhancing-network-infrastructure-security-for-an-it-software-development-and-business-processing-unit-through-comprehensive-vapt/</loc>
		<lastmod>2025-07-16T08:56:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersapiens.com.au/case-study/cloud-security-audit-for-healthcare-3/</loc>
		<lastmod>2025-07-09T05:56:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersapiens.com.au/case-study/misconfigured-ec2-instance-leads-to-ssh-brute-force-breach/</loc>
		<lastmod>2025-07-09T05:54:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersapiens.com.au/case-study/privilege-escalation-via-overly-permissive-iam-roles/</loc>
		<lastmod>2025-07-09T05:53:49+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Rank Math SEO Plugin (c) Rank Math - rankmath.com -->