<?xml version="1.0" encoding="utf-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
        xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9
          http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd">
  <url>
    <loc>https://www.security-threat.com/</loc>
    <lastmod>2026-05-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>1.0</priority>
  </url>
  <url>
    <loc>https://www.security-threat.com/secure-authentication-session-architecture/</loc>
    <lastmod>2026-05-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.security-threat.com/threat-modeling-fundamentals-methodology/</loc>
    <lastmod>2026-05-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.security-threat.com/threat-modeling-fundamentals-methodology/attack-surface-mapping-techniques/</loc>
    <lastmod>2026-05-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.security-threat.com/threat-modeling-fundamentals-methodology/attack-surface-mapping-techniques/automated-attack-surface-discovery-with-owasp-zap/</loc>
    <lastmod>2026-05-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.security-threat.com/threat-modeling-fundamentals-methodology/defining-trust-boundaries/</loc>
    <lastmod>2026-05-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.security-threat.com/threat-modeling-fundamentals-methodology/defining-trust-boundaries/mapping-trust-boundaries-in-cloud-native-apps/</loc>
    <lastmod>2026-05-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.security-threat.com/threat-modeling-fundamentals-methodology/stride-framework-implementation/</loc>
    <lastmod>2026-05-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.security-threat.com/threat-modeling-fundamentals-methodology/stride-framework-implementation/how-to-apply-stride-to-microservices-architecture/</loc>
    <lastmod>2026-05-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.security-threat.com/threat-modeling-fundamentals-methodology/threat-model-documentation-patterns/</loc>
    <lastmod>2026-05-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.security-threat.com/threat-modeling-fundamentals-methodology/threat-model-documentation-patterns/markdown-templates-for-agile-threat-modeling/</loc>
    <lastmod>2026-05-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.security-threat.com/threat-modeling-fundamentals-methodology/threat-prioritization-risk-scoring/</loc>
    <lastmod>2026-05-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.security-threat.com/threat-modeling-fundamentals-methodology/threat-prioritization-risk-scoring/dread-vs-epss-for-threat-prioritization/</loc>
    <lastmod>2026-05-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.security-threat.com/vulnerability-patterns-web-mitigation-strategies/</loc>
    <lastmod>2026-05-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.security-threat.com/vulnerability-patterns-web-mitigation-strategies/cross-site-request-forgery-csrf-defense/</loc>
    <lastmod>2026-05-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.security-threat.com/vulnerability-patterns-web-mitigation-strategies/cross-site-request-forgery-csrf-defense/implementing-double-submit-cookie-pattern-in-nodejs/</loc>
    <lastmod>2026-05-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.security-threat.com/vulnerability-patterns-web-mitigation-strategies/cross-site-scripting-xss-mitigation/</loc>
    <lastmod>2026-05-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.security-threat.com/vulnerability-patterns-web-mitigation-strategies/cross-site-scripting-xss-mitigation/escaping-user-input-in-react-and-vue-components/</loc>
    <lastmod>2026-05-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.security-threat.com/vulnerability-patterns-web-mitigation-strategies/dom-based-vulnerability-sanitization/</loc>
    <lastmod>2026-05-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.security-threat.com/vulnerability-patterns-web-mitigation-strategies/injection-attack-prevention/</loc>
    <lastmod>2026-05-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.security-threat.com/vulnerability-patterns-web-mitigation-strategies/injection-attack-prevention/parameterized-queries-for-sql-and-nosql-injection/</loc>
    <lastmod>2026-05-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.security-threat.com/vulnerability-patterns-web-mitigation-strategies/secure-http-header-configuration/</loc>
    <lastmod>2026-05-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.security-threat.com/vulnerability-patterns-web-mitigation-strategies/secure-http-header-configuration/configuring-hsts-and-x-frame-options-for-legacy-apps/</loc>
    <lastmod>2026-05-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.security-threat.com/vulnerability-patterns-web-mitigation-strategies/server-side-request-forgery-ssrf-prevention/</loc>
    <lastmod>2026-05-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.security-threat.com/vulnerability-patterns-web-mitigation-strategies/server-side-request-forgery-ssrf-prevention/ssrf-allowlists-and-metadata-service-protection/</loc>
    <lastmod>2026-05-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
</urlset>

