<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://observationsinsecurity.com/2024/04/25/how-i-hacked-into-googles-internal-corporate-assets/</loc><image:image><image:loc>https://observationsinsecurity.com/wp-content/uploads/2024/04/pexels-photo-13628541.jpeg</image:loc><image:title>google search engine on screen</image:title><image:caption>Photo by Sarah Blocksidge on &lt;a href="https://www.pexels.com/photo/google-search-engine-on-screen-13628541/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://observationsinsecurity.com/wp-content/uploads/2024/04/pexels-photo-218717.jpeg</image:loc><image:title>black samsung tablet display google browser on screen</image:title><image:caption>Photo by PhotoMIX Company on &lt;a href="https://www.pexels.com/photo/black-samsung-tablet-display-google-browser-on-screen-218717/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://observationsinsecurity.com/wp-content/uploads/2024/04/image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://observationsinsecurity.com/wp-content/uploads/2024/04/chjpdmf0zs9zdgf0awmvaw1hz2uvd2vic2l0zs8ymdiylta0l2xyl2zsndm3ndyymdcwnditaw1hz2uta3oyzhl1a24uanbn.webp</image:loc><image:title>Google Office sign, location unknown</image:title></image:image><lastmod>2024-04-25T12:53:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://observationsinsecurity.com/2021/08/20/how-to-optimize-your-hacking-by-understanding-your-mind/</loc><image:image><image:loc>https://observationsinsecurity.com/wp-content/uploads/2021/08/pexels-photo-260024-2-e1650612546570.jpeg</image:loc><image:title>battle black blur board game</image:title><image:caption>Photo by Pixabay on &lt;a href="https://www.pexels.com/photo/battle-black-blur-board-game-260024/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://observationsinsecurity.com/wp-content/uploads/2021/08/pexels-photo-260024-1-e1650612454545.jpeg</image:loc><image:title>battle black blur board game</image:title><image:caption>Photo by Pixabay on &lt;a href="https://www.pexels.com/photo/battle-black-blur-board-game-260024/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://observationsinsecurity.com/wp-content/uploads/2021/08/pexels-photo-260024.jpeg</image:loc><image:title>battle black blur board game</image:title><image:caption>Photo by Pixabay on &lt;a href="https://www.pexels.com/photo/battle-black-blur-board-game-260024/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2024-04-25T12:33:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://observationsinsecurity.com/2022/03/12/dealing-with-stress-as-a-security-leader/</loc><image:image><image:loc>https://observationsinsecurity.com/wp-content/uploads/2022/03/pexels-photo-747964-e1650612650250.jpeg</image:loc><image:title>a person sitting on wooden planks across the lake scenery</image:title><image:caption>Photo by S Migaj on &lt;a href="https://www.pexels.com/photo/a-person-sitting-on-wooden-planks-across-the-lake-scenery-747964/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2023-09-25T04:46:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://observationsinsecurity.com/2023/09/05/the-future-when-unsafe-ai-is-more-profitable/</loc><image:image><image:loc>https://observationsinsecurity.com/wp-content/uploads/2023/09/pexels-photo-3861969.jpeg</image:loc><image:title>code projected over woman</image:title><image:caption>Photo by ThisIsEngineering on &lt;a href="https://www.pexels.com/photo/code-projected-over-woman-3861969/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2023-09-25T04:45:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://observationsinsecurity.com/2023/09/16/the-qualities-of-high-performing-security-folk/</loc><image:image><image:loc>https://observationsinsecurity.com/wp-content/uploads/2023/09/pexels-photo-3153201.jpeg</image:loc><image:title>man in black crew neck t shirt sitting beside woman in gray crew neck t shirt</image:title><image:caption>Photo by Canva Studio on &lt;a href="https://www.pexels.com/photo/man-in-black-crew-neck-t-shirt-sitting-beside-woman-in-gray-crew-neck-t-shirt-3153201/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://observationsinsecurity.com/wp-content/uploads/2023/09/pexels-photo-3183197.jpeg</image:loc><image:title>photo of people doing handshakes</image:title><image:caption>Photo by fauxels on &lt;a href="https://www.pexels.com/photo/photo-of-people-doing-handshakes-3183197/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2023-09-25T04:39:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://observationsinsecurity.com/2023/08/28/the-security-organization/</loc><image:image><image:loc>https://observationsinsecurity.com/wp-content/uploads/2023/08/pexels-photo-1181345.jpeg</image:loc><image:title>man standing infront of white board</image:title><image:caption>Photo by Christina Morillo on &lt;a href="https://www.pexels.com/photo/man-standing-infront-of-white-board-1181345/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://observationsinsecurity.com/wp-content/uploads/2023/08/pexels-photo-6285131.jpeg</image:loc><image:title>businessman drawing on a flip chart</image:title><image:caption>Photo by Gustavo Fring on &lt;a href="https://www.pexels.com/photo/businessman-drawing-on-a-flip-chart-6285131/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://observationsinsecurity.com/wp-content/uploads/2023/08/pexels-photo-7173040.jpeg</image:loc><image:title>a person writing on a glass panel using a whiteboard marker</image:title><image:caption>Photo by Nataliya Vaitkevich on &lt;a href="https://www.pexels.com/photo/a-person-writing-on-a-glass-panel-using-a-whiteboard-marker-7173040/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://observationsinsecurity.com/wp-content/uploads/2023/08/pexels-photo-1181346.jpeg</image:loc><image:title>woman in black coat</image:title><image:caption>Photo by Christina Morillo on &lt;a href="https://www.pexels.com/photo/woman-in-black-coat-1181346/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://observationsinsecurity.com/wp-content/uploads/2023/08/pexels-photo-351264.jpeg</image:loc><image:title>buildings with glass windows</image:title><image:caption>Photo by Expect Best on &lt;a href="https://www.pexels.com/photo/buildings-with-glass-windows-351264/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://observationsinsecurity.com/wp-content/uploads/2023/08/play-stone-network-networked-interactive-163064.jpeg</image:loc><image:title>close up photography of yellow green red and brown plastic cones on white lined surface</image:title><image:caption>Photo by Pixabay on &lt;a href="https://www.pexels.com/photo/close-up-photography-of-yellow-green-red-and-brown-plastic-cones-on-white-lined-surface-163064/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://observationsinsecurity.com/wp-content/uploads/2023/08/pexels-photo-264507.jpeg</image:loc><image:title>architecture building business city</image:title><image:caption>Photo by Pixabay on &lt;a href="https://www.pexels.com/photo/architecture-building-business-city-264507/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2023-08-31T00:28:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://observationsinsecurity.com/2020/08/09/bypassing-403-to-get-access-to-an-admin-console-endpoints/</loc><image:image><image:loc>https://observationsinsecurity.com/wp-content/uploads/2020/08/pexels-photo-1022698-e1650612856164.jpeg</image:loc><image:title>photo of castle under clouds</image:title><image:caption>Photo by Frans Van Heerden on &lt;a href="https://www.pexels.com/photo/photo-of-castle-under-clouds-1022698/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2022-04-22T07:34:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://observationsinsecurity.com/2020/08/10/walking-the-path-least-trodden-hacking-ios-apps-at-scale/</loc><image:image><image:loc>https://observationsinsecurity.com/wp-content/uploads/2020/08/pexels-photo-887751-e1650612789874.jpeg</image:loc><image:title>pexels-photo-887751.jpeg</image:title><image:caption>Photo by PhotoMIX Company on &lt;a href="https://www.pexels.com/photo/person-holding-silver-iphone-7-887751/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://observationsinsecurity.com/wp-content/uploads/2020/08/twitter-facebook-together-exchange-of-information-147413.jpeg</image:loc><image:title>facebook application icon</image:title><image:caption>Photo by Pixabay on &lt;a href="https://www.pexels.com/photo/facebook-application-icon-147413/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2022-04-22T07:33:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://observationsinsecurity.com/posts/</loc><lastmod>2022-03-14T03:56:08+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://observationsinsecurity.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2024-04-25T12:53:40+00:00</lastmod></url></urlset>
