<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://bluesecurityops.com/supply%20chain%20security/incident%20response/npm%20security/2025/09/23/npm-supply-chain-attack-shai-hulud.html</loc>
<lastmod>2025-09-23T14:00:00+00:00</lastmod>
</url>
<url>
<loc>https://bluesecurityops.com/defense%20evasion/digital%20forensics/threat%20hunting/mitre%20att&amp;ck/2025/10/28/indicator-removal-deep-dive-windows-linux-macos.html</loc>
<lastmod>2025-10-28T10:00:00+00:00</lastmod>
</url>
<url>
<loc>https://bluesecurityops.com/security%20awareness/phishing%20defense/2025/11/11/when-you&apos;re-done-feeling-pushed-verify-before-you-reply.html</loc>
<lastmod>2025-11-11T12:00:00+00:00</lastmod>
</url>
<url>
<loc>https://bluesecurityops.com/security%20awareness/phishing%20defense/open%20source/2026/02/16/vervain-ai-phishing-analysis-chrome-extension.html</loc>
<lastmod>2026-02-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://bluesecurityops.com/training/mitre%20att&amp;ck/2026/02/22/mitre-attack-quizzes-decision-tree-investigations.html</loc>
<lastmod>2026-02-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://bluesecurityops.com/training/phishing%20defense/2026/02/23/security-champion-intermediate-phishing-course.html</loc>
<lastmod>2026-02-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://bluesecurityops.com/tools/bsot-blue-security-ops-toolkit.html</loc>
</url>
<url>
<loc>https://bluesecurityops.com/tools/certwatchdog.html</loc>
</url>
<url>
<loc>https://bluesecurityops.com/tools/vervain.html</loc>
</url>
<url>
<loc>https://bluesecurityops.com/tools/vesta.html</loc>
</url>
<url>
<loc>https://bluesecurityops.com/about/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/safety/guides/ai-powered-scams/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/ai-quiz/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/safety/scams/ai-voice-clone/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/safety/scams/bank-impersonation/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/safety/basics/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/blog/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/deep-dive/cheat-sheet/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/spot-the-scam/complete/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/deep-dive/complete/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/linux/vibe-coders/complete/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/daily-life/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/soc-tests/decision-trees/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/dt-linux/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/dt-macos/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/dt-windows/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/safety/scams/fake-apps/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/safety/family/code-word/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/safety/family/security-setup/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/spot-the-scam/final-assessment/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/deep-dive/final-assessment/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/spot-the-scam/final-assessment/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/linux/vibe-coders/final-assessment/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/safety/scams/government-impersonation/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/safety/family/having-the-conversation/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/safety/scams/hi-mom-text/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/safety/i-was-scammed/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/spot-the-scam/module-4/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/spot-the-scam/module-2/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/spot-the-scam/module-3/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/spot-the-scam/module-1/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/spot-the-scam/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/deep-dive/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/spot-the-scam/module-4/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/spot-the-scam/module-2/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/spot-the-scam/module-3/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/spot-the-scam/module-1/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/spot-the-scam/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/deep-dive/module-5/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/deep-dive/module-4/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/deep-dive/module-2/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/deep-dive/module-3/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/deep-dive/module-1/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/linux/vibe-coders/module-5/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/linux/vibe-coders/module-7/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/linux/vibe-coders/module-6/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/linux/vibe-coders/module-4/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/linux/vibe-coders/module-2/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/linux/vibe-coders/module-3/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/linux/vibe-coders/module-1/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/linux/vibe-coders/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/safety/scams/investment/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/safety/is-this-a-scam/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/safety/scams/job-offer/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/leaders/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/spot-the-scam/module-1/lesson-1-1/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/spot-the-scam/module-1/lesson-1-1/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/deep-dive/module-1/lesson-1-1/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/linux/vibe-coders/module-1/lesson-1-1/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/spot-the-scam/module-1/lesson-1-2/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/spot-the-scam/module-1/lesson-1-2/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/deep-dive/module-1/lesson-1-2/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/linux/vibe-coders/module-1/lesson-1-2/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/deep-dive/module-1/lesson-1-3/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/linux/vibe-coders/module-1/lesson-1-3/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/spot-the-scam/module-2/lesson-2-1/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/spot-the-scam/module-2/lesson-2-1/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/deep-dive/module-2/lesson-2-1/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/linux/vibe-coders/module-2/lesson-2-1/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/spot-the-scam/module-2/lesson-2-2/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/spot-the-scam/module-2/lesson-2-2/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/deep-dive/module-2/lesson-2-2/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/linux/vibe-coders/module-2/lesson-2-2/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/spot-the-scam/module-2/lesson-2-3/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/spot-the-scam/module-2/lesson-2-3/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/deep-dive/module-2/lesson-2-3/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/linux/vibe-coders/module-2/lesson-2-3/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/linux/vibe-coders/module-2/lesson-2-4/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/spot-the-scam/module-3/lesson-3-1/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/spot-the-scam/module-3/lesson-3-1/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/deep-dive/module-3/lesson-3-1/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/linux/vibe-coders/module-3/lesson-3-1/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/spot-the-scam/module-3/lesson-3-2/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/spot-the-scam/module-3/lesson-3-2/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/deep-dive/module-3/lesson-3-2/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/linux/vibe-coders/module-3/lesson-3-2/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/spot-the-scam/module-3/lesson-3-3/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/spot-the-scam/module-3/lesson-3-3/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/deep-dive/module-3/lesson-3-3/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/linux/vibe-coders/module-3/lesson-3-3/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/spot-the-scam/module-4/lesson-4-1/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/spot-the-scam/module-4/lesson-4-1/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/deep-dive/module-4/lesson-4-1/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/linux/vibe-coders/module-4/lesson-4-1/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/spot-the-scam/module-4/lesson-4-2/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/spot-the-scam/module-4/lesson-4-2/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/deep-dive/module-4/lesson-4-2/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/linux/vibe-coders/module-4/lesson-4-2/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/spot-the-scam/module-4/lesson-4-3/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/spot-the-scam/module-4/lesson-4-3/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/deep-dive/module-4/lesson-4-3/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/linux/vibe-coders/module-4/lesson-4-3/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/deep-dive/module-5/lesson-5-1/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/linux/vibe-coders/module-5/lesson-5-1/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/deep-dive/module-5/lesson-5-2/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/linux/vibe-coders/module-5/lesson-5-2/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/linux/vibe-coders/module-5/lesson-5-3/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/linux/vibe-coders/module-6/lesson-6-1/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/linux/vibe-coders/module-6/lesson-6-2/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/linux/vibe-coders/module-6/lesson-6-3/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/linux/vibe-coders/module-7/lesson-7-1/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/linux/vibe-coders/module-7/lesson-7-2/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/linux/vibe-coders/module-7/lesson-7-3/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/linux/vibe-coders/module-7/lesson-7-4/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/linux/vibe-coders/module-7/lesson-7-5/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/linux/vibe-coders/module-7/lesson-7-6/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/linux/vibe-coders/module-7/lesson-7-7/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/safety/scams/marketplace/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/safety/guides/messaging-app-scams/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/soc-tests/mitre/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/safety/scams/package-delivery/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/phishing-quiz/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/practitioners/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/safety/guides/protect-your-passwords/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/safety/family/protecting-kids/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/safety/guides/pushed-verify/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/safety/guides/qr-code-scams/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/safety/scams/qr-code/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/spot-the-scam/module-1/quiz-1/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/deep-dive/module-1/quiz-1/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/spot-the-scam/module-1/quiz-1/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/linux/vibe-coders/module-1/quiz-1/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/spot-the-scam/module-2/quiz-2/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/deep-dive/module-2/quiz-2/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/spot-the-scam/module-2/quiz-2/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/linux/vibe-coders/module-2/quiz-2/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/spot-the-scam/module-3/quiz-3/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/deep-dive/module-3/quiz-3/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/spot-the-scam/module-3/quiz-3/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/linux/vibe-coders/module-3/quiz-3/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/spot-the-scam/module-4/quiz-4/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/deep-dive/module-4/quiz-4/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/spot-the-scam/module-4/quiz-4/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/linux/vibe-coders/module-4/quiz-4/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/phishing/deep-dive/module-5/quiz-5/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/linux/vibe-coders/module-5/quiz-5/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/linux/vibe-coders/module-6/quiz-6/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/safety/guides/recognize-phone-scams/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/safety/scams/romance/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/safety/guides/safe-online-shopping/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/safety/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/courses/linux/vibe-coders/sandbox/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/safety/secure-accounts/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/safety/scams/sextortion/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/soc-quiz-linux-hard/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/soc-quiz-linux-medium/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/soc-quiz-linux/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/soc-quiz-macos-hard/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/soc-quiz-macos-medium/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/soc-quiz-macos/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/soc-quiz-windows-hard/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/soc-quiz-windows-medium/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/soc-quiz-windows/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/safety/guides/social-media-safety/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/safety/family/someone-is-being-scammed/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/safety/guides/spot-fake-websites/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/safety/guides/spot-phishing-emails/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/safety/family/supporting-after-a-scam/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/safety/scams/tech-support/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/tools/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/training/</loc>
</url>
<url>
<loc>https://bluesecurityops.com/safety/family/when-they-wont-listen/</loc>
</url>
</urlset>
