<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 3, 2026 at 9:17 pm by All in One SEO v4.9.3 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://www.apphaz.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Apphaz Security</title>
		<link><![CDATA[https://www.apphaz.com]]></link>
		<description><![CDATA[Apphaz Security]]></description>
		<lastBuildDate><![CDATA[Wed, 23 Apr 2025 15:26:26 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://www.apphaz.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://www.apphaz.com/blogs/the-oracle-cloud-breach-of-2025-unpacking-the-years-biggest-supply-chain-attack/]]></guid>
			<link><![CDATA[https://www.apphaz.com/blogs/the-oracle-cloud-breach-of-2025-unpacking-the-years-biggest-supply-chain-attack/]]></link>
			<title>The Oracle Cloud Breach of 2025: Unpacking the Year’s Biggest Supply Chain Attack</title>
			<pubDate><![CDATA[Wed, 23 Apr 2025 15:26:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.apphaz.com/blogs/top-10-web-application-security-threats-in-2025-and-how-to-prevent-them/]]></guid>
			<link><![CDATA[https://www.apphaz.com/blogs/top-10-web-application-security-threats-in-2025-and-how-to-prevent-them/]]></link>
			<title>Top 10 Web Application Security Threats in 2025 (And How to Prevent Them)</title>
			<pubDate><![CDATA[Wed, 23 Apr 2025 15:25:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.apphaz.com/blogs/how-hackers-exploit-apis-how-to-stop-them/]]></guid>
			<link><![CDATA[https://www.apphaz.com/blogs/how-hackers-exploit-apis-how-to-stop-them/]]></link>
			<title>How Hackers Exploit APIs &#038; How to Stop Them</title>
			<pubDate><![CDATA[Wed, 11 Jun 2025 02:01:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.apphaz.com/elementskit-content/dynamic-content-megamenu-menuitem51/]]></guid>
			<link><![CDATA[https://www.apphaz.com/elementskit-content/dynamic-content-megamenu-menuitem51/]]></link>
			<title>dynamic-content-megamenu-menuitem51</title>
			<pubDate><![CDATA[Wed, 09 Mar 2022 19:08:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.apphaz.com/?elementskit_template=footer-2]]></guid>
			<link><![CDATA[https://www.apphaz.com/?elementskit_template=footer-2]]></link>
			<title>Footer-For-Backup</title>
			<pubDate><![CDATA[Wed, 02 Apr 2025 22:30:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.apphaz.com/blogs/evaluate-security-threats-and-vulnerabilities/]]></guid>
			<link><![CDATA[https://www.apphaz.com/blogs/evaluate-security-threats-and-vulnerabilities/]]></link>
			<title>Evaluate security threats and vulnerabilities.</title>
			<pubDate><![CDATA[Wed, 02 Apr 2025 18:47:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.apphaz.com/blogs/protecting-yourself-online-online-in-2023/]]></guid>
			<link><![CDATA[https://www.apphaz.com/blogs/protecting-yourself-online-online-in-2023/]]></link>
			<title>Protecting Yourself Online online in 2023</title>
			<pubDate><![CDATA[Wed, 02 Apr 2025 18:46:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.apphaz.com/blogs/penetration-testing-101/]]></guid>
			<link><![CDATA[https://www.apphaz.com/blogs/penetration-testing-101/]]></link>
			<title>Penetration Testing 101</title>
			<pubDate><![CDATA[Wed, 02 Apr 2025 18:45:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.apphaz.com/blogs/ways-to-conduct-a-secure-code-review-2023/]]></guid>
			<link><![CDATA[https://www.apphaz.com/blogs/ways-to-conduct-a-secure-code-review-2023/]]></link>
			<title>Ways to conduct a secure code review (2023)</title>
			<pubDate><![CDATA[Wed, 02 Apr 2025 18:45:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.apphaz.com/blogs/why-you-should-consider-investing-in-cloud-security/]]></guid>
			<link><![CDATA[https://www.apphaz.com/blogs/why-you-should-consider-investing-in-cloud-security/]]></link>
			<title>Why you should consider investing in cloud security</title>
			<pubDate><![CDATA[Wed, 02 Apr 2025 18:44:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.apphaz.com/blogs/increased-vulnerabilities-due-to-wireless-data-exchange/]]></guid>
			<link><![CDATA[https://www.apphaz.com/blogs/increased-vulnerabilities-due-to-wireless-data-exchange/]]></link>
			<title>Increased vulnerabilities due to wireless data exchange</title>
			<pubDate><![CDATA[Wed, 02 Apr 2025 18:44:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.apphaz.com/blog/]]></guid>
			<link><![CDATA[https://www.apphaz.com/blog/]]></link>
			<title>Blog</title>
			<pubDate><![CDATA[Wed, 02 Apr 2025 18:36:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.apphaz.com/blogs/securing-saas-a-practical-guide-to-vapt-for-cloud-native-platforms/]]></guid>
			<link><![CDATA[https://www.apphaz.com/blogs/securing-saas-a-practical-guide-to-vapt-for-cloud-native-platforms/]]></link>
			<title>Securing SaaS: A Practical Guide to VAPT for Cloud-Native Platforms</title>
			<pubDate><![CDATA[Thu, 12 Jun 2025 21:10:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.apphaz.com/?elementskit_template=header]]></guid>
			<link><![CDATA[https://www.apphaz.com/?elementskit_template=header]]></link>
			<title>Header</title>
			<pubDate><![CDATA[Thu, 03 Apr 2025 15:46:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.apphaz.com/elementskit-content/dynamic-content-megamenu-menuitem612/]]></guid>
			<link><![CDATA[https://www.apphaz.com/elementskit-content/dynamic-content-megamenu-menuitem612/]]></link>
			<title>dynamic-content-megamenu-menuitem612</title>
			<pubDate><![CDATA[Sun, 24 Apr 2022 14:10:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.apphaz.com/blogs/unauthenticated-remote-code-execution-in-ingress-nginx-cve-2025-1974/]]></guid>
			<link><![CDATA[https://www.apphaz.com/blogs/unauthenticated-remote-code-execution-in-ingress-nginx-cve-2025-1974/]]></link>
			<title>Unauthenticated Remote Code Execution in Ingress NGINX (CVE-2025-1974)</title>
			<pubDate><![CDATA[Sun, 13 Apr 2025 17:09:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.apphaz.com/blogs/what-is-penetration-testing-a-beginners-guide/]]></guid>
			<link><![CDATA[https://www.apphaz.com/blogs/what-is-penetration-testing-a-beginners-guide/]]></link>
			<title>What is Penetration Testing? A Beginner’s Guide</title>
			<pubDate><![CDATA[Sun, 13 Apr 2025 16:52:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.apphaz.com/services/]]></guid>
			<link><![CDATA[https://www.apphaz.com/services/]]></link>
			<title>Services</title>
			<pubDate><![CDATA[Mon, 17 Mar 2025 02:43:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.apphaz.com/contact-us/]]></guid>
			<link><![CDATA[https://www.apphaz.com/contact-us/]]></link>
			<title>Contact Us</title>
			<pubDate><![CDATA[Mon, 17 Mar 2025 02:40:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.apphaz.com/]]></guid>
			<link><![CDATA[https://www.apphaz.com/]]></link>
			<title>Apphaz Security Solutions</title>
			<pubDate><![CDATA[Mon, 17 Mar 2025 02:39:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.apphaz.com/?elementskit_template=footer]]></guid>
			<link><![CDATA[https://www.apphaz.com/?elementskit_template=footer]]></link>
			<title>Footer</title>
			<pubDate><![CDATA[Mon, 12 Jan 2026 00:55:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.apphaz.com/partners/]]></guid>
			<link><![CDATA[https://www.apphaz.com/partners/]]></link>
			<title>Partners</title>
			<pubDate><![CDATA[Fri, 25 Jul 2025 02:43:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.apphaz.com/blogs/the-role-of-offensive-security-in-modern-cyber-threats/]]></guid>
			<link><![CDATA[https://www.apphaz.com/blogs/the-role-of-offensive-security-in-modern-cyber-threats/]]></link>
			<title>The Role of Offensive Security in Modern Cyber Threats</title>
			<pubDate><![CDATA[Fri, 23 May 2025 23:37:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.apphaz.com/elementskit-content/dynamic-content-megamenu-menuitem398/]]></guid>
			<link><![CDATA[https://www.apphaz.com/elementskit-content/dynamic-content-megamenu-menuitem398/]]></link>
			<title>dynamic-content-megamenu-menuitem398</title>
			<pubDate><![CDATA[Fri, 22 Apr 2022 19:55:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.apphaz.com/solutions/]]></guid>
			<link><![CDATA[https://www.apphaz.com/solutions/]]></link>
			<title>Solutions</title>
			<pubDate><![CDATA[Fri, 01 Aug 2025 00:30:31 +0000]]></pubDate>
		</item>
				</channel>
</rss>
