<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml"><url><loc>https://blog.empowsec.com/en</loc><changefreq>daily</changefreq><priority>1.0</priority><xhtml:link rel="alternate" hreflang="en" href="https://blog.empowsec.com/en"/><xhtml:link rel="alternate" hreflang="de" href="https://blog.empowsec.com/de"/><xhtml:link rel="alternate" hreflang="x-default" href="https://blog.empowsec.com/en"/></url><url><loc>https://blog.empowsec.com/de</loc><changefreq>daily</changefreq><priority>1.0</priority><xhtml:link rel="alternate" hreflang="en" href="https://blog.empowsec.com/en"/><xhtml:link rel="alternate" hreflang="de" href="https://blog.empowsec.com/de"/><xhtml:link rel="alternate" hreflang="x-default" href="https://blog.empowsec.com/en"/></url><url><loc>https://blog.empowsec.com/en/category/phishing-social-engineering</loc><lastmod>2026-04-08T08:40:32+00:00</lastmod><changefreq>weekly</changefreq><priority>0.8</priority><xhtml:link rel="alternate" hreflang="en" href="https://blog.empowsec.com/en/category/phishing-social-engineering"/><xhtml:link rel="alternate" hreflang="de" href="https://blog.empowsec.com/de/category/phishing-social-engineering"/><xhtml:link rel="alternate" hreflang="x-default" href="https://blog.empowsec.com/en/category/phishing-social-engineering"/></url><url><loc>https://blog.empowsec.com/de/category/phishing-social-engineering</loc><lastmod>2026-04-08T08:40:32+00:00</lastmod><changefreq>weekly</changefreq><priority>0.8</priority><xhtml:link rel="alternate" hreflang="en" href="https://blog.empowsec.com/en/category/phishing-social-engineering"/><xhtml:link rel="alternate" hreflang="de" href="https://blog.empowsec.com/de/category/phishing-social-engineering"/><xhtml:link rel="alternate" hreflang="x-default" href="https://blog.empowsec.com/en/category/phishing-social-engineering"/></url><url><loc>https://blog.empowsec.com/en/category/security-awareness-tips</loc><lastmod>2026-04-08T08:40:32+00:00</lastmod><changefreq>weekly</changefreq><priority>0.8</priority><xhtml:link rel="alternate" hreflang="en" href="https://blog.empowsec.com/en/category/security-awareness-tips"/><xhtml:link rel="alternate" hreflang="de" href="https://blog.empowsec.com/de/category/security-awareness-tips"/><xhtml:link rel="alternate" hreflang="x-default" href="https://blog.empowsec.com/en/category/security-awareness-tips"/></url><url><loc>https://blog.empowsec.com/de/category/security-awareness-tips</loc><lastmod>2026-04-08T08:40:32+00:00</lastmod><changefreq>weekly</changefreq><priority>0.8</priority><xhtml:link rel="alternate" hreflang="en" href="https://blog.empowsec.com/en/category/security-awareness-tips"/><xhtml:link rel="alternate" hreflang="de" href="https://blog.empowsec.com/de/category/security-awareness-tips"/><xhtml:link rel="alternate" hreflang="x-default" href="https://blog.empowsec.com/en/category/security-awareness-tips"/></url><url><loc>https://blog.empowsec.com/en/category/compliance-regulations</loc><lastmod>2026-04-08T08:40:32+00:00</lastmod><changefreq>weekly</changefreq><priority>0.8</priority><xhtml:link rel="alternate" hreflang="en" href="https://blog.empowsec.com/en/category/compliance-regulations"/><xhtml:link rel="alternate" hreflang="de" href="https://blog.empowsec.com/de/category/compliance-regulations"/><xhtml:link rel="alternate" hreflang="x-default" href="https://blog.empowsec.com/en/category/compliance-regulations"/></url><url><loc>https://blog.empowsec.com/de/category/compliance-regulations</loc><lastmod>2026-04-08T08:40:32+00:00</lastmod><changefreq>weekly</changefreq><priority>0.8</priority><xhtml:link rel="alternate" hreflang="en" href="https://blog.empowsec.com/en/category/compliance-regulations"/><xhtml:link rel="alternate" hreflang="de" href="https://blog.empowsec.com/de/category/compliance-regulations"/><xhtml:link rel="alternate" hreflang="x-default" href="https://blog.empowsec.com/en/category/compliance-regulations"/></url><url><loc>https://blog.empowsec.com/en/category/threat-intelligence</loc><lastmod>2026-04-08T08:40:32+00:00</lastmod><changefreq>weekly</changefreq><priority>0.8</priority><xhtml:link rel="alternate" hreflang="en" href="https://blog.empowsec.com/en/category/threat-intelligence"/><xhtml:link rel="alternate" hreflang="de" href="https://blog.empowsec.com/de/category/threat-intelligence"/><xhtml:link rel="alternate" hreflang="x-default" href="https://blog.empowsec.com/en/category/threat-intelligence"/></url><url><loc>https://blog.empowsec.com/de/category/threat-intelligence</loc><lastmod>2026-04-08T08:40:32+00:00</lastmod><changefreq>weekly</changefreq><priority>0.8</priority><xhtml:link rel="alternate" hreflang="en" href="https://blog.empowsec.com/en/category/threat-intelligence"/><xhtml:link rel="alternate" hreflang="de" href="https://blog.empowsec.com/de/category/threat-intelligence"/><xhtml:link rel="alternate" hreflang="x-default" href="https://blog.empowsec.com/en/category/threat-intelligence"/></url><url><loc>https://blog.empowsec.com/en/category/msps-partners</loc><lastmod>2026-04-08T08:40:32+00:00</lastmod><changefreq>weekly</changefreq><priority>0.8</priority><xhtml:link rel="alternate" hreflang="en" href="https://blog.empowsec.com/en/category/msps-partners"/><xhtml:link rel="alternate" hreflang="de" href="https://blog.empowsec.com/de/category/msps-partners"/><xhtml:link rel="alternate" hreflang="x-default" href="https://blog.empowsec.com/en/category/msps-partners"/></url><url><loc>https://blog.empowsec.com/de/category/msps-partners</loc><lastmod>2026-04-08T08:40:32+00:00</lastmod><changefreq>weekly</changefreq><priority>0.8</priority><xhtml:link rel="alternate" hreflang="en" href="https://blog.empowsec.com/en/category/msps-partners"/><xhtml:link rel="alternate" hreflang="de" href="https://blog.empowsec.com/de/category/msps-partners"/><xhtml:link rel="alternate" hreflang="x-default" href="https://blog.empowsec.com/en/category/msps-partners"/></url><url><loc>https://blog.empowsec.com/en/category/product-updates</loc><lastmod>2026-04-08T08:40:32+00:00</lastmod><changefreq>weekly</changefreq><priority>0.8</priority><xhtml:link rel="alternate" hreflang="en" href="https://blog.empowsec.com/en/category/product-updates"/><xhtml:link rel="alternate" hreflang="de" href="https://blog.empowsec.com/de/category/product-updates"/><xhtml:link rel="alternate" hreflang="x-default" href="https://blog.empowsec.com/en/category/product-updates"/></url><url><loc>https://blog.empowsec.com/de/category/product-updates</loc><lastmod>2026-04-08T08:40:32+00:00</lastmod><changefreq>weekly</changefreq><priority>0.8</priority><xhtml:link rel="alternate" hreflang="en" href="https://blog.empowsec.com/en/category/product-updates"/><xhtml:link rel="alternate" hreflang="de" href="https://blog.empowsec.com/de/category/product-updates"/><xhtml:link rel="alternate" hreflang="x-default" href="https://blog.empowsec.com/en/category/product-updates"/></url><url><loc>https://blog.empowsec.com/en/empowsec-affiliate-program-earn-recurring-commissions</loc><lastmod>2026-04-24T11:49:52+00:00</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="en" href="https://blog.empowsec.com/en/empowsec-affiliate-program-earn-recurring-commissions"/><xhtml:link rel="alternate" hreflang="x-default" href="https://blog.empowsec.com/en/empowsec-affiliate-program-earn-recurring-commissions"/></url><url><loc>https://blog.empowsec.com/en/quishing-2026-evolved-evasion-techniques</loc><lastmod>2026-04-22T19:46:27+00:00</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="en" href="https://blog.empowsec.com/en/quishing-2026-evolved-evasion-techniques"/><xhtml:link rel="alternate" hreflang="x-default" href="https://blog.empowsec.com/en/quishing-2026-evolved-evasion-techniques"/></url><url><loc>https://blog.empowsec.com/en/ntbha-breach-hipaa-lessons-for-2026</loc><lastmod>2026-04-21T14:39:28+00:00</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="en" href="https://blog.empowsec.com/en/ntbha-breach-hipaa-lessons-for-2026"/><xhtml:link rel="alternate" hreflang="x-default" href="https://blog.empowsec.com/en/ntbha-breach-hipaa-lessons-for-2026"/></url><url><loc>https://blog.empowsec.com/en/empowsec-vs-knowbe4-comparison</loc><lastmod>2026-04-20T15:44:05+00:00</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="en" href="https://blog.empowsec.com/en/empowsec-vs-knowbe4-comparison"/><xhtml:link rel="alternate" hreflang="x-default" href="https://blog.empowsec.com/en/empowsec-vs-knowbe4-comparison"/></url><url><loc>https://blog.empowsec.com/en/athr-vishing-as-a-service-ai-voice-scams</loc><lastmod>2026-04-19T08:26:48+00:00</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="en" href="https://blog.empowsec.com/en/athr-vishing-as-a-service-ai-voice-scams"/><xhtml:link rel="alternate" hreflang="x-default" href="https://blog.empowsec.com/en/athr-vishing-as-a-service-ai-voice-scams"/></url><url><loc>https://blog.empowsec.com/en/booking-com-breach-targeted-phishing-protect-your-team</loc><lastmod>2026-04-15T18:04:37+00:00</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="en" href="https://blog.empowsec.com/en/booking-com-breach-targeted-phishing-protect-your-team"/><xhtml:link rel="alternate" hreflang="x-default" href="https://blog.empowsec.com/en/booking-com-breach-targeted-phishing-protect-your-team"/></url><url><loc>https://blog.empowsec.com/en/fbi-dismantles-global-phishing-network-employee-training</loc><lastmod>2026-04-13T11:08:03+00:00</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="en" href="https://blog.empowsec.com/en/fbi-dismantles-global-phishing-network-employee-training"/><xhtml:link rel="alternate" hreflang="x-default" href="https://blog.empowsec.com/en/fbi-dismantles-global-phishing-network-employee-training"/></url><url><loc>https://blog.empowsec.com/en/phishing-training-evolving-debrief-teachable-moments</loc><lastmod>2026-04-10T11:21:09+00:00</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="en" href="https://blog.empowsec.com/en/phishing-training-evolving-debrief-teachable-moments"/><xhtml:link rel="alternate" hreflang="x-default" href="https://blog.empowsec.com/en/phishing-training-evolving-debrief-teachable-moments"/></url><url><loc>https://blog.empowsec.com/en/foster-city-cyberattack-what-municipal-governments-must-learn</loc><lastmod>2026-04-09T13:15:18+00:00</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="en" href="https://blog.empowsec.com/en/foster-city-cyberattack-what-municipal-governments-must-learn"/><xhtml:link rel="alternate" hreflang="x-default" href="https://blog.empowsec.com/en/foster-city-cyberattack-what-municipal-governments-must-learn"/></url><url><loc>https://blog.empowsec.com/en/building-security-first-culture-beyond-training</loc><lastmod>2026-04-08T09:10:19+00:00</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="en" href="https://blog.empowsec.com/en/building-security-first-culture-beyond-training"/><xhtml:link rel="alternate" hreflang="x-default" href="https://blog.empowsec.com/en/building-security-first-culture-beyond-training"/></url><url><loc>https://blog.empowsec.com/en/msps-security-awareness-training-recurring-revenue</loc><lastmod>2026-04-08T09:10:18+00:00</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="en" href="https://blog.empowsec.com/en/msps-security-awareness-training-recurring-revenue"/><xhtml:link rel="alternate" hreflang="x-default" href="https://blog.empowsec.com/en/msps-security-awareness-training-recurring-revenue"/></url><url><loc>https://blog.empowsec.com/en/qr-code-phishing-quishing-bypasses-email-security</loc><lastmod>2026-04-08T09:10:17+00:00</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="en" href="https://blog.empowsec.com/en/qr-code-phishing-quishing-bypasses-email-security"/><xhtml:link rel="alternate" hreflang="x-default" href="https://blog.empowsec.com/en/qr-code-phishing-quishing-bypasses-email-security"/></url><url><loc>https://blog.empowsec.com/en/nis2-security-awareness-training-requirements</loc><lastmod>2026-04-08T09:10:17+00:00</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="en" href="https://blog.empowsec.com/en/nis2-security-awareness-training-requirements"/><xhtml:link rel="alternate" hreflang="x-default" href="https://blog.empowsec.com/en/nis2-security-awareness-training-requirements"/></url><url><loc>https://blog.empowsec.com/en/why-phishing-simulations-fail-and-how-to-fix-yours</loc><lastmod>2026-04-08T09:10:16+00:00</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="en" href="https://blog.empowsec.com/en/why-phishing-simulations-fail-and-how-to-fix-yours"/><xhtml:link rel="alternate" hreflang="x-default" href="https://blog.empowsec.com/en/why-phishing-simulations-fail-and-how-to-fix-yours"/></url><url><loc>https://blog.empowsec.com/en/5-phishing-red-flags-every-employee-should-recognize</loc><lastmod>2026-04-08T09:10:15+00:00</lastmod><changefreq>monthly</changefreq><priority>0.7</priority><xhtml:link rel="alternate" hreflang="en" href="https://blog.empowsec.com/en/5-phishing-red-flags-every-employee-should-recognize"/><xhtml:link rel="alternate" hreflang="x-default" href="https://blog.empowsec.com/en/5-phishing-red-flags-every-employee-should-recognize"/></url></urlset>