<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on 04/04/2026 at 11:24 PM by All in One SEO v4.9.3 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://digital-forensics.in/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Digital Forensics</title>
		<link><![CDATA[https://digital-forensics.in]]></link>
		<description><![CDATA[Digital Forensics]]></description>
		<lastBuildDate><![CDATA[Wed, 19 Feb 2025 08:02:36 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://digital-forensics.in/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://digital-forensics.in/2025/02/19/meta-trained-its-llama-ai-models-using-81-7-tb-of-books-stolen-from-torrent-shadow-libraries/]]></guid>
			<link><![CDATA[https://digital-forensics.in/2025/02/19/meta-trained-its-llama-ai-models-using-81-7-tb-of-books-stolen-from-torrent-shadow-libraries/]]></link>
			<title>Meta Trained Its Llama AI Models Using 81.7 TB of Books Stolen From Torrent Shadow Libraries</title>
			<pubDate><![CDATA[Wed, 19 Feb 2025 08:02:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digital-forensics.in/2025/02/19/multiple-russian-actors-attacking-orgs-to-hack-microsoft-365-accounts-via-device-code-authentication/]]></guid>
			<link><![CDATA[https://digital-forensics.in/2025/02/19/multiple-russian-actors-attacking-orgs-to-hack-microsoft-365-accounts-via-device-code-authentication/]]></link>
			<title>Multiple Russian Actors Attacking Orgs To Hack Microsoft 365 Accounts via Device Code Authentication</title>
			<pubDate><![CDATA[Wed, 19 Feb 2025 07:58:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digital-forensics.in/2025/02/04/768-vulnerabilities-exploited-in-the-wild-in-2024-a-20-year-over-year-surge/]]></guid>
			<link><![CDATA[https://digital-forensics.in/2025/02/04/768-vulnerabilities-exploited-in-the-wild-in-2024-a-20-year-over-year-surge/]]></link>
			<title>768 Vulnerabilities Exploited in the Wild in 2024: A 20% Year-Over-Year Surge</title>
			<pubDate><![CDATA[Tue, 04 Feb 2025 06:29:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digital-forensics.in/2025/02/04/casio-uk-web-store-hacked-to-inject-customer-credit-card-stealing-scripts/]]></guid>
			<link><![CDATA[https://digital-forensics.in/2025/02/04/casio-uk-web-store-hacked-to-inject-customer-credit-card-stealing-scripts/]]></link>
			<title>Casio UK Web Store Hacked to Inject Customer Credit Card Stealing Scripts</title>
			<pubDate><![CDATA[Tue, 04 Feb 2025 06:26:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digital-forensics.in/2025/02/04/asyncrat-abusing-python-and-trycloudflare-for-stealthy-malware-delivery/]]></guid>
			<link><![CDATA[https://digital-forensics.in/2025/02/04/asyncrat-abusing-python-and-trycloudflare-for-stealthy-malware-delivery/]]></link>
			<title>AsyncRAT Abusing Python and TryCloudflare For Stealthy Malware Delivery</title>
			<pubDate><![CDATA[Tue, 04 Feb 2025 06:22:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digital-forensics.in/2025/02/06/weaponizing-windows-background-images-to-gain-admin-access-using-anydesk-vulnerability/]]></guid>
			<link><![CDATA[https://digital-forensics.in/2025/02/06/weaponizing-windows-background-images-to-gain-admin-access-using-anydesk-vulnerability/]]></link>
			<title>Weaponizing Windows Background Images to Gain Admin Access Using AnyDesk Vulnerability</title>
			<pubDate><![CDATA[Thu, 06 Feb 2025 09:31:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digital-forensics.in/2025/02/06/password-stealing-malware-attacking-macos-users-increasing-rapidly/]]></guid>
			<link><![CDATA[https://digital-forensics.in/2025/02/06/password-stealing-malware-attacking-macos-users-increasing-rapidly/]]></link>
			<title>Password Stealing Malware Attacking macOS Users Increasing Rapidly</title>
			<pubDate><![CDATA[Thu, 06 Feb 2025 09:28:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digital-forensics.in/training-and-awareness/]]></guid>
			<link><![CDATA[https://digital-forensics.in/training-and-awareness/]]></link>
			<title>Training and Awareness</title>
			<pubDate><![CDATA[Sun, 02 Feb 2025 18:54:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digital-forensics.in/contact/]]></guid>
			<link><![CDATA[https://digital-forensics.in/contact/]]></link>
			<title>Contact</title>
			<pubDate><![CDATA[Sun, 02 Feb 2025 18:52:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digital-forensics.in/]]></guid>
			<link><![CDATA[https://digital-forensics.in/]]></link>
			<title>Home</title>
			<pubDate><![CDATA[Sun, 02 Feb 2025 18:51:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digital-forensics.in/services/]]></guid>
			<link><![CDATA[https://digital-forensics.in/services/]]></link>
			<title>Services</title>
			<pubDate><![CDATA[Sun, 02 Feb 2025 18:30:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digital-forensics.in/environmental-social-and-governance-advisory-services-esg/]]></guid>
			<link><![CDATA[https://digital-forensics.in/environmental-social-and-governance-advisory-services-esg/]]></link>
			<title>Environmental, Social and Governance Advisory Services (ESG)</title>
			<pubDate><![CDATA[Sun, 02 Feb 2025 18:30:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digital-forensics.in/2025/02/03/ftc-warns-godaddy-for-inadequate-security-practices-in-website-hosting-services/]]></guid>
			<link><![CDATA[https://digital-forensics.in/2025/02/03/ftc-warns-godaddy-for-inadequate-security-practices-in-website-hosting-services/]]></link>
			<title>FTC Warns GoDaddy for Inadequate Security Practices in Website Hosting Services</title>
			<pubDate><![CDATA[Mon, 03 Feb 2025 06:00:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digital-forensics.in/about-us/]]></guid>
			<link><![CDATA[https://digital-forensics.in/about-us/]]></link>
			<title>About</title>
			<pubDate><![CDATA[Sun, 02 Feb 2025 18:27:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digital-forensics.in/digital-investigations/]]></guid>
			<link><![CDATA[https://digital-forensics.in/digital-investigations/]]></link>
			<title>Digital Investigations</title>
			<pubDate><![CDATA[Sun, 02 Feb 2025 18:25:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digital-forensics.in/digital-technology-solutions/]]></guid>
			<link><![CDATA[https://digital-forensics.in/digital-technology-solutions/]]></link>
			<title>Digital Technology Solutions</title>
			<pubDate><![CDATA[Sun, 02 Feb 2025 18:22:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digital-forensics.in/2025/02/03/deepseek-ai-is-now-powering-with-huawei-ascend-910c-chip/]]></guid>
			<link><![CDATA[https://digital-forensics.in/2025/02/03/deepseek-ai-is-now-powering-with-huawei-ascend-910c-chip/]]></link>
			<title>DeepSeek AI is Now Powering With Huawei Ascend 910C Chip</title>
			<pubDate><![CDATA[Mon, 03 Feb 2025 05:56:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digital-forensics.in/cyber-and-data-resilience/]]></guid>
			<link><![CDATA[https://digital-forensics.in/cyber-and-data-resilience/]]></link>
			<title>Cyber and Data Resilience</title>
			<pubDate><![CDATA[Sun, 02 Feb 2025 18:19:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digital-forensics.in/compliance-and-regulation/]]></guid>
			<link><![CDATA[https://digital-forensics.in/compliance-and-regulation/]]></link>
			<title>Compliance and Regulation</title>
			<pubDate><![CDATA[Sun, 02 Feb 2025 18:15:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digital-forensics.in/2025/02/03/googles-subdomain-g-co-hacked-a-tricky-phone-call-lets-hackers-access-your-google-account-remotely/]]></guid>
			<link><![CDATA[https://digital-forensics.in/2025/02/03/googles-subdomain-g-co-hacked-a-tricky-phone-call-lets-hackers-access-your-google-account-remotely/]]></link>
			<title>Google’s Subdomain ‘g.co’ Hacked – A Tricky Phone Call Lets Hackers Access Your Google Account Remotely</title>
			<pubDate><![CDATA[Mon, 03 Feb 2025 05:48:34 +0000]]></pubDate>
		</item>
				</channel>
</rss>
