<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://thirdeyeintel.com.au/bob-and-chip-comics/</loc><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2026/03/episode-2-ai-in-detection-engineering.png</image:loc><image:title>Episode 2 - AI in Detection Engineering</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2026/03/episode-1-ai-writes-code.png</image:loc><image:title>Episode 1 - AI writes code</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2025/07/screenshot-2025-07-13-at-6.09.56-pm.png</image:loc><image:title>Screenshot 2025-07-13 at 6.09.56 pm</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2025/07/screenshot-2025-07-13-at-6.09.39-pm.png</image:loc><image:title>Screenshot 2025-07-13 at 6.09.39 pm</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2025/04/screenshot-2025-04-16-at-12.36.22e280afpm.png</image:loc><image:title>Screenshot 2025-04-16 at 12.36.22 pm</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2025/04/cvss-4.0.png</image:loc><image:title>CVSS 4.0</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2025/04/hummm-looks-like-network-is-under.jpg</image:loc><image:title>HUMMM! LOOKS LIKE NETWORK IS UNDER</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2025/04/screenshot-2025-04-15-at-9.05.31e280afpm.png</image:loc><image:title>Screenshot 2025-04-15 at 9.05.31 pm</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2025/04/screenshot-2025-04-15-at-9.03.50e280afpm.png</image:loc><image:title>Screenshot 2025-04-15 at 9.03.50 pm</image:title></image:image><lastmod>2026-03-29T04:53:08+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://thirdeyeintel.com.au/2026/03/15/from-missiles-to-malware-part-2/</loc><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2026/03/chatgpt-image-mar-15-2026-11_42_48-pm.png</image:loc><image:title>ChatGPT Image Mar 15, 2026, 11_42_48 PM</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2026/03/diamond-model.png</image:loc><image:title>diamond model</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2026/03/screenshot-2026-03-15-at-10.17.37-pm.png</image:loc><image:title>Screenshot 2026-03-15 at 10.17.37 pm</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2026/03/chatgpt-image-mar-15-2026-10_17_15-pm.png</image:loc><image:title>ChatGPT Image Mar 15, 2026, 10_17_15 PM</image:title></image:image><lastmod>2026-03-18T08:16:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thirdeyeintel.com.au/2026/03/15/from-missiles-to-malware-when-geopolitics-enters-the-network/</loc><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2026/03/tei-act-001-handala.png</image:loc><image:title>TEI-ACT-001 - Handala</image:title></image:image><lastmod>2026-03-15T02:23:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thirdeyeintel.com.au/2026/03/01/playbooks-dont-think-people-do/</loc><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2026/03/screenshot-2026-03-01-at-7.03.18-pm.png</image:loc><image:title>Screenshot 2026-03-01 at 7.03.18 pm</image:title></image:image><lastmod>2026-03-01T08:05:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thirdeyeintel.com.au/2025/10/08/the-lost-art-of-threat-management/</loc><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2025/10/screenshot-2025-10-06-at-9.36.15-pm.png</image:loc><image:title>Screenshot 2025-10-06 at 9.36.15 pm</image:title></image:image><lastmod>2025-10-26T21:41:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thirdeyeintel.com.au/2025/10/14/when-the-enemy-offers-you-a-job/</loc><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2025/10/screenshot-2025-10-14-at-12.29.53-am.png</image:loc><image:title>Screenshot 2025-10-14 at 12.29.53 am</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2025/10/screenshot-2025-10-13-at-5.00.37-pm.png</image:loc><image:title>Screenshot 2025-10-13 at 5.00.37 pm</image:title></image:image><lastmod>2025-10-26T14:07:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thirdeyeintel.com.au/2025/07/24/the-quiet-weight-leading-with-empathy-in-a-world-of-urgency/</loc><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2025/07/screenshot-2025-07-24-at-6.35.22-pm.png</image:loc><image:title>Screenshot 2025-07-24 at 6.35.22 pm</image:title></image:image><lastmod>2025-10-26T13:52:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thirdeyeintel.com.au/2025/09/24/the-future-ready-soc-a-blueprint-for-maturity-resilience-and-real-world-impact/</loc><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2025/09/screenshot-2025-09-24-at-14-09-33-soc-work-soc-documentation-package.png</image:loc><image:title>Screenshot 2025-09-24 at 14-09-33 SOC Work - SOC documentation package</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2025/09/mermaid-chart-create-complex-visual-diagrams-with-text.-a-smarter-way-of-creating-diagrams.-2025-09-24-033410.png</image:loc><image:title>Mermaid Chart - Create complex, visual diagrams with text. A smarter way of creating diagrams.-2025-09-24-033410</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2025/09/screenshot-2025-09-24-at-13-32-28-online-flowchart-diagrams-editor-mermaid-live-editor.png</image:loc><image:title>Screenshot 2025-09-24 at 13-32-28 Online FlowChart &amp; Diagrams Editor - Mermaid Live Editor</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2025/09/screenshot-2025-09-24-at-13-15-11-online-flowchart-diagrams-editor-mermaid-live-editor.png</image:loc><image:title>Screenshot 2025-09-24 at 13-15-11 Online FlowChart &amp; Diagrams Editor - Mermaid Live Editor</image:title></image:image><lastmod>2025-10-19T03:30:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thirdeyeintel.com.au/5w-wire-salesloft-drift-breach-when-the-chatbot-holds-the-keys/</loc><lastmod>2025-10-06T10:40:15+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://thirdeyeintel.com.au/the-5w-wire/cve-2025-53770-the-sharepoint-surprise-party-you-didnt-rsvp-to/</loc><lastmod>2025-07-21T12:26:25+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://thirdeyeintel.com.au/the-5w-wire/</loc><lastmod>2025-07-14T13:54:11+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://thirdeyeintel.com.au/qantas-breach-vishing-at-35000-feet/</loc><lastmod>2025-07-14T13:45:02+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://thirdeyeintel.com.au/2025/07/06/ai-enhanced-socs-in-2025-defenders-co-pilots-and-the-new-cyber-threat-frontier/</loc><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2025/07/chatgpt-image-jul-6-2025-01_29_49-pm.png</image:loc><image:title>ChatGPT Image Jul 6, 2025, 01_29_49 PM</image:title></image:image><lastmod>2025-07-06T05:09:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thirdeyeintel.com.au/2025/05/04/intelscope-pyramid-connecting-the-dots-between-threats-and-strategy/</loc><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2025/05/intelscope-featured-image.png</image:loc><image:title>IntelScope featured image</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2025/05/intelscope_grc_pyramid.png</image:loc><image:title>intelscope_grc_pyramid</image:title></image:image><lastmod>2025-05-04T06:06:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thirdeyeintel.com.au/2025/03/30/who-did-it-unmasking-threat-actors-in-cyber-intelligence-the-5w-sequel/</loc><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2025/03/screenshot-2025-03-29-at-6.29.47e280afpm.png</image:loc><image:title>Screenshot 2025-03-29 at 6.29.47 PM</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2025/03/screenshot-2025-03-29-at-12.51.32e280afpm.png</image:loc><image:title>Screenshot 2025-03-29 at 12.51.32 PM</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2025/03/screenshot-2025-03-22-at-2.56.54e280afpm.png</image:loc><image:title>Screenshot 2025-03-22 at 2.56.54 PM</image:title></image:image><lastmod>2025-03-30T06:45:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thirdeyeintel.com.au/2025/03/23/fusion-centers-the-high-powered-cpu-of-cyber-security/</loc><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2025/03/screenshot-2025-03-23-at-1.46.03e280afpm.png</image:loc><image:title>Screenshot 2025-03-23 at 1.46.03 PM</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2025/03/screenshot-2025-03-23-at-1.30.53e280afpm-1.png</image:loc><image:title>Screenshot 2025-03-23 at 1.30.53 PM</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2025/03/screenshot-2025-03-23-at-1.36.31e280afpm.png</image:loc><image:title>Screenshot 2025-03-23 at 1.36.31 PM</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2025/03/screenshot-2025-03-23-at-1.30.53e280afpm.png</image:loc><image:title>Screenshot 2025-03-23 at 1.30.53 PM</image:title></image:image><lastmod>2025-03-23T03:05:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thirdeyeintel.com.au/2025/03/22/data-leaks-the-silent-reputation-killer-compliance-nightmare/</loc><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2025/03/screenshot-2025-03-02-at-2.25.57e280afpm-1.png</image:loc><image:title>Screenshot 2025-03-02 at 2.25.57 PM</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2025/03/screenshot-2025-03-22-at-5.34.06e280afpm.png</image:loc><image:title>Screenshot 2025-03-22 at 5.34.06 PM</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2025/03/screenshot-2025-03-22-at-5.21.20e280afpm-1.png</image:loc><image:title>Screenshot 2025-03-22 at 5.21.20 PM</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2025/03/screenshot-2025-03-22-at-5.22.33e280afpm.png</image:loc><image:title>Screenshot 2025-03-22 at 5.22.33 PM</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2025/03/screenshot-2025-03-22-at-5.21.20e280afpm.png</image:loc><image:title>Screenshot 2025-03-22 at 5.21.20 PM</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2025/03/screenshot-2025-03-22-at-5.14.28e280afpm.png</image:loc><image:title>Screenshot 2025-03-22 at 5.14.28 PM</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2025/03/screenshot-2025-03-02-at-2.25.57e280afpm.png</image:loc><image:title>Screenshot 2025-03-02 at 2.25.57 PM</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2025/03/screenshot-2025-03-22-at-4.14.32e280afpm.png</image:loc><image:title>Screenshot 2025-03-22 at 4.14.32 PM</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2025/03/screenshot-2025-03-02-at-2.48.30e280afpm.png</image:loc><image:title>Screenshot 2025-03-02 at 2.48.30 PM</image:title></image:image><lastmod>2025-03-22T06:39:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thirdeyeintel.com.au/2024/09/14/my-5w-strategy-in-life-in-intelligence-and-in-soc-operations/</loc><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2024/09/screenshot-2024-09-14-at-7.41.43e280afpm.png</image:loc><image:title>Screenshot 2024-09-14 at 7.41.43 PM</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2024/06/18a3b-screenshot-2023-11-13-at-6.40.22e280afpm.png</image:loc><image:title>Screenshot 2023-11-13 at 6.40.22 pm</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2024/06/9abd5-screenshot-2023-11-13-at-6.41.38e280afpm.png</image:loc><image:title>Screenshot 2023-11-13 at 6.41.38 pm</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2024/06/594f2-screenshot-2023-11-13-at-6.39.20e280afpm.png</image:loc><image:title>Screenshot 2023-11-13 at 6.39.20 pm</image:title></image:image><lastmod>2025-03-08T01:00:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thirdeyeintel.com.au/blog/</loc><lastmod>2025-03-01T12:40:24+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://thirdeyeintel.com.au/2023/11/22/from-down-under-to-digital-uproar-australias-battle-against-cyber-critters/</loc><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2024/06/6bfec-dallc2b7e-2023-11-22-13.12.28-a-humorous-and-colorful-illustration-depicting-a-kangaroo-wearing-a-utility-belt-filled-with-cybersecurity-tools-like-firewalls-antivirus-software-a.png</image:loc><image:title>DALL·E 2023-11-22 13.12.28 - A humorous and colorful illustration depicting a kangaroo wearing a utility belt filled with cybersecurity tools like firewalls, antivirus software, a</image:title></image:image><lastmod>2024-07-13T07:23:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thirdeyeintel.com.au/2023/07/30/into-the-world-of-phishing-as-a-service-providers-operating-on-telegram-targeting-australia/</loc><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2023/07/bf9e2-screenshot-2023-07-30-at-6.19.54-pm-1024x571-1.png</image:loc><image:title>Screenshot-2023-07-30-at-6.19.54-pm-1024x571</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2023/07/364d4-screenshot-2023-07-30-at-6.15.46-pm-1024x297-1.png</image:loc><image:title>Screenshot-2023-07-30-at-6.15.46-pm-1024x297</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2023/07/ce923-screenshot-2023-07-30-at-6.14.48-pm-605x1024-1.png</image:loc><image:title>Screenshot-2023-07-30-at-6.14.48-pm-605x1024</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2023/07/f071a-screenshot-2023-07-30-at-6.13.04-pm-1024x628-1.png</image:loc><image:title>Screenshot-2023-07-30-at-6.13.04-pm-1024x628</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2023/07/061bb-screenshot-2023-07-30-at-6.05.04-pm-485x1024-1.png</image:loc><image:title>Screenshot-2023-07-30-at-6.05.04-pm-485x1024</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2023/07/8b824-screenshot-2023-07-30-at-6.11.21-pm-621x1024-1.png</image:loc><image:title>Screenshot-2023-07-30-at-6.11.21-pm-621x1024</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2023/07/a21e5-screenshot-2023-07-30-at-6.04.54-pm-503x1024-1.png</image:loc><image:title>Screenshot-2023-07-30-at-6.04.54-pm-503x1024</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2023/07/12c9d-screenshot-2023-07-30-at-6.04.35-pm-754x1024-1.png</image:loc><image:title>Screenshot-2023-07-30-at-6.04.35-pm-754x1024</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2023/07/fef33-screenshot-2023-07-30-at-6.03.33-pm-1024x637-1.png</image:loc><image:title>Screenshot-2023-07-30-at-6.03.33-pm-1024x637</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2023/07/60527-screenshot-2023-07-30-at-5.52.56-pm-1024x597-1.png</image:loc><image:title>Screenshot-2023-07-30-at-5.52.56-pm-1024x597</image:title></image:image><lastmod>2024-06-30T03:43:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thirdeyeintel.com.au/2016/10/03/forensics-where-to-start-and-what-to-know/</loc><lastmod>2024-06-30T03:40:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thirdeyeintel.com.au/2023/11/15/navigating-the-evolving-cyber-threat-landscape-insights-from-acscs-2021-2023-reports/</loc><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2024/06/7ab0c-dallc2b7e-2023-11-15-14.38.58-a-3d-style-image-of-a-futuristic-cyber-security-control-room-specifically-focused-on-australia.-the-room-features-advanced-technology-with-large-holo.png</image:loc><image:title>threats_to_aus</image:title></image:image><lastmod>2023-11-15T03:58:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thirdeyeintel.com.au/2023/10/15/my-take-on-role-of-threat-intelligence-in-security-operations/</loc><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2024/06/ecf34-chess-with-threat-actor.png</image:loc><image:title>chess-with-threat-actor</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2024/06/e716a-overwhelmed-analyst.png</image:loc><image:title>overwhelmed-analyst</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2024/06/99069-3d-render-ti-with-soc.png</image:loc><image:title>3D render TI with SOC</image:title></image:image><lastmod>2023-10-15T03:53:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thirdeyeintel.com.au/2023/08/21/essential-intel-using-cti-to-map-the-essential-eight-against-cl0p-ransomware/</loc><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2024/06/d1ecf-adobestock_303177834.jpeg</image:loc><image:title>Maturity and success - the idea that Maturity helps to achieve success and happiness in business, work and life symbolized by English word Maturity and a newton cradle, 3d illustration</image:title><image:caption>Maturity and success - the idea that Maturity helps to achieve success and happiness in business, work and life symbolized by English word Maturity and a newton cradle, 3d illustration</image:caption></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2024/06/3229b-adobestock_448296059.jpeg</image:loc><image:title>Computer Hardware Hacking Background</image:title><image:caption>Vulnerable computer hardware being hacked and network ransomware digital cybercrime background concept. 3D illustration.</image:caption></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2024/06/26d23-adobestock_317007430.jpeg</image:loc><image:title>Magic ball of predictions figure eight on an orange background.</image:title><image:caption>Magic ball of predictions figure eight on an orange background.</image:caption></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2024/06/308f4-adobestock_187096231.jpeg</image:loc><image:title>Cyber threat intelligence</image:title></image:image><lastmod>2023-08-22T07:28:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thirdeyeintel.com.au/2023/07/22/australian-ransomware-threat-landscape-2023-january-to-july-2023-a-look-into-cybersecuritys-persistent-nemesis/</loc><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2024/06/4a589-ransomware_2023.png</image:loc><image:title>ransomware_2023</image:title></image:image><lastmod>2023-07-23T06:06:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thirdeyeintel.com.au/2023/01/03/australian-ransomware-threat-landscape-2022/</loc><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2024/06/2da5e-ransomware_australia.jpg</image:loc><image:title>Ransomware_Australia</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2024/06/ff46e-initial-access-4.png</image:loc><image:title>Initial-Access-4</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2024/06/342af-initial-access-3.png</image:loc><image:title>Initial-Access-3</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2024/06/90942-initial-access-2.png</image:loc><image:title>Initial-Access-2</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2024/06/59956-initial-access-1.png</image:loc><image:title>Initial-Access-1</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2024/06/fdf3f-initial-access.png</image:loc><image:title>Initial-Access</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2024/06/b3e0d-blackcat.png</image:loc><image:title>Blackcat</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2024/06/c4c16-initial-access-1.png</image:loc><image:title>Initial-Access-1</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2024/06/d7921-initial-access.png</image:loc><image:title>Initial-Access</image:title></image:image><lastmod>2023-01-04T02:19:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thirdeyeintel.com.au/2018/08/12/cyber-threat-intelligence-is-it-for-me/</loc><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2024/06/bd872-pexels-photo-277092.jpeg</image:loc><image:title>pexels-photo-277092</image:title><image:caption>Photo by Pixabay on &lt;a href="https://www.pexels.com/photo/battle-black-board-board-game-277092/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2024/06/d05d3-screen-shot-2022-08-23-at-10.44.52-pm.png</image:loc><image:title>Screen Shot 2022-08-23 at 10.44.52 pm</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2018/08/screen-shot-2018-08-13-at-8-59-38-am.png</image:loc><image:title>Screen Shot 2018-08-13 at 8.59.38 am</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2018/08/screen-shot-2018-08-12-at-7-30-29-pm.png</image:loc><image:title>Screen Shot 2018-08-12 at 7.30.29 pm</image:title></image:image><lastmod>2022-08-23T12:51:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thirdeyeintel.com.au/2019/09/29/gozi-isfb-rm3-and-me-a-diamond-model-approach/</loc><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2024/06/3ea06-screen-shot-2022-08-23-at-10.42.20-pm.png</image:loc><image:title>Screen Shot 2022-08-23 at 10.42.20 pm</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2024/06/4414b-screenshot-2022-08-23-at-22-40-24-gozi-the-malware-with-a-thousand-faces-check-point-research.png</image:loc><image:title>Screenshot 2022-08-23 at 22-40-24 Gozi The Malware with a Thousand Faces - Check Point Research</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2019/09/blacktds.png</image:loc><image:title>blacktds</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2019/09/keitaro.png</image:loc><image:title>keitaro</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2019/09/victims.png</image:loc><image:title>victims</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2019/09/picture-1.png</image:loc><image:title>Picture 1</image:title></image:image><lastmod>2022-08-23T12:42:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thirdeyeintel.com.au/2020/04/22/fake-new-order-on-hold-serving-formbook-stealer/</loc><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2024/06/87226-screen-shot-2022-08-23-at-10.35.51-pm.png</image:loc><image:title>Screen Shot 2022-08-23 at 10.35.51 pm</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2020/04/screen-shot-2020-04-22-at-2.11.52-pm.png</image:loc><image:title>Screen Shot 2020-04-22 at 2.11.52 pm</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2020/04/screen-shot-2020-04-22-at-2.10.32-pm.png</image:loc><image:title>Screen Shot 2020-04-22 at 2.10.32 pm</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2020/04/screen-shot-2020-04-21-at-8.16.03-pm.png</image:loc><image:title>Screen Shot 2020-04-21 at 8.16.03 pm</image:title></image:image><lastmod>2022-08-23T12:36:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thirdeyeintel.com.au/2021/02/27/marketplace-update-1-an-australian-logs-based-fraud-store/</loc><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2024/06/39f25-pexels-photo-7111480.jpeg</image:loc><image:title>pexels-photo-7111480</image:title><image:caption>Photo by Tara Winstead on &lt;a href="https://www.pexels.com/photo/close-up-shot-of-dollar-bills-7111480/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2022-08-23T12:31:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thirdeyeintel.com.au/2022/01/08/post-1-priority-intelligence-requirements/</loc><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2024/06/80462-pexels-photo-6192337.jpeg</image:loc><image:title>pexels-photo-6192337</image:title><image:caption>Photo by EKATERINA  BOLOVTSOVA on &lt;a href="https://www.pexels.com/photo/arranged-paper-clips-around-an-eraser-6192337/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2022-08-23T12:28:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thirdeyeintel.com.au/2022/04/30/post-2-intelligence-life-cycle-collection/</loc><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2024/06/c9a1b-pexels-photo-3779187.jpeg</image:loc><image:title>pexels-photo-3779187</image:title><image:caption>Photo by BERK OZDEMIR on &lt;a href="https://www.pexels.com/photo/people-reading-books-in-library-3779187/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2024/06/4080f-screen-shot-2022-08-23-at-10.18.57-pm.png</image:loc><image:title>Screen Shot 2022-08-23 at 10.18.57 pm</image:title></image:image><lastmod>2022-08-23T12:22:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thirdeyeintel.com.au/2016/06/16/the-vendor-the-mssps-and-the-consultant/</loc><lastmod>2022-08-23T01:46:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thirdeyeintel.com.au/2022/07/23/actor-types/</loc><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2024/06/65139-anonymous-studio-figure-photography-facial-mask-38275.jpeg</image:loc><image:title>anonymous-studio-figure-photography-facial-mask-38275</image:title><image:caption>Photo by Pixabay on &lt;a href="https://www.pexels.com/photo/guy-fawkes-mask-and-red-flower-on-hand-38275/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2022/07/actor-types.png</image:loc><image:title>actor-types</image:title></image:image><lastmod>2022-08-22T15:14:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thirdeyeintel.com.au/2016/05/30/malware-analysis-mind-map/</loc><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2016/05/ma-mind-map.jpg</image:loc><image:title>MA - mind map</image:title><image:caption>Malware Analysis - mind-map</image:caption></image:image><lastmod>2022-04-23T13:54:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thirdeyeintel.com.au/2016/06/01/cif-collective-intelligence-framework-my-deployment/</loc><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2016/06/threat-feeds.jpg</image:loc><image:title>threat feeds</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2016/06/ioc-type.jpg</image:loc><image:title>ioc type</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2016/06/event-logs.jpg</image:loc><image:title>event logs</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2016/06/cif-map.jpg</image:loc><image:title>cif map</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2016/06/applications.jpg</image:loc><image:title>applications</image:title></image:image><lastmod>2022-04-23T13:53:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thirdeyeintel.com.au/2016/06/03/cif-cleanmx-threat-feeds/</loc><lastmod>2022-04-23T13:53:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thirdeyeintel.com.au/2016/06/14/cif-feodotracker-threat-feeds/</loc><lastmod>2022-04-23T13:52:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thirdeyeintel.com.au/2015/09/12/hunting-as-an-soc-analyst/</loc><lastmod>2022-04-23T13:51:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thirdeyeintel.com.au/2015/09/24/emails-the-good-the-bad-and-the-ugly-side/</loc><lastmod>2022-04-23T13:50:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thirdeyeintel.com.au/2015/09/24/ndisplan-phishingmalware-email/</loc><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2015/09/ndisplan.jpg</image:loc><image:title>ndisplan</image:title></image:image><lastmod>2022-04-23T13:49:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thirdeyeintel.com.au/2015/10/01/ubuntu-security-onion-networking-issue/</loc><lastmod>2022-04-23T13:40:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thirdeyeintel.com.au/2015/10/13/westpac-spam-email-you-have-new-notification/</loc><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2015/10/tcp-stream.jpg</image:loc><image:title>tcp stream</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2015/10/chrome-phishing.jpg</image:loc><image:title>chrome phishing</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2015/10/email-headers.jpg</image:loc><image:title>email headers</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2015/10/westpac-email.jpg</image:loc><image:title>westpac email</image:title></image:image><lastmod>2022-04-23T13:40:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thirdeyeintel.com.au/2015/10/01/an-email-from-un-attachment-atm_card_1-doc-irrevocable-payment-order-via-atm-card/</loc><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2015/10/email-from-un.jpg</image:loc><image:title>email from UN</image:title></image:image><lastmod>2022-04-23T13:39:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thirdeyeintel.com.au/2015/11/04/westpac-spam-and-an-approach-to-stix-language/</loc><lastmod>2022-04-23T13:38:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thirdeyeintel.com.au/2015/11/06/comand-line-use-to-check-ip-reputation/</loc><lastmod>2022-04-23T13:37:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thirdeyeintel.com.au/2015/11/06/a-suspicious-email-from-field-empty/</loc><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2015/11/header.jpg</image:loc><image:title>header</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2015/11/se-email.jpg</image:loc><image:title>se email</image:title></image:image><lastmod>2022-04-23T13:36:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thirdeyeintel.com.au/2015/11/14/installingrunning-tor-on-linux-distros/</loc><lastmod>2022-04-23T13:35:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thirdeyeintel.com.au/2015/11/28/information-gathering-then-now-and-why/</loc><lastmod>2022-04-23T13:34:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thirdeyeintel.com.au/2015/12/20/heap-spray-attempts-compromised-site-httpwww-efendim-net/</loc><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2015/12/response-payload.jpeg</image:loc><image:title>response payload</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2015/12/ips-signature.jpeg</image:loc><image:title>ips signature</image:title></image:image><lastmod>2022-04-23T13:34:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thirdeyeintel.com.au/2016/01/17/ho-ho-ho-here-comes-the-spamphish/</loc><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2016/01/woolworths.jpg</image:loc><image:title>woolworths</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2016/01/bunnings.jpg</image:loc><image:title>bunnings</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2016/01/myers.jpg</image:loc><image:title>myers</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2016/01/mails1.jpg</image:loc><image:title>mails</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2016/01/mails.jpg</image:loc><image:title>mails</image:title></image:image><lastmod>2022-04-23T13:31:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thirdeyeintel.com.au/2016/08/02/yara-rule-for-dridex/</loc><lastmod>2022-04-23T13:31:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thirdeyeintel.com.au/2016/11/14/evoltin-pos-malware-kill-chain-mind-map/</loc><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2016/11/evoltin-pos-aka-nitloveposb.jpg</image:loc><image:title>evoltin-pos-aka-nitloveposb</image:title></image:image><lastmod>2022-04-23T13:30:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thirdeyeintel.com.au/2016/03/01/dridex-malware-dropper-new-doc-115-doc/</loc><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2016/03/admin-ajax.jpg</image:loc><image:title>email-header</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2016/03/response.jpg</image:loc><image:title>response</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2016/03/payload.jpg</image:loc><image:title>payload</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2016/03/ips-signautres.jpg</image:loc><image:title>ips signautres</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2016/03/cpu-usage.jpg</image:loc><image:title>cpu usage</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2016/03/label-exe-proc.jpg</image:loc><image:title>label.exe proc</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2016/03/anti-virus-detection.jpg</image:loc><image:title>anti-virus detection</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2016/03/sambof-macro.jpg</image:loc><image:title>sambof macro</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2016/03/embedded-object.jpg</image:loc><image:title>embedded object</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2016/03/oledump-macro-extract.jpg</image:loc><image:title>oledump macro extract</image:title></image:image><lastmod>2022-04-23T13:29:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thirdeyeintel.com.au/2016/06/15/cif-ransomware-tracker-abuse-ch-feeds/</loc><lastmod>2022-04-23T13:29:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thirdeyeintel.com.au/2016/06/23/a-javascript-file-invoice-from-uk/</loc><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2016/06/email.jpg</image:loc><image:title>email</image:title></image:image><lastmod>2022-04-23T13:27:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thirdeyeintel.com.au/2016/07/15/list-of-iocs-collected-so-far/</loc><lastmod>2022-04-23T13:27:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thirdeyeintel.com.au/2016/08/09/phishing-sms-a-failed-attempt/</loc><lastmod>2022-04-23T13:24:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thirdeyeintel.com.au/2016/08/15/threat-hunting-and-pyramid-of-pain/</loc><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2016/08/pyramid-of-pain.jpg</image:loc><image:title>pyramid of pain</image:title></image:image><lastmod>2022-04-23T13:23:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thirdeyeintel.com.au/2016/09/02/ransomware-extensions-and-filenames/</loc><lastmod>2022-04-23T13:23:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thirdeyeintel.com.au/2016/09/03/penetration-testing-and-rules-of-engagement/</loc><lastmod>2022-04-23T13:22:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thirdeyeintel.com.au/2016/09/08/incident-response-and-forensics-the-two-towers/</loc><lastmod>2022-04-23T13:21:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thirdeyeintel.com.au/2016/09/09/battling-insider-threats-browser-in-the-box/</loc><lastmod>2022-04-23T13:21:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thirdeyeintel.com.au/2016/09/25/disposable-email-addresses-dea-and-concerns/</loc><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2016/09/screen-shot-2016-09-12-at-9-57-25-pm.png</image:loc><image:title>screen-shot-2016-09-12-at-9-57-25-pm</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2016/09/screen-shot-2016-09-12-at-9-56-36-pm.png</image:loc><image:title>screen-shot-2016-09-12-at-9-56-36-pm</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2016/09/screen-shot-2016-09-12-at-9-55-35-pm.png</image:loc><image:title>screen-shot-2016-09-12-at-9-55-35-pm</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2016/09/screen-shot-2016-09-12-at-9-54-05-pm1.png</image:loc><image:title>screen-shot-2016-09-12-at-9-54-05-pm</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2016/09/screen-shot-2016-09-12-at-9-54-05-pm.png</image:loc><image:title>screen-shot-2016-09-12-at-9-54-05-pm</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2016/09/screen-shot-2016-09-12-at-9-53-32-pm.png</image:loc><image:title>screen-shot-2016-09-12-at-9-53-32-pm</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2016/09/screen-shot-2016-09-12-at-9-50-28-pm.png</image:loc><image:title>screen-shot-2016-09-12-at-9-50-28-pm</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2016/09/guerilla-email.png</image:loc><image:title>guerilla-email</image:title></image:image><lastmod>2022-04-23T13:18:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thirdeyeintel.com.au/2016/12/16/sans-for578-cyber-threat-intelligence-course-review/</loc><lastmod>2022-04-23T13:15:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thirdeyeintel.com.au/2016/12/27/hash-values-a-trivial-artefact/</loc><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2016/12/hashcalc.jpg</image:loc><image:title>hashcalc</image:title></image:image><lastmod>2022-04-23T13:14:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thirdeyeintel.com.au/2017/02/04/finding-evidence-of-data-exfil-usbstor-artefacts/</loc><lastmod>2022-04-23T13:12:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thirdeyeintel.com.au/2017/02/19/powershell-tool-for-admins-and-adversaries/</loc><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2017/02/download.jpg</image:loc><image:title>download</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2017/02/timeline.png</image:loc><image:title>timeline</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2017/02/ps-command.png</image:loc><image:title>ps-command</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2017/02/ps-command2.jpg</image:loc><image:title>ps-command</image:title></image:image><lastmod>2022-04-23T13:11:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thirdeyeintel.com.au/2017/06/10/yet-another-wanacry-ransomware-analysis/</loc><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2017/06/screen-shot-2017-06-11-at-12-58-42-pm.png</image:loc><image:title>Screen Shot 2017-06-11 at 12.58.42 pm</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2017/06/screen-shot-2017-06-11-at-1-10-12-am.png</image:loc><image:title>Screen Shot 2017-06-11 at 1.10.12 am</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2017/06/screen-shot-2017-05-17-at-3-03-50-pm.png</image:loc><image:title>Screen Shot 2017-05-17 at 3.03.50 pm</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2017/05/screen-shot-2017-05-15-at-4-21-42-pm.png</image:loc><image:title>Screen Shot 2017-05-15 at 4.21.42 pm</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2017/05/screen-shot-2017-05-15-at-3-14-20-pm.png</image:loc><image:title>Screen Shot 2017-05-15 at 3.14.20 pm</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2017/05/screen-shot-2017-05-15-at-4-28-21-pm.png</image:loc><image:title>Screen Shot 2017-05-15 at 4.28.21 pm</image:title></image:image><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2017/05/screen-shot-2017-05-15-at-2-53-44-pm.png</image:loc><image:title>Screen Shot 2017-05-15 at 2.53.44 pm</image:title></image:image><lastmod>2022-04-23T13:09:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thirdeyeintel.com.au/2018/06/30/gathering-information-about-targets/</loc><lastmod>2022-04-23T13:09:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thirdeyeintel.com.au/2017/07/01/profiling-the-adversary-target-determination/</loc><image:image><image:loc>https://thirdeyeintel.com.au/wp-content/uploads/2017/07/screen-shot-2017-07-01-at-1-26-04-pm.png</image:loc><image:title>Screen Shot 2017-07-01 at 1.26.04 pm</image:title></image:image><lastmod>2018-04-14T16:14:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thirdeyeintel.com.au</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2026-03-29T04:53:08+00:00</lastmod></url></urlset>
