<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//www.aerowave-tech.com/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://www.aerowave-tech.com/sdm_downloads/</loc>
		<lastmod>2026-05-01T13:42:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.aerowave-tech.com/sdm_downloads/threat-intel-in-operations/</loc>
		<lastmod>2026-04-20T09:37:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.aerowave-tech.com/sdm_downloads/threat-intel-in-operations-2/</loc>
		<lastmod>2026-04-20T09:38:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.aerowave-tech.com/sdm_downloads/k8s-attack-path-reduction/</loc>
		<lastmod>2026-04-30T04:20:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.aerowave-tech.com/sdm_downloads/detecting-runtime-abuse-in-k8s-pdf/</loc>
		<lastmod>2026-05-01T13:42:01+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->