<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://www.digitalintelligence.at/wp-sitemap.xsl" ?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://www.digitalintelligence.at/encryption-vulnerability-in-satellite-communications-an-open-door-for-cyber-espionage/</loc><lastmod>2026-02-28T14:59:08+00:00</lastmod></url><url><loc>https://www.digitalintelligence.at/the-russian-spy-ship-stalking-europes-subsea-cables/</loc><lastmod>2026-02-28T15:00:01+00:00</lastmod></url><url><loc>https://www.digitalintelligence.at/gru-linked-espionage-activity-in-latvia/</loc><lastmod>2025-11-29T14:44:14+00:00</lastmod></url><url><loc>https://www.digitalintelligence.at/ai-cyber-espionage-state-sponsored-actors-exploit-agentic-models/</loc><lastmod>2025-11-29T14:45:58+00:00</lastmod></url><url><loc>https://www.digitalintelligence.at/poland-confirms-delivery-of-thousands-of-warmate-loitering-munitions-to-ukraine-an-osint-based-assessment/</loc><lastmod>2025-11-29T14:53:14+00:00</lastmod></url><url><loc>https://www.digitalintelligence.at/securing-europes-energy-grid-against-hybrid-cyber-operations-a-technical-intelligence-assessment/</loc><lastmod>2026-02-28T14:59:33+00:00</lastmod></url><url><loc>https://www.digitalintelligence.at/digital-support-for-europes-border-security-a-technical-intelligence-assessment/</loc><lastmod>2025-11-29T14:48:58+00:00</lastmod></url><url><loc>https://www.digitalintelligence.at/inside-the-mind-of-an-ethical-hacker-a-deep-dive-interview/</loc><lastmod>2025-11-29T14:49:24+00:00</lastmod></url><url><loc>https://www.digitalintelligence.at/my-reflections-on-the-vienna-conference-on-combating-trafficking-in-human-beings-2025/</loc><lastmod>2025-11-29T14:44:47+00:00</lastmod></url><url><loc>https://www.digitalintelligence.at/milipol-paris-2025-analysis/</loc><lastmod>2026-02-28T14:58:43+00:00</lastmod></url><url><loc>https://www.digitalintelligence.at/notes-from-a-cyber-intelligence-insider-how-digital-disinformation-really-works/</loc><lastmod>2025-11-29T14:38:28+00:00</lastmod></url><url><loc>https://www.digitalintelligence.at/ai-is-the-ultimate-distraction-for-national-security/</loc><lastmod>2026-02-28T14:57:52+00:00</lastmod></url><url><loc>https://www.digitalintelligence.at/wifi-signals-can-see-you-how-csi-sensing-works/</loc><lastmod>2026-02-28T14:57:23+00:00</lastmod></url><url><loc>https://www.digitalintelligence.at/the-blind-spot-in-european-cybersecurity-why-smes-are-losing-the-attack-surface-battle/</loc><lastmod>2026-03-16T02:35:16+00:00</lastmod></url><url><loc>https://www.digitalintelligence.at/the-first-cyber-war-how-digital-intelligence-shaped-operation-epic-fury/</loc><lastmod>2026-03-16T02:34:16+00:00</lastmod></url><url><loc>https://www.digitalintelligence.at/ai-broke-the-criminal-profile-now-what/</loc><lastmod>2026-03-26T21:38:40+00:00</lastmod></url><url><loc>https://www.digitalintelligence.at/open-source-ignored-why-europe-must-get-serious-about-social-media-threat-monitoring-before-the-next-school-attack/</loc><lastmod>2026-04-16T10:43:36+00:00</lastmod></url><url><loc>https://www.digitalintelligence.at/austria-finally-drafts-a-real-espionage-law-the-ott-trial-will-decide-whether-it-matters/</loc><lastmod>2026-05-11T15:04:48+00:00</lastmod></url><url><loc>https://www.digitalintelligence.at/the-between-peace-and-war-doctrine-has-an-austrian-problem/</loc><lastmod>2026-05-11T15:07:41+00:00</lastmod></url></urlset>
