<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">

  <!-- Main Pages -->
  <url><loc>https://cybersecpentesting.com/</loc><lastmod>2026-04-15</lastmod><changefreq>monthly</changefreq><priority>1.0</priority></url>
  <url><loc>https://cybersecpentesting.com/services.html</loc><lastmod>2026-04-15</lastmod><changefreq>monthly</changefreq><priority>0.9</priority></url>
  <url><loc>https://cybersecpentesting.com/about.html</loc><lastmod>2026-04-15</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url>
  <url><loc>https://cybersecpentesting.com/contact.html</loc><lastmod>2026-04-15</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url>
  <url><loc>https://cybersecpentesting.com/process.html</loc><lastmod>2026-04-15</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://cybersecpentesting.com/industries.html</loc><lastmod>2026-04-15</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://cybersecpentesting.com/certifications.html</loc><lastmod>2026-04-15</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://cybersecpentesting.com/faq.html</loc><lastmod>2026-04-15</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://cybersecpentesting.com/privacy.html</loc><lastmod>2026-04-15</lastmod><changefreq>yearly</changefreq><priority>0.3</priority></url>
  <url><loc>https://cybersecpentesting.com/terms.html</loc><lastmod>2026-04-15</lastmod><changefreq>yearly</changefreq><priority>0.3</priority></url>
  <url><loc>https://cybersecpentesting.com/responsible-disclosure.html</loc><lastmod>2026-04-15</lastmod><changefreq>yearly</changefreq><priority>0.4</priority></url>

  <!-- Location Landing Page -->
  <url><loc>https://cybersecpentesting.com/penetration-testing-toronto.html</loc><lastmod>2026-04-11</lastmod><changefreq>monthly</changefreq><priority>0.95</priority></url>

  <!-- Service Pages -->
  <url><loc>https://cybersecpentesting.com/services/web-application-security.html</loc><lastmod>2026-04-07</lastmod><changefreq>monthly</changefreq><priority>0.85</priority></url>
  <url><loc>https://cybersecpentesting.com/services/network-penetration-testing.html</loc><lastmod>2026-04-07</lastmod><changefreq>monthly</changefreq><priority>0.85</priority></url>
  <url><loc>https://cybersecpentesting.com/services/cloud-security.html</loc><lastmod>2026-04-07</lastmod><changefreq>monthly</changefreq><priority>0.85</priority></url>
  <url><loc>https://cybersecpentesting.com/services/active-directory-security.html</loc><lastmod>2026-04-07</lastmod><changefreq>monthly</changefreq><priority>0.85</priority></url>
  <url><loc>https://cybersecpentesting.com/services/social-engineering.html</loc><lastmod>2026-04-07</lastmod><changefreq>monthly</changefreq><priority>0.85</priority></url>
  <url><loc>https://cybersecpentesting.com/services/red-team-operations.html</loc><lastmod>2026-04-07</lastmod><changefreq>monthly</changefreq><priority>0.85</priority></url>
  <url><loc>https://cybersecpentesting.com/services/ai-red-teaming.html</loc><lastmod>2026-04-07</lastmod><changefreq>monthly</changefreq><priority>0.85</priority></url>
  <url><loc>https://cybersecpentesting.com/services/compliance-assessments.html</loc><lastmod>2026-04-07</lastmod><changefreq>monthly</changefreq><priority>0.85</priority></url>
  <url><loc>https://cybersecpentesting.com/services/custom-pentest.html</loc><lastmod>2026-04-07</lastmod><changefreq>monthly</changefreq><priority>0.85</priority></url>

  <!-- Blog Index -->
  <url><loc>https://cybersecpentesting.com/blog/</loc><lastmod>2026-04-15</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url>

  <!-- Blog Posts — 2026 (Buyer Intent) -->
  <url><loc>https://cybersecpentesting.com/blog/what-is-penetration-testing.html</loc><lastmod>2026-04-12</lastmod><changefreq>monthly</changefreq><priority>0.85</priority></url>
  <url><loc>https://cybersecpentesting.com/blog/penetration-testing-cost-canada.html</loc><lastmod>2026-04-12</lastmod><changefreq>monthly</changefreq><priority>0.85</priority></url>
  <url><loc>https://cybersecpentesting.com/blog/pipeda-penetration-testing-requirements.html</loc><lastmod>2026-04-12</lastmod><changefreq>monthly</changefreq><priority>0.85</priority></url>

  <!-- Blog Posts — 2026 -->
  <url><loc>https://cybersecpentesting.com/blog/ai-agent-mcp-exploitation.html</loc><lastmod>2026-03-17</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url>
  <url><loc>https://cybersecpentesting.com/blog/alert-fatigue-soc-resolution.html</loc><lastmod>2026-03-10</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url>
  <url><loc>https://cybersecpentesting.com/blog/hardcoded-secrets-resolution.html</loc><lastmod>2026-02-17</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url>
  <url><loc>https://cybersecpentesting.com/blog/identity-attacks-mfa-bypass-2026.html</loc><lastmod>2026-02-04</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url>
  <url><loc>https://cybersecpentesting.com/blog/supply-chain-attack-surface-2026.html</loc><lastmod>2026-01-21</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url>
  <url><loc>https://cybersecpentesting.com/blog/cloud-misconfiguration-resolution.html</loc><lastmod>2026-01-13</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url>

  <!-- Blog Posts — 2025 -->
  <url><loc>https://cybersecpentesting.com/blog/insider-threat-resolution.html</loc><lastmod>2025-12-22</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url>
  <url><loc>https://cybersecpentesting.com/blog/ransomware-resilience-edr-evasion.html</loc><lastmod>2025-12-09</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url>
  <url><loc>https://cybersecpentesting.com/blog/internal-network-pivoting.html</loc><lastmod>2025-11-18</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url>
  <url><loc>https://cybersecpentesting.com/blog/adversarial-ml-evasion.html</loc><lastmod>2025-10-28</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url>
  <url><loc>https://cybersecpentesting.com/blog/deserialization-attacks-modern-frameworks.html</loc><lastmod>2025-10-07</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url>
  <url><loc>https://cybersecpentesting.com/blog/kubernetes-cluster-exploitation.html</loc><lastmod>2025-09-16</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url>
  <url><loc>https://cybersecpentesting.com/blog/adcs-abuse-paths.html</loc><lastmod>2025-08-26</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url>
  <url><loc>https://cybersecpentesting.com/blog/wireless-penetration-testing.html</loc><lastmod>2025-08-04</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url>
  <url><loc>https://cybersecpentesting.com/blog/oauth-security-flaws.html</loc><lastmod>2025-07-15</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url>
  <url><loc>https://cybersecpentesting.com/blog/ai-model-supply-chain-attacks.html</loc><lastmod>2025-06-23</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url>
  <url><loc>https://cybersecpentesting.com/blog/gcp-privilege-escalation.html</loc><lastmod>2025-06-02</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url>
  <url><loc>https://cybersecpentesting.com/blog/ssrf-cloud-metadata-exploitation.html</loc><lastmod>2025-05-06</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url>
  <url><loc>https://cybersecpentesting.com/blog/ntlm-relay-attacks.html</loc><lastmod>2025-04-14</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url>
  <url><loc>https://cybersecpentesting.com/blog/kerberoasting-2025.html</loc><lastmod>2025-03-24</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url>
  <url><loc>https://cybersecpentesting.com/blog/aws-iam-privilege-escalation.html</loc><lastmod>2025-02-11</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url>
  <url><loc>https://cybersecpentesting.com/blog/c2-infrastructure-opsec.html</loc><lastmod>2025-01-07</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url>

  <!-- Blog Posts — 2024 -->
  <url><loc>https://cybersecpentesting.com/blog/api-security-testing.html</loc><lastmod>2024-12-16</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url>
  <url><loc>https://cybersecpentesting.com/blog/llm-prompt-injection.html</loc><lastmod>2024-11-05</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url>
  <url><loc>https://cybersecpentesting.com/blog/network-segmentation-testing.html</loc><lastmod>2024-10-22</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url>
  <url><loc>https://cybersecpentesting.com/blog/dcsync-attacks.html</loc><lastmod>2024-09-08</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url>
  <url><loc>https://cybersecpentesting.com/blog/azure-ad-attacks.html</loc><lastmod>2024-08-19</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url>
  <url><loc>https://cybersecpentesting.com/blog/phishing-infrastructure-2025.html</loc><lastmod>2024-07-14</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url>

</urlset>
