<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 4, 2026 at 3:42 am by All in One SEO v4.3.4.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://techknowcyber.com/default.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>TECH KNOW CYBER</title>
		<link><![CDATA[https://techknowcyber.com]]></link>
		<description><![CDATA[TECH KNOW CYBER]]></description>
		<lastBuildDate><![CDATA[Wed, 15 Oct 2025 19:51:31 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://techknowcyber.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://techknowcyber.com/when-ai-turns-rogue-future-of-digital-war/]]></guid>
			<link><![CDATA[https://techknowcyber.com/when-ai-turns-rogue-future-of-digital-war/]]></link>
			<title>WHEN AI TURNS ROGUE: FUTURE OF DIGITAL-WAR</title>
			<pubDate><![CDATA[Wed, 15 Oct 2025 19:51:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://techknowcyber.com/about-us/]]></guid>
			<link><![CDATA[https://techknowcyber.com/about-us/]]></link>
			<title>ABOUT US</title>
			<pubDate><![CDATA[Tue, 28 May 2024 19:43:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://techknowcyber.com/newsletter/]]></guid>
			<link><![CDATA[https://techknowcyber.com/newsletter/]]></link>
			<title>Newsletter</title>
			<pubDate><![CDATA[Tue, 28 May 2024 19:00:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://techknowcyber.com/the-hidden-threat-apps-spy-on-us/]]></guid>
			<link><![CDATA[https://techknowcyber.com/the-hidden-threat-apps-spy-on-us/]]></link>
			<title>THE HIDDEN THREAT: APPS SPY on US</title>
			<pubDate><![CDATA[Tue, 14 Oct 2025 19:58:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://techknowcyber.com/tutorials/]]></guid>
			<link><![CDATA[https://techknowcyber.com/tutorials/]]></link>
			<title>TUTORIALS</title>
			<pubDate><![CDATA[Tue, 07 May 2024 19:49:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://techknowcyber.com/threats-vulnerabilities/]]></guid>
			<link><![CDATA[https://techknowcyber.com/threats-vulnerabilities/]]></link>
			<title>THREATS &#038; VULNERABILITIES</title>
			<pubDate><![CDATA[Tue, 07 May 2024 19:37:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://techknowcyber.com/cyber-attacks/]]></guid>
			<link><![CDATA[https://techknowcyber.com/cyber-attacks/]]></link>
			<title>CYBER ATTACK</title>
			<pubDate><![CDATA[Tue, 07 May 2024 18:35:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://techknowcyber.com/blog/]]></guid>
			<link><![CDATA[https://techknowcyber.com/blog/]]></link>
			<title>BLOG</title>
			<pubDate><![CDATA[Tue, 07 May 2024 18:11:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://techknowcyber.com/news/]]></guid>
			<link><![CDATA[https://techknowcyber.com/news/]]></link>
			<title>NEWS</title>
			<pubDate><![CDATA[Tue, 07 May 2024 11:02:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://techknowcyber.com/new-cyber-threat-targets-iphone-users-via-imessage/]]></guid>
			<link><![CDATA[https://techknowcyber.com/new-cyber-threat-targets-iphone-users-via-imessage/]]></link>
			<title>NEW CYBER THREAT TARGETS IPHONE USERS VIA IMESSAGE</title>
			<pubDate><![CDATA[Thu, 31 Oct 2024 17:02:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://techknowcyber.com/france-faces-cyberattack-threat-ahead-of-paris-olympics/]]></guid>
			<link><![CDATA[https://techknowcyber.com/france-faces-cyberattack-threat-ahead-of-paris-olympics/]]></link>
			<title>PARIS OLYMPICS: FRANCE FACES CYBERATTACK</title>
			<pubDate><![CDATA[Thu, 31 Oct 2024 17:02:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://techknowcyber.com/facebooks-snapchat-snag-unveiled-with-mitm-maneuvers/]]></guid>
			<link><![CDATA[https://techknowcyber.com/facebooks-snapchat-snag-unveiled-with-mitm-maneuvers/]]></link>
			<title>FACEBOOK&#8217;S SNAPCHAT SNAG</title>
			<pubDate><![CDATA[Thu, 31 Oct 2024 17:02:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://techknowcyber.com/recent-study-reveals-uk-small-businesses-are-vulnerable-to-cyber-threats/]]></guid>
			<link><![CDATA[https://techknowcyber.com/recent-study-reveals-uk-small-businesses-are-vulnerable-to-cyber-threats/]]></link>
			<title>UK SMALL BIZ VULNERABLE TO CYBER THREATS</title>
			<pubDate><![CDATA[Thu, 31 Oct 2024 17:02:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://techknowcyber.com/zero-click-ai-worm-chat-gpt-gemini-explored/]]></guid>
			<link><![CDATA[https://techknowcyber.com/zero-click-ai-worm-chat-gpt-gemini-explored/]]></link>
			<title>Zero-Click AI Worm: Chat GPT &#038; Gemini Explored!</title>
			<pubDate><![CDATA[Thu, 31 Oct 2024 17:02:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://techknowcyber.com/dhcp-dos-attack-using-yersinia/]]></guid>
			<link><![CDATA[https://techknowcyber.com/dhcp-dos-attack-using-yersinia/]]></link>
			<title>&lt;strong&gt;DHCP DOS ATTACK USING YERSINIA&lt;/strong&gt;</title>
			<pubDate><![CDATA[Thu, 31 Oct 2024 17:02:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://techknowcyber.com/blockchain-and-cybersecurity-a-perfect-match/]]></guid>
			<link><![CDATA[https://techknowcyber.com/blockchain-and-cybersecurity-a-perfect-match/]]></link>
			<title>BLOCKCHAIN AND CYBERSECURITY: A PERFECT MATCH?</title>
			<pubDate><![CDATA[Thu, 31 Oct 2024 17:02:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://techknowcyber.com/eu-cyber-chief-disruptive-attacks-doubled/]]></guid>
			<link><![CDATA[https://techknowcyber.com/eu-cyber-chief-disruptive-attacks-doubled/]]></link>
			<title>EU CYBER CHIEF: DISRUPTIVE ATTACKS DOUBLED</title>
			<pubDate><![CDATA[Thu, 31 Oct 2024 17:02:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://techknowcyber.com/cyber-attack-exposes-data-of-bbc-employees/]]></guid>
			<link><![CDATA[https://techknowcyber.com/cyber-attack-exposes-data-of-bbc-employees/]]></link>
			<title>CYBER ATTACK EXPOSES DATA OF BBC EMPLOYEES</title>
			<pubDate><![CDATA[Thu, 31 Oct 2024 17:02:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://techknowcyber.com/hackers-use-github-to-deliver-malware/]]></guid>
			<link><![CDATA[https://techknowcyber.com/hackers-use-github-to-deliver-malware/]]></link>
			<title>HACKERS USE GITHUB TO DELIVER MALWARE</title>
			<pubDate><![CDATA[Thu, 31 Oct 2024 17:02:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://techknowcyber.com/hack-passwords-with-kali-linux-hydra-tool/]]></guid>
			<link><![CDATA[https://techknowcyber.com/hack-passwords-with-kali-linux-hydra-tool/]]></link>
			<title>HACK PASSWORDS WITH KALI LINUX HYDRA TOOL</title>
			<pubDate><![CDATA[Thu, 31 Oct 2024 17:02:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://techknowcyber.com/escalate-previlege-attack/]]></guid>
			<link><![CDATA[https://techknowcyber.com/escalate-previlege-attack/]]></link>
			<title>ESCALATE PREVILEGE ATTACK</title>
			<pubDate><![CDATA[Thu, 31 Oct 2024 17:02:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://techknowcyber.com/cyber-attacks-understanding-mitigating-and-responding-to-digital-threats/]]></guid>
			<link><![CDATA[https://techknowcyber.com/cyber-attacks-understanding-mitigating-and-responding-to-digital-threats/]]></link>
			<title>Understanding, Mitigating and Responding to Cyber Attacks</title>
			<pubDate><![CDATA[Thu, 31 Oct 2024 17:02:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://techknowcyber.com/empowering-small-businesses-with-security/]]></guid>
			<link><![CDATA[https://techknowcyber.com/empowering-small-businesses-with-security/]]></link>
			<title>EMPOWERING SMALL BUSINESSES WITH SECURITY</title>
			<pubDate><![CDATA[Thu, 31 Oct 2024 17:02:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://techknowcyber.com/cyber-security-101-protecting-yourself-online/]]></guid>
			<link><![CDATA[https://techknowcyber.com/cyber-security-101-protecting-yourself-online/]]></link>
			<title>CYBER SECURITY: PROTECTING YOURSELF ONLINE</title>
			<pubDate><![CDATA[Thu, 31 Oct 2024 17:02:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://techknowcyber.com/security-tips/]]></guid>
			<link><![CDATA[https://techknowcyber.com/security-tips/]]></link>
			<title>SECURITY TIPS</title>
			<pubDate><![CDATA[Sun, 18 Feb 2024 08:37:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://techknowcyber.com/]]></guid>
			<link><![CDATA[https://techknowcyber.com/]]></link>
			<title>HOME</title>
			<pubDate><![CDATA[Fri, 19 Jul 2024 16:20:18 +0000]]></pubDate>
		</item>
				</channel>
</rss>
