<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml"><url><loc>https://windshock.github.io/ko/post/2026-04-02-security-from-sense-to-structure/</loc><lastmod>2026-04-02T00:00:00Z</lastmod></url><url><loc>https://windshock.github.io/ko/post/2026-03-30-captcha-bypass-poc-defense-strategy/</loc><lastmod>2026-03-30T00:00:00Z</lastmod></url><url><loc>https://windshock.github.io/ko/post/2026-03-26-korean-security-escape-velocity/</loc><lastmod>2026-03-26T00:00:00Z</lastmod></url><url><loc>https://windshock.github.io/ko/post/2026-03-17-security-testing-as-code/</loc><lastmod>2026-03-17T00:00:00Z</lastmod></url><url><loc>https://windshock.github.io/ko/post/2026-03-13-waf-ips-ids-detection-gap-analysis/</loc><lastmod>2026-03-13T00:00:00Z</lastmod></url><url><loc>https://windshock.github.io/ko/post/2026-02-13-contract-vs-security-governance/</loc><lastmod>2026-02-13T00:00:00Z</lastmod></url><url><loc>https://windshock.github.io/ko/post/2026-01-19-digital-identity-eidas2-korea/</loc><lastmod>2026-01-19T00:00:00Z</lastmod></url><url><loc>https://windshock.github.io/ko/post/2026-01-07-amadey-static-vs-memory-detection/</loc><lastmod>2026-01-07T00:00:00Z</lastmod></url><url><loc>https://windshock.github.io/ko/post/2025-12-29-visibility-changes-behavior/</loc><lastmod>2025-12-29T00:00:00Z</lastmod></url><url><loc>https://windshock.github.io/ko/post/2025-12-22-attack-surface-management-in-2025-continuous-visibility/</loc><lastmod>2025-12-22T00:00:00Z</lastmod></url><url><loc>https://windshock.github.io/ko/post/2025-07-10-fido2-local-admin-login-feasibility/</loc><lastmod>2025-07-10T00:00:00Z</lastmod></url><url><loc>https://windshock.github.io/ko/post/2025-06-30-ciso-strategy-execution/</loc><lastmod>2025-06-30T00:00:00Z</lastmod></url><url><loc>https://windshock.github.io/ko/post/2025-06-25-ssrf-defense/</loc><lastmod>2025-06-25T00:00:00Z</lastmod></url><url><loc>https://windshock.github.io/ko/post/2025-06-10-rce-via-exception-serialization-in-openstack-nova/</loc><lastmod>2025-06-10T00:00:00Z</lastmod></url><url><loc>https://windshock.github.io/ko/post/2025-05-28-endpoint-security-evasion-techniques-20202025/</loc><lastmod>2025-05-28T00:00:00Z</lastmod></url><url><loc>https://windshock.github.io/ko/post/2025-05-15-spof-analysis-in-cybersecurity/</loc><lastmod>2025-05-15T00:00:00Z</lastmod></url><url><loc>https://windshock.github.io/ko/post/2025-05-12-cve-cve-2022-24434-dicer/</loc><lastmod>2025-05-12T00:00:00Z</lastmod></url><url><loc>https://windshock.github.io/ko/post/2025-05-12-managing-unmaintained-open-source-with-snyk-and-gmail/</loc><lastmod>2025-05-12T00:00:00Z</lastmod></url><url><loc>https://windshock.github.io/ko/post/2025-05-07-ai-insight-vs-human/</loc><lastmod>2025-05-07T00:00:00Z</lastmod></url><url><loc>https://windshock.github.io/ko/post/2025-04-29-ebpf-backdoor-detection-framework/</loc><lastmod>2025-04-28T00:00:00Z</lastmod></url><url><loc>https://windshock.github.io/ko/post/2025-04-28-telecom-security-breach-analysis/</loc><lastmod>2025-04-28T00:00:00Z</lastmod></url><url><loc>https://windshock.github.io/ko/post/2025-04-24-cve-2019-17570-apache-xmlrpc/</loc><lastmod>2025-04-24T00:00:00Z</lastmod></url><url><loc>https://windshock.github.io/ko/post/2025-04-21-expert-personal-data-report/</loc><lastmod>2025-04-21T00:00:00Z</lastmod></url><url><loc>https://windshock.github.io/ko/post/2025-04-17-theres-no-such-thing-as-a-free-lunch-but-security-was-free/</loc><lastmod>2025-04-17T00:00:00Z</lastmod></url><url><loc>https://windshock.github.io/ko/post/2025-04-07-evil-management-manual/</loc><lastmod>2025-04-07T00:00:00Z</lastmod></url><url><loc>https://windshock.github.io/ko/post/2025-04-03-human-place-in-ai-age/</loc><lastmod>2025-04-03T00:00:00Z</lastmod></url><url><loc>https://windshock.github.io/ko/post/2025-04-01-common-security-myths-developers-tell-themselves/</loc><lastmod>2025-04-01T00:00:00Z</lastmod></url><url><loc>https://windshock.github.io/ko/post/2025-03-31-dnsmasq-ech-doh-block/</loc><lastmod>2025-03-31T00:00:00Z</lastmod></url><url><loc>https://windshock.github.io/ko/post/2025-03-28-xml-rpc-security-vulnerabilities-analysis-and-mitigation-strategies/</loc><lastmod>2025-03-28T08:39:00+09:00</lastmod></url><url><loc>https://windshock.github.io/ko/post/2024-11-05-review-of-citrix-security-policy-effectiveness/</loc><lastmod>2024-11-05T00:00:00Z</lastmod></url><url><loc>https://windshock.github.io/ko/post/2024-06-20-kpi-causes-accidents/</loc><lastmod>2024-06-20T00:00:00Z</lastmod></url><url><loc>https://windshock.github.io/ko/post/2024-06-16-common-misconceptions-of-security-assessors/</loc><lastmod>2024-06-16T00:00:00Z</lastmod></url><url><loc>https://windshock.github.io/ko/post/2024-05-22-can-development-culture-influence-security-levels/</loc><lastmod>2024-05-22T00:00:00Z</lastmod></url><url><loc>https://windshock.github.io/ko/post/2023-04-27-bypassing-citrix-policy-is-not-a-vulnerability-but-it-can-be-a-violation-of-the-law/</loc><lastmod>2023-04-27T00:00:00Z</lastmod></url><url><loc>https://windshock.github.io/ko/post/2023-04-18-strengthening-cybersecurity-through-government-ngos-and-bug-bounty-programs/</loc><lastmod>2023-04-18T00:00:00Z</lastmod></url><url><loc>https://windshock.github.io/ko/post/2019-09-03-security-threats-and-mitigation-strategies-for-java-reflection/</loc><lastmod>2019-09-03T00:00:00Z</lastmod></url><url><loc>https://windshock.github.io/ko/post/2019-08-08-about-the-xssaudit/</loc><lastmod>2019-08-08T00:00:00Z</lastmod></url></urlset>