<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://melone.co/think-like-a-hacker-a-sysadmins-guide-to-cybersecurity/</loc><lastmod>2025-08-14T22:32:26+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://melone.co/designing-secure-systems/</loc><lastmod>2025-08-09T22:28:58+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://melone.co/about-michael-melone/</loc><image:image><image:loc>https://melone.co/wp-content/uploads/2025/08/20250522_172222600_ios-1.jpeg</image:loc><image:title>20250522_172222600_iOS</image:title></image:image><image:image><image:loc>https://melone.co/wp-content/uploads/2025/08/20250522_172222600_ios.jpeg</image:loc><image:title>20250522_172222600_iOS</image:title></image:image><lastmod>2025-08-05T10:47:18+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://melone.co/2022/07/22/guest-appearance-on-the-azure-security-podcast/</loc><lastmod>2022-07-23T10:33:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://melone.co/youtube/</loc><lastmod>2022-04-28T11:16:33+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://melone.co/2022/04/25/designing-secure-systems/</loc><image:image><image:loc>https://melone.co/wp-content/uploads/2022/04/designing-secure-systems-cover.gif</image:loc><image:title>designing-secure-systems-cover</image:title></image:image><lastmod>2022-04-25T10:59:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://melone.co/2021/01/27/tracking-command-and-control-communication/</loc><lastmod>2023-07-20T03:26:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://melone.co/2020/09/01/anomaly-detection-in-microsoft-365-defender/</loc><lastmod>2021-01-25T20:47:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://melone.co/2020/10/01/ignite-2020-best-practices-for-hunting-across-domains-in-microsoft-365-defender/</loc><lastmod>2021-01-24T23:02:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://melone.co/2020/08/31/tracking-the-adversary-with-m365-defender-advanced-hunting/</loc><lastmod>2021-01-23T20:06:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://melone.co/2017/06/28/think-like-a-hacker-a-sysadmins-guide-to-cybersecurity/</loc><image:image><image:loc>https://melone.co/wp-content/uploads/2017/06/book-cover-smaller.jpg</image:loc><image:title>Book Cover - smaller</image:title></image:image><image:image><image:loc>https://melone.co/wp-content/uploads/2017/06/book-cover.jpg</image:loc><image:title>Think Like a Hacker Book Cover</image:title></image:image><lastmod>2021-01-23T13:05:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://melone.co/think-like-a-hacker-audiobook-supplement/</loc><image:image><image:loc>https://melone.co/wp-content/uploads/2018/02/access-and-authorization-figure-9.png</image:loc><image:title>Access and Authorization Figure 9</image:title></image:image><image:image><image:loc>https://melone.co/wp-content/uploads/2018/02/access-and-authorization-figure-8.png</image:loc><image:title>Access and Authorization Figure 8</image:title></image:image><image:image><image:loc>https://melone.co/wp-content/uploads/2018/02/access-and-authorization-figure-7.png</image:loc><image:title>Access and Authorization Figure 7</image:title></image:image><image:image><image:loc>https://melone.co/wp-content/uploads/2018/02/access-and-authorization-figure-6.png</image:loc><image:title>Access and Authorization Figure 6</image:title></image:image><image:image><image:loc>https://melone.co/wp-content/uploads/2018/02/access-and-authorization-figure-5.png</image:loc><image:title>Access and Authorization - Figure 5</image:title></image:image><image:image><image:loc>https://melone.co/wp-content/uploads/2018/02/vulnerability-chaining-figure-4.png</image:loc><image:title>Vulnerability Chaining Figure 4</image:title></image:image><image:image><image:loc>https://melone.co/wp-content/uploads/2018/02/vulnerability-chaining-figure-3.png</image:loc><image:title>Vulnerability Chaining Figure 3</image:title></image:image><image:image><image:loc>https://melone.co/wp-content/uploads/2018/02/vulnerability-chaining-figure-2.png</image:loc><image:title>Vulnerability Chaining Figure 2</image:title></image:image><image:image><image:loc>https://melone.co/wp-content/uploads/2018/02/vulnerability-chaining-figure-1.png</image:loc><image:title>Vulnerability Chaining Figure 1</image:title></image:image><lastmod>2018-02-09T17:48:19+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://melone.co/2017/07/10/the-password-is-dead/</loc><image:image><image:loc>https://melone.co/wp-content/uploads/2017/07/broken-lock.jpg</image:loc><image:title>broken lock</image:title></image:image><image:image><image:loc>https://melone.co/wp-content/uploads/2017/07/password-attempts2.png</image:loc><image:title>Password-Attempts2</image:title></image:image><image:image><image:loc>https://melone.co/wp-content/uploads/2017/07/password-attempts.png</image:loc><image:title>Password-Attempts</image:title></image:image><lastmod>2018-08-26T16:27:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://melone.co/2017/07/03/petya-and-wannacrypt-ransomware-propagation/</loc><image:image><image:loc>https://melone.co/wp-content/uploads/2017/07/notpetya-ransomware-696x456.jpg</image:loc><image:title>notpetya-ransomware-696x456</image:title></image:image><image:image><image:loc>https://melone.co/wp-content/uploads/2017/07/petya-worm.jpg</image:loc><image:title>Petya-Worm</image:title></image:image><image:image><image:loc>https://melone.co/wp-content/uploads/2017/07/eternalblue-worm.jpg</image:loc><image:title>EternalBlue-Worm</image:title></image:image><lastmod>2017-07-04T00:59:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://melone.co/2017/06/19/book-update-think-like-a-hacker/</loc><lastmod>2017-06-30T15:07:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://melone.co/2017/05/30/but-i-reset-the-password-remediating-an-enterprise-after-a-targeted-attack/</loc><lastmod>2017-05-30T15:42:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://melone.co/2017/05/16/understanding-ransomware-origins-evolution-and-wannacrypt/</loc><image:image><image:loc>https://melone.co/wp-content/uploads/2017/05/patch-gia-ta-windows-xp-diethese-i-microsoft-gia-na-antimetopisei-to-ransomware-wannacrypt-13-05-2017-17-40.png</image:loc><image:title>patch-gia-ta-windows-xp-diethese-i-microsoft-gia-na-antimetopisei-to-ransomware-wannacrypt-13-05-2017-17-40</image:title></image:image><lastmod>2017-05-16T15:08:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://melone.co/2017/05/09/understanding-the-intel-management-technology-vulnerability/</loc><lastmod>2017-05-09T15:04:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://melone.co/2015/02/17/understanding-and-preventing-pass-the-hash-attacks/</loc><image:image><image:loc>https://melone.co/wp-content/uploads/2015/02/metasploit-hacking-windows1.png</image:loc><image:title>metasploit-hacking-windows[1]</image:title></image:image><lastmod>2015-02-17T01:27:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://melone.co/2015/01/29/patching-and-vulnerability/</loc><lastmod>2015-01-29T16:09:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://melone.co/2015/01/24/understanding-antivirus-signatures-scans-and-schedules/</loc><image:image><image:loc>https://melone.co/wp-content/uploads/2015/01/4421_digitalchalk-online-1.jpg</image:loc><image:title>4421_digitalchalk-online-[1]</image:title></image:image><lastmod>2015-01-24T20:50:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://melone.co/2014/12/16/recovering-active-directory-after-targeted-attack-compromise/</loc><lastmod>2015-02-16T12:39:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://melone.co/2014/12/18/the-new-cold-war/</loc><lastmod>2015-01-24T16:36:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://melone.co/2014/12/22/understanding-ms14-068/</loc><lastmod>2015-01-24T16:33:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://melone.co/2015/01/08/beginning-my-first-book/</loc><lastmod>2015-01-31T13:37:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://melone.co/2015/01/21/am-i-pwned-5-simple-ways-to-help-determine-if-you-should-be-concerned-about-malware-you-discover-on-your-network/</loc><lastmod>2015-01-24T16:28:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://melone.co</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2025-08-14T22:32:26+00:00</lastmod></url></urlset>
