<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
<url><loc>https://denniskanaafi.com/</loc><changefreq>daily</changefreq><priority>1.0</priority></url><url><loc>https://denniskanaafi.com/projects/</loc><changefreq>daily</changefreq><priority>1.0</priority></url><url><loc>https://denniskanaafi.com/blog/</loc><changefreq>daily</changefreq><priority>1.0</priority></url><url><loc>https://denniskanaafi.com/blog/post/typosquatting-the-invisible-trap-you-click-without-noticing/</loc><lastmod>2026-01-21</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://denniskanaafi.com/blog/post/email-tracking-pixels-explained-how-emails-track-you/</loc><lastmod>2026-01-20</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://denniskanaafi.com/blog/post/understanding-mitre-frameworks-attck-car-and-d3fend-explained/</loc><lastmod>2026-01-09</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://denniskanaafi.com/blog/post/understanding-the-cyber-kill-chain-how-attacks-progress-step-by-step/</loc><lastmod>2026-01-07</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://denniskanaafi.com/blog/post/are-soc-analysts-still-needed-in-the-age-of-soar/</loc><lastmod>2026-01-05</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://denniskanaafi.com/blog/post/getting-started-with-splunk-siem-components-searching-and-first-lab/</loc><lastmod>2026-01-04</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://denniskanaafi.com/blog/post/understanding-siem-how-analysts-make-sense-of-logs-at-scale/</loc><lastmod>2026-01-04</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://denniskanaafi.com/blog/post/understanding-endpoint-detection-and-response-edr/</loc><lastmod>2026-01-03</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://denniskanaafi.com/blog/post/the-human-factor-why-social-engineering-bypasses-the-strongest-cybersecurity/</loc><lastmod>2025-12-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://denniskanaafi.com/blog/post/why-automation-is-the-future-of-cybersecurity-engineering/</loc><lastmod>2025-12-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://denniskanaafi.com/blog/post/mastering-soc-analysis-with-wazuh-insights-from-dennis-kojo-anaafi/</loc><lastmod>2025-12-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://denniskanaafi.com/project/cyber-security-workflow-automation-dashboard/</loc><lastmod>2025-12-30</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://denniskanaafi.com/project/soc-automation-lab-dennis-kojo-anaafi-edition/</loc><lastmod>2025-12-30</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
</urlset>
