<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.own.security/en</loc>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en"/>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security"/>
    </url>
    <url>
        <loc>https://www.own.security</loc>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en"/>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security"/>
    </url>
    <url>
        <loc>https://www.own.security/en/about</loc>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/about"/>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/a-propos"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/a-propos"/>
    </url>
    <url>
        <loc>https://www.own.security/a-propos</loc>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/about"/>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/a-propos"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/a-propos"/>
    </url>
    <url>
        <loc>https://www.own.security/en/our-partners</loc>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/our-partners"/>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/les-partenaires"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/les-partenaires"/>
    </url>
    <url>
        <loc>https://www.own.security/les-partenaires</loc>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/our-partners"/>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/les-partenaires"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/les-partenaires"/>
    </url>
    <url>
        <loc>https://www.own.security/en/expertises/adviser</loc>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/expertises/adviser"/>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/expertises/conseil"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/expertises/conseil"/>
    </url>
    <url>
        <loc>https://www.own.security/expertises/conseil</loc>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/expertises/adviser"/>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/expertises/conseil"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/expertises/conseil"/>
    </url>
    <url>
        <loc>https://www.own.security/en/expertises/audit</loc>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/expertises/audit"/>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/expertises/audit"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/expertises/audit"/>
    </url>
    <url>
        <loc>https://www.own.security/expertises/audit</loc>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/expertises/audit"/>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/expertises/audit"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/expertises/audit"/>
    </url>
    <url>
        <loc>https://www.own.security/en/expertises/cert</loc>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/expertises/cert"/>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/expertises/cert"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/expertises/cert"/>
    </url>
    <url>
        <loc>https://www.own.security/expertises/cert</loc>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/expertises/cert"/>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/expertises/cert"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/expertises/cert"/>
    </url>
    <url>
        <loc>https://www.own.security/en/legal-notices</loc>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/legal-notices"/>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/mentions-legales"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/mentions-legales"/>
    </url>
    <url>
        <loc>https://www.own.security/mentions-legales</loc>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/legal-notices"/>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/mentions-legales"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/mentions-legales"/>
    </url>
    <url>
        <loc>https://www.own.security/en/confidentiality-policy</loc>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/confidentiality-policy"/>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/politique-de-confidentialite"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/politique-de-confidentialite"/>
    </url>
    <url>
        <loc>https://www.own.security/politique-de-confidentialite</loc>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/confidentiality-policy"/>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/politique-de-confidentialite"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/politique-de-confidentialite"/>
    </url>
    <url>
        <loc>https://www.own.security/en/report-an-incident</loc>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/report-an-incident"/>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/declarer-un-incident"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/declarer-un-incident"/>
    </url>
    <url>
        <loc>https://www.own.security/declarer-un-incident</loc>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/report-an-incident"/>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/declarer-un-incident"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/declarer-un-incident"/>
    </url>
    <url>
        <loc>https://www.own.security/en/contact</loc>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/contact"/>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/contact"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/contact"/>
    </url>
    <url>
        <loc>https://www.own.security/contact</loc>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/contact"/>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/contact"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/contact"/>
    </url>
    <url>
        <loc>https://www.own.security/en/resources</loc>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/resources"/>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/ressources"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/ressources"/>
    </url>
    <url>
        <loc>https://www.own.security/ressources</loc>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/resources"/>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/ressources"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/ressources"/>
    </url>
    <url>
        <loc>https://www.own.security/en/ressources/news</loc>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/ressources/news"/>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/ressources/actualites"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/ressources/actualites"/>
    </url>
    <url>
        <loc>https://www.own.security/ressources/actualites</loc>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/ressources/news"/>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/ressources/actualites"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/ressources/actualites"/>
    </url>
    <url>
        <loc>https://www.own.security/en/ressources/blog</loc>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/ressources/blog"/>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/ressources/blog"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/ressources/blog"/>
    </url>
    <url>
        <loc>https://www.own.security/ressources/blog</loc>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/ressources/blog"/>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/ressources/blog"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/ressources/blog"/>
    </url>
    <url>
        <loc>https://www.own.security/en/ressources/analysis</loc>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/ressources/analysis"/>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/ressources/analyses"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/ressources/analyses"/>
    </url>
    <url>
        <loc>https://www.own.security/ressources/analyses</loc>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/ressources/analysis"/>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/ressources/analyses"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/ressources/analyses"/>
    </url>
    <url>
        <loc>https://www.own.security/en/offers/incident-response</loc>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/offers/incident-response"/>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/offres/reponse-incident"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/offres/reponse-incident"/>
    </url>
    <url>
        <loc>https://www.own.security/offres/reponse-incident</loc>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/offers/incident-response"/>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/offres/reponse-incident"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/offres/reponse-incident"/>
    </url>
    <url>
        <loc>https://www.own.security/en/offers/outsourced-rssi</loc>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/offers/outsourced-rssi"/>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/offres/rssi-externalise"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/offres/rssi-externalise"/>
    </url>
    <url>
        <loc>https://www.own.security/offres/rssi-externalise</loc>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/offers/outsourced-rssi"/>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/offres/rssi-externalise"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/offres/rssi-externalise"/>
    </url>
    <url>
        <loc>https://www.own.security/en/offers/safety-assessment</loc>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/offers/safety-assessment"/>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/offres/evaluation-securite"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/offres/evaluation-securite"/>
    </url>
    <url>
        <loc>https://www.own.security/offres/evaluation-securite</loc>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/offers/safety-assessment"/>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/offres/evaluation-securite"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/offres/evaluation-securite"/>
    </url>
    <url>
        <loc>https://www.own.security/en/offers/analyse-de-la-menace</loc>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/offers/analyse-de-la-menace"/>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/offres/analyse-de-la-menace"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/offres/analyse-de-la-menace"/>
    </url>
    <url>
        <loc>https://www.own.security/offres/analyse-de-la-menace</loc>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/offers/analyse-de-la-menace"/>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/offres/analyse-de-la-menace"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/offres/analyse-de-la-menace"/>
    </url>
    <url>
        <loc>https://www.own.security/en/offers/soc-managed</loc>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/offers/soc-managed"/>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/offres/soc-manage"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/offres/soc-manage"/>
    </url>
    <url>
        <loc>https://www.own.security/offres/soc-manage</loc>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/offers/soc-managed"/>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/offres/soc-manage"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/offres/soc-manage"/>
    </url>
    <url>
        <loc>https://www.own.security/ressources/actualites/cyberattaques-nous-avons-trouve-les-donnees-volees-tf1-jt-20h</loc>
    </url>
    <url>
        <loc>https://www.own.security/ressources/actualites/nomination-daddoulaye-fadiga-au-poste-de-chief-executive-officer</loc>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/ressources/actualites/nomination-daddoulaye-fadiga-au-poste-de-chief-executive-officer"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/ressources/actualites/nomination-daddoulaye-fadiga-au-poste-de-chief-executive-officer"/>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/ressources/news/own-appoints-abdoulaye-fadiga-as-chief-executive-officer"/>
    </url>
    <url>
        <loc>https://www.own.security/en/ressources/news/own-appoints-abdoulaye-fadiga-as-chief-executive-officer</loc>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/ressources/actualites/nomination-daddoulaye-fadiga-au-poste-de-chief-executive-officer"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/ressources/actualites/nomination-daddoulaye-fadiga-au-poste-de-chief-executive-officer"/>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/ressources/news/own-appoints-abdoulaye-fadiga-as-chief-executive-officer"/>
    </url>
    <url>
        <loc>https://www.own.security/ressources/actualites/own-and-france-cyber-maritime-devoilent-le-premier-panorama-de-la-cyber-maritime</loc>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/ressources/actualites/own-and-france-cyber-maritime-devoilent-le-premier-panorama-de-la-cyber-maritime"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/ressources/actualites/own-and-france-cyber-maritime-devoilent-le-premier-panorama-de-la-cyber-maritime"/>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/ressources/news/own-and-france-cyber-maritime-devoilent-le-premier-panorama-de-la-cyber-maritime"/>
    </url>
    <url>
        <loc>https://www.own.security/en/ressources/news/own-and-france-cyber-maritime-devoilent-le-premier-panorama-de-la-cyber-maritime</loc>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/ressources/actualites/own-and-france-cyber-maritime-devoilent-le-premier-panorama-de-la-cyber-maritime"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/ressources/actualites/own-and-france-cyber-maritime-devoilent-le-premier-panorama-de-la-cyber-maritime"/>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/ressources/news/own-and-france-cyber-maritime-devoilent-le-premier-panorama-de-la-cyber-maritime"/>
    </url>
    <url>
        <loc>https://www.own.security/ressources/actualites/un-acteur-francais-independant-specialise-dans-les-services-en-cybersecurite</loc>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/ressources/actualites/un-acteur-francais-independant-specialise-dans-les-services-en-cybersecurite"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/ressources/actualites/un-acteur-francais-independant-specialise-dans-les-services-en-cybersecurite"/>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/ressources/news/un-acteur-francais-independant-specialise-dans-les-services-en-cybersecurite"/>
    </url>
    <url>
        <loc>https://www.own.security/en/ressources/news/un-acteur-francais-independant-specialise-dans-les-services-en-cybersecurite</loc>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/ressources/actualites/un-acteur-francais-independant-specialise-dans-les-services-en-cybersecurite"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/ressources/actualites/un-acteur-francais-independant-specialise-dans-les-services-en-cybersecurite"/>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/ressources/news/un-acteur-francais-independant-specialise-dans-les-services-en-cybersecurite"/>
    </url>
    <url>
        <loc>https://www.own.security/ressources/blog/3-tendances-a-retenir-suite-a-la-cyberattaque-qui-a-perturbe-la-distribution-de-plusieurs-quotidiens-americains</loc>
    </url>
    <url>
        <loc>https://www.own.security/ressources/blog/50-shades-of-bulletproof-hosting-bph-landscape-on-russian-language-cybercrime-forums</loc>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/ressources/blog/50-shades-of-bulletproof-hosting-bph-landscape-on-russian-language-cybercrime-forums"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/ressources/blog/50-shades-of-bulletproof-hosting-bph-landscape-on-russian-language-cybercrime-forums"/>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/ressources/blog/50-shades-of-bulletproof-hosting-bph-landscape-on-russian-language-cybercrime-forums"/>
    </url>
    <url>
        <loc>https://www.own.security/en/ressources/blog/50-shades-of-bulletproof-hosting-bph-landscape-on-russian-language-cybercrime-forums</loc>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/ressources/blog/50-shades-of-bulletproof-hosting-bph-landscape-on-russian-language-cybercrime-forums"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/ressources/blog/50-shades-of-bulletproof-hosting-bph-landscape-on-russian-language-cybercrime-forums"/>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/ressources/blog/50-shades-of-bulletproof-hosting-bph-landscape-on-russian-language-cybercrime-forums"/>
    </url>
    <url>
        <loc>https://www.own.security/ressources/blog/alicem-au-pays-de-lidentite-numerique</loc>
    </url>
    <url>
        <loc>https://www.own.security/ressources/blog/analyser-une-compromission-via-l-adcs</loc>
    </url>
    <url>
        <loc>https://www.own.security/ressources/blog/apt20-the-limits-of-mfa-exposed-by-a-chinese-hacker-group</loc>
    </url>
    <url>
        <loc>https://www.own.security/ressources/blog/artefacts-de-fluctuation-memoire</loc>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/ressources/blog/artefacts-de-fluctuation-memoire"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/ressources/blog/artefacts-de-fluctuation-memoire"/>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/ressources/blog/artefacts-de-fluctuation-memoire"/>
    </url>
    <url>
        <loc>https://www.own.security/en/ressources/blog/artefacts-de-fluctuation-memoire</loc>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/ressources/blog/artefacts-de-fluctuation-memoire"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/ressources/blog/artefacts-de-fluctuation-memoire"/>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/ressources/blog/artefacts-de-fluctuation-memoire"/>
    </url>
    <url>
        <loc>https://www.own.security/ressources/blog/augmented-soc----how-to-rethink-your-security-center</loc>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/ressources/blog/augmented-soc----how-to-rethink-your-security-center"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/ressources/blog/augmented-soc----how-to-rethink-your-security-center"/>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/ressources/blog/augmented-soc----how-to-rethink-your-security-center"/>
    </url>
    <url>
        <loc>https://www.own.security/en/ressources/blog/augmented-soc----how-to-rethink-your-security-center</loc>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/ressources/blog/augmented-soc----how-to-rethink-your-security-center"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/ressources/blog/augmented-soc----how-to-rethink-your-security-center"/>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/ressources/blog/augmented-soc----how-to-rethink-your-security-center"/>
    </url>
    <url>
        <loc>https://www.own.security/ressources/blog/ces-fuites-qui-destabilisent-des-groupes-dattaquants-informatiques-iraniens</loc>
    </url>
    <url>
        <loc>https://www.own.security/ressources/blog/click-clock-analyse-des-ttps-du-ransomware-cloak</loc>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/ressources/blog/click-clock-analyse-des-ttps-du-ransomware-cloak"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/ressources/blog/click-clock-analyse-des-ttps-du-ransomware-cloak"/>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/ressources/blog/click-clock-analyse-des-ttps-du-ransomware-cloak"/>
    </url>
    <url>
        <loc>https://www.own.security/en/ressources/blog/click-clock-analyse-des-ttps-du-ransomware-cloak</loc>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/ressources/blog/click-clock-analyse-des-ttps-du-ransomware-cloak"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/ressources/blog/click-clock-analyse-des-ttps-du-ransomware-cloak"/>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/ressources/blog/click-clock-analyse-des-ttps-du-ransomware-cloak"/>
    </url>
    <url>
        <loc>https://www.own.security/ressources/blog/cloud-act-entre-mythes-et-realites</loc>
    </url>
    <url>
        <loc>https://www.own.security/ressources/blog/coa-faire-en-cas-dintrusion</loc>
    </url>
    <url>
        <loc>https://www.own.security/ressources/blog/cve-2024-40711-logs-analysis</loc>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/ressources/blog/cve-2024-40711-logs-analysis"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/ressources/blog/cve-2024-40711-logs-analysis"/>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/ressources/blog/cve-2024-40711-logs-analysis"/>
    </url>
    <url>
        <loc>https://www.own.security/en/ressources/blog/cve-2024-40711-logs-analysis</loc>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/ressources/blog/cve-2024-40711-logs-analysis"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/ressources/blog/cve-2024-40711-logs-analysis"/>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/ressources/blog/cve-2024-40711-logs-analysis"/>
    </url>
    <url>
        <loc>https://www.own.security/ressources/blog/cybersecurity-skills-shortage-4-advices-to-better-deal-with-it</loc>
    </url>
    <url>
        <loc>https://www.own.security/ressources/blog/decryptage-des-operations-informationnelles-russes-a-travers-les-outils-et-methodes-de-la-cti</loc>
    </url>
    <url>
        <loc>https://www.own.security/ressources/blog/dernieres-evolutions-de-mitre-att-ck</loc>
    </url>
    <url>
        <loc>https://www.own.security/ressources/blog/dora-tests-penatration-fondes-sur-la-menace-tlpt</loc>
    </url>
    <url>
        <loc>https://www.own.security/ressources/blog/etat-de-lart-de-la-compromission-dun-environnement-ad-cs-esc2-esc8</loc>
    </url>
    <url>
        <loc>https://www.own.security/ressources/blog/etat-de-lart-de-la-compromission-dun-environnement-ad-cs-partie-1</loc>
    </url>
    <url>
        <loc>https://www.own.security/ressources/blog/etat-de-lart-de-la-compromission-dun-environnement-ad-cs-partie-3</loc>
    </url>
    <url>
        <loc>https://www.own.security/ressources/blog/etats-unis-vs-iran-bataille-navale-a-lheure-du-cyberespace</loc>
    </url>
    <url>
        <loc>https://www.own.security/ressources/blog/europe----tentative-dingerence-a-lapproche-des-elections-europeennes</loc>
    </url>
    <url>
        <loc>https://www.own.security/ressources/blog/fastir-forti</loc>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/ressources/blog/fastir-forti"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/ressources/blog/fastir-forti"/>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/ressources/blog/fastir-forti"/>
    </url>
    <url>
        <loc>https://www.own.security/en/ressources/blog/fastir-forti</loc>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/ressources/blog/fastir-forti"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/ressources/blog/fastir-forti"/>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/ressources/blog/fastir-forti"/>
    </url>
    <url>
        <loc>https://www.own.security/ressources/blog/focus-adversaire-muddywater</loc>
    </url>
    <url>
        <loc>https://www.own.security/ressources/blog/fortiweb-cve-2025-25257--comprendre-les-artefacts-numeriques</loc>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/ressources/blog/fortiweb-cve-2025-25257--comprendre-les-artefacts-numeriques"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/ressources/blog/fortiweb-cve-2025-25257--comprendre-les-artefacts-numeriques"/>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/ressources/blog/fortiweb-cve-2025-25257-understanding-forensic-artifacts"/>
    </url>
    <url>
        <loc>https://www.own.security/en/ressources/blog/fortiweb-cve-2025-25257-understanding-forensic-artifacts</loc>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/ressources/blog/fortiweb-cve-2025-25257--comprendre-les-artefacts-numeriques"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/ressources/blog/fortiweb-cve-2025-25257--comprendre-les-artefacts-numeriques"/>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/ressources/blog/fortiweb-cve-2025-25257-understanding-forensic-artifacts"/>
    </url>
    <url>
        <loc>https://www.own.security/ressources/blog/freebsd-support-in-volatility3</loc>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/ressources/blog/freebsd-support-in-volatility3"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/ressources/blog/freebsd-support-in-volatility3"/>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/ressources/blog/freebsd-support-in-volatility3"/>
    </url>
    <url>
        <loc>https://www.own.security/en/ressources/blog/freebsd-support-in-volatility3</loc>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/ressources/blog/freebsd-support-in-volatility3"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/ressources/blog/freebsd-support-in-volatility3"/>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/ressources/blog/freebsd-support-in-volatility3"/>
    </url>
    <url>
        <loc>https://www.own.security/ressources/blog/google-workspace-malicious-app-script-analysis</loc>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/ressources/blog/google-workspace-malicious-app-script-analysis"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/ressources/blog/google-workspace-malicious-app-script-analysis"/>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/ressources/blog/google-workspace-malicious-app-script-analysis"/>
    </url>
    <url>
        <loc>https://www.own.security/en/ressources/blog/google-workspace-malicious-app-script-analysis</loc>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/ressources/blog/google-workspace-malicious-app-script-analysis"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/ressources/blog/google-workspace-malicious-app-script-analysis"/>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/ressources/blog/google-workspace-malicious-app-script-analysis"/>
    </url>
    <url>
        <loc>https://www.own.security/ressources/blog/huawei-vs-usa-un-frein-au-deploiement-de-la-5g-dans-le-monde</loc>
    </url>
    <url>
        <loc>https://www.own.security/ressources/blog/i-ate-your-familys-rice-unmasking-space-pirates-hacker</loc>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/ressources/blog/i-ate-your-familys-rice-unmasking-space-pirates-hacker"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/ressources/blog/i-ate-your-familys-rice-unmasking-space-pirates-hacker"/>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/ressources/blog/i-ate-your-familys-rice-unmasking-space-pirates-hacker"/>
    </url>
    <url>
        <loc>https://www.own.security/en/ressources/blog/i-ate-your-familys-rice-unmasking-space-pirates-hacker</loc>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/ressources/blog/i-ate-your-familys-rice-unmasking-space-pirates-hacker"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/ressources/blog/i-ate-your-familys-rice-unmasking-space-pirates-hacker"/>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/ressources/blog/i-ate-your-familys-rice-unmasking-space-pirates-hacker"/>
    </url>
    <url>
        <loc>https://www.own.security/ressources/blog/iacd-and-the-quest-for-an-orchestrated-cyber-defense</loc>
    </url>
    <url>
        <loc>https://www.own.security/ressources/blog/improve-soc-efficiency-with-soar-systems</loc>
    </url>
    <url>
        <loc>https://www.own.security/ressources/blog/insomnihack-2026---golden-payout</loc>
    </url>
    <url>
        <loc>https://www.own.security/ressources/blog/insomnihack-exploiting-android-ipc-with-one-way-transaction-bypass</loc>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/ressources/blog/insomnihack-exploiting-android-ipc-with-one-way-transaction-bypass"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/ressources/blog/insomnihack-exploiting-android-ipc-with-one-way-transaction-bypass"/>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/ressources/blog/insomnihack-exploiting-android-ipc-with-one-way-transaction-bypass"/>
    </url>
    <url>
        <loc>https://www.own.security/en/ressources/blog/insomnihack-exploiting-android-ipc-with-one-way-transaction-bypass</loc>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/ressources/blog/insomnihack-exploiting-android-ipc-with-one-way-transaction-bypass"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/ressources/blog/insomnihack-exploiting-android-ipc-with-one-way-transaction-bypass"/>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/ressources/blog/insomnihack-exploiting-android-ipc-with-one-way-transaction-bypass"/>
    </url>
    <url>
        <loc>https://www.own.security/ressources/blog/introduction-to-stix-and-taxii</loc>
    </url>
    <url>
        <loc>https://www.own.security/ressources/blog/iran----designation-des-gardiens-de-la-revolution-islamique-comme-organisation-terroriste-par-les-etats-unis-impact-en-matiere-de-cybermenaces</loc>
    </url>
    <url>
        <loc>https://www.own.security/ressources/blog/le-cycle-du-renseignement-applique-a-la-cyber-threat-intelligence</loc>
    </url>
    <url>
        <loc>https://www.own.security/ressources/blog/le-dbir-du-monde-davant</loc>
    </url>
    <url>
        <loc>https://www.own.security/ressources/blog/le-marche-complexe-des-assurances-cyber</loc>
    </url>
    <url>
        <loc>https://www.own.security/ressources/blog/le-modele-en-diamant</loc>
    </url>
    <url>
        <loc>https://www.own.security/ressources/blog/le-phishing-dans-lunivers-dazterix</loc>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/ressources/blog/le-phishing-dans-lunivers-dazterix"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/ressources/blog/le-phishing-dans-lunivers-dazterix"/>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/ressources/blog/le-phishing-dans-lunivers-dazterix"/>
    </url>
    <url>
        <loc>https://www.own.security/en/ressources/blog/le-phishing-dans-lunivers-dazterix</loc>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/ressources/blog/le-phishing-dans-lunivers-dazterix"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/ressources/blog/le-phishing-dans-lunivers-dazterix"/>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/ressources/blog/le-phishing-dans-lunivers-dazterix"/>
    </url>
    <url>
        <loc>https://www.own.security/ressources/blog/lentree-en-vigueur-du-deuxieme-volet-de-la-dsp2-vers-la-securisation-des-fintechs</loc>
    </url>
    <url>
        <loc>https://www.own.security/ressources/blog/les-10-commandements-de-la-threat-intelligence-chez-own</loc>
    </url>
    <url>
        <loc>https://www.own.security/ressources/blog/les-campagnes-de-manipulation-de-linformation-a-travers-le-modele-en-diamant</loc>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/ressources/blog/les-campagnes-de-manipulation-de-linformation-a-travers-le-modele-en-diamant"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/ressources/blog/les-campagnes-de-manipulation-de-linformation-a-travers-le-modele-en-diamant"/>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/ressources/blog/thinking-about-information-manipulation-campaigns-through-the-diamond-model"/>
    </url>
    <url>
        <loc>https://www.own.security/en/ressources/blog/thinking-about-information-manipulation-campaigns-through-the-diamond-model</loc>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/ressources/blog/les-campagnes-de-manipulation-de-linformation-a-travers-le-modele-en-diamant"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/ressources/blog/les-campagnes-de-manipulation-de-linformation-a-travers-le-modele-en-diamant"/>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/ressources/blog/thinking-about-information-manipulation-campaigns-through-the-diamond-model"/>
    </url>
    <url>
        <loc>https://www.own.security/ressources/blog/les-nomines-pour-le-cesar-de-la-meilleure-vulnerabilite-sont</loc>
    </url>
    <url>
        <loc>https://www.own.security/ressources/blog/les-travaux-de-recherche-pour-la-mise-au-point-dun-vaccin-contre-le-covid-19-cibles-par-des-campagnes-de-cyberespionnage-etatiques</loc>
    </url>
    <url>
        <loc>https://www.own.security/ressources/blog/mitre-att-ck-2020-et-maintenant-des-sous-techniques</loc>
    </url>
    <url>
        <loc>https://www.own.security/ressources/blog/mitre-att-ck-le-nouveau-standard-de-modelisation-des-attaques-informatiques</loc>
    </url>
    <url>
        <loc>https://www.own.security/ressources/blog/moving-your-security-to-the-cloud</loc>
    </url>
    <url>
        <loc>https://www.own.security/ressources/blog/petit-glossaire-de-la-threat-intelligence</loc>
    </url>
    <url>
        <loc>https://www.own.security/ressources/blog/pourquoi-la-libra-est-elle-si-controversee</loc>
    </url>
    <url>
        <loc>https://www.own.security/ressources/blog/powershell-usages-offensifs-et-opportunites-defensives-1-3</loc>
    </url>
    <url>
        <loc>https://www.own.security/ressources/blog/probiv-an-illegal-service-used-for-many-purposes-by-russian-speaking-actors</loc>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/ressources/blog/probiv-an-illegal-service-used-for-many-purposes-by-russian-speaking-actors"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/ressources/blog/probiv-an-illegal-service-used-for-many-purposes-by-russian-speaking-actors"/>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/ressources/blog/probiv-an-illegal-service-used-for-many-purposes-by-russian-speaking-actors"/>
    </url>
    <url>
        <loc>https://www.own.security/en/ressources/blog/probiv-an-illegal-service-used-for-many-purposes-by-russian-speaking-actors</loc>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/ressources/blog/probiv-an-illegal-service-used-for-many-purposes-by-russian-speaking-actors"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/ressources/blog/probiv-an-illegal-service-used-for-many-purposes-by-russian-speaking-actors"/>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/ressources/blog/probiv-an-illegal-service-used-for-many-purposes-by-russian-speaking-actors"/>
    </url>
    <url>
        <loc>https://www.own.security/ressources/blog/quid-des-consequences-du-brexit-pour-les-entreprises-effectuant-des-transferts-de-donnees-a-caractere-personnel-depuis-ou-vers-le-royaume-uni</loc>
    </url>
    <url>
        <loc>https://www.own.security/ressources/blog/reduce-cyber-risks-through-automation</loc>
    </url>
    <url>
        <loc>https://www.own.security/ressources/blog/retour-a-la-case-antitrust-pour-google</loc>
    </url>
    <url>
        <loc>https://www.own.security/ressources/blog/retour-sur-laffaire-facebook----cambridge-analytica</loc>
    </url>
    <url>
        <loc>https://www.own.security/ressources/blog/retrospective-decisions-rendues-par-les-apd-europeennes-depuis-lentree-en-vigueur-du-rgpd-1-2</loc>
    </url>
    <url>
        <loc>https://www.own.security/ressources/blog/retrospective-decisions-rendues-par-les-apd-europeennes-depuis-lentree-en-vigueur-du-rgpd-2-2</loc>
    </url>
    <url>
        <loc>https://www.own.security/ressources/blog/russian-language-cybercriminal-forums---chapter-i-an-excursion-into-the-core-of-the-underground-ecosystem</loc>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/ressources/blog/russian-language-cybercriminal-forums---chapter-i-an-excursion-into-the-core-of-the-underground-ecosystem"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/ressources/blog/russian-language-cybercriminal-forums---chapter-i-an-excursion-into-the-core-of-the-underground-ecosystem"/>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/ressources/blog/russian-language-cybercriminal-forums---chapter-i-an-excursion-into-the-core-of-the-underground-ecosystem"/>
    </url>
    <url>
        <loc>https://www.own.security/en/ressources/blog/russian-language-cybercriminal-forums---chapter-i-an-excursion-into-the-core-of-the-underground-ecosystem</loc>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/ressources/blog/russian-language-cybercriminal-forums---chapter-i-an-excursion-into-the-core-of-the-underground-ecosystem"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/ressources/blog/russian-language-cybercriminal-forums---chapter-i-an-excursion-into-the-core-of-the-underground-ecosystem"/>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/ressources/blog/russian-language-cybercriminal-forums---chapter-i-an-excursion-into-the-core-of-the-underground-ecosystem"/>
    </url>
    <url>
        <loc>https://www.own.security/ressources/blog/russian-language-cybercriminal-forums---chapter-ii-steep-investments-and-hefty-profits</loc>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/ressources/blog/russian-language-cybercriminal-forums---chapter-ii-steep-investments-and-hefty-profits"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/ressources/blog/russian-language-cybercriminal-forums---chapter-ii-steep-investments-and-hefty-profits"/>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/ressources/blog/russian-language-cybercriminal-forums---chapter-ii-steep-investments-and-hefty-profits"/>
    </url>
    <url>
        <loc>https://www.own.security/en/ressources/blog/russian-language-cybercriminal-forums---chapter-ii-steep-investments-and-hefty-profits</loc>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/ressources/blog/russian-language-cybercriminal-forums---chapter-ii-steep-investments-and-hefty-profits"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/ressources/blog/russian-language-cybercriminal-forums---chapter-ii-steep-investments-and-hefty-profits"/>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/ressources/blog/russian-language-cybercriminal-forums---chapter-ii-steep-investments-and-hefty-profits"/>
    </url>
    <url>
        <loc>https://www.own.security/ressources/blog/russian-language-cybercriminal-forums---chapter-iii-analyzing-the-most-active-and-renowned-communities-english-only</loc>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/ressources/blog/russian-language-cybercriminal-forums---chapter-iii-analyzing-the-most-active-and-renowned-communities-english-only"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/ressources/blog/russian-language-cybercriminal-forums---chapter-iii-analyzing-the-most-active-and-renowned-communities-english-only"/>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/ressources/blog/russian-language-cybercriminal-forums---chapter-iii-analyzing-the-most-active-and-renowned-communities-english-only"/>
    </url>
    <url>
        <loc>https://www.own.security/en/ressources/blog/russian-language-cybercriminal-forums---chapter-iii-analyzing-the-most-active-and-renowned-communities-english-only</loc>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/ressources/blog/russian-language-cybercriminal-forums---chapter-iii-analyzing-the-most-active-and-renowned-communities-english-only"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/ressources/blog/russian-language-cybercriminal-forums---chapter-iii-analyzing-the-most-active-and-renowned-communities-english-only"/>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/ressources/blog/russian-language-cybercriminal-forums---chapter-iii-analyzing-the-most-active-and-renowned-communities-english-only"/>
    </url>
    <url>
        <loc>https://www.own.security/ressources/blog/the-pyramid-of-pain-ou-lechelle-de-la-cyber-douleur</loc>
    </url>
    <url>
        <loc>https://www.own.security/ressources/blog/un-nouvel-as-pour-doppelganger</loc>
    </url>
    <url>
        <loc>https://www.own.security/ressources/blog/vers-une-nouvelle-utilisation-du-ransomware-par-des-acteurs-etatiques</loc>
    </url>
    <url>
        <loc>https://www.own.security/ressources/blog/wirte-analyse-campagne-cyber-own-cert</loc>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/ressources/blog/wirte-analyse-campagne-cyber-own-cert"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/ressources/blog/wirte-analyse-campagne-cyber-own-cert"/>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/ressources/blog/wirte-analyse-campagne-cyber-own-cert"/>
    </url>
    <url>
        <loc>https://www.own.security/en/ressources/blog/wirte-analyse-campagne-cyber-own-cert</loc>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/ressources/blog/wirte-analyse-campagne-cyber-own-cert"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/ressources/blog/wirte-analyse-campagne-cyber-own-cert"/>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/ressources/blog/wirte-analyse-campagne-cyber-own-cert"/>
    </url>
    <url>
        <loc>https://www.own.security/ressources/analyses/coriin-2026---memory-fluctuation-an-advanced-evasion-technique</loc>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/ressources/analyses/coriin-2026---memory-fluctuation-an-advanced-evasion-technique"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/ressources/analyses/coriin-2026---memory-fluctuation-an-advanced-evasion-technique"/>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/ressources/analysis/coriin-2026---memory-fluctuation-an-advanced-evasion-technique"/>
    </url>
    <url>
        <loc>https://www.own.security/en/ressources/analysis/coriin-2026---memory-fluctuation-an-advanced-evasion-technique</loc>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/ressources/analyses/coriin-2026---memory-fluctuation-an-advanced-evasion-technique"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/ressources/analyses/coriin-2026---memory-fluctuation-an-advanced-evasion-technique"/>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/ressources/analysis/coriin-2026---memory-fluctuation-an-advanced-evasion-technique"/>
    </url>
    <url>
        <loc>https://www.own.security/en/ressources/analysis/cyber-conflict-observatory-and-maritime-conflict-theaters</loc>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/ressources/analysis/cyber-conflict-observatory-and-maritime-conflict-theaters"/>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/ressources/analyses/observatoire-des-cyberconflits-et-theatres-doperations-maritimes"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/ressources/analyses/observatoire-des-cyberconflits-et-theatres-doperations-maritimes"/>
    </url>
    <url>
        <loc>https://www.own.security/ressources/analyses/observatoire-des-cyberconflits-et-theatres-doperations-maritimes</loc>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/ressources/analysis/cyber-conflict-observatory-and-maritime-conflict-theaters"/>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/ressources/analyses/observatoire-des-cyberconflits-et-theatres-doperations-maritimes"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/ressources/analyses/observatoire-des-cyberconflits-et-theatres-doperations-maritimes"/>
    </url>
    <url>
        <loc>https://www.own.security/en/ressources/analysis/cyber-threat-summary-for-the-defense-sector-2024</loc>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/ressources/analysis/cyber-threat-summary-for-the-defense-sector-2024"/>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/ressources/analyses/resume-des-cybermenaces-du-secteur-de-la-defense-2024"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/ressources/analyses/resume-des-cybermenaces-du-secteur-de-la-defense-2024"/>
    </url>
    <url>
        <loc>https://www.own.security/ressources/analyses/resume-des-cybermenaces-du-secteur-de-la-defense-2024</loc>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/ressources/analysis/cyber-threat-summary-for-the-defense-sector-2024"/>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/ressources/analyses/resume-des-cybermenaces-du-secteur-de-la-defense-2024"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/ressources/analyses/resume-des-cybermenaces-du-secteur-de-la-defense-2024"/>
    </url>
    <url>
        <loc>https://www.own.security/ressources/analyses/forms-of-the-israel-hamas-conflict-in-cyberspace</loc>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/ressources/analyses/forms-of-the-israel-hamas-conflict-in-cyberspace"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/ressources/analyses/forms-of-the-israel-hamas-conflict-in-cyberspace"/>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/ressources/analysis/forms-of-the-israel-hamas-conflict-in-cyberspace"/>
    </url>
    <url>
        <loc>https://www.own.security/en/ressources/analysis/forms-of-the-israel-hamas-conflict-in-cyberspace</loc>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/ressources/analyses/forms-of-the-israel-hamas-conflict-in-cyberspace"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/ressources/analyses/forms-of-the-israel-hamas-conflict-in-cyberspace"/>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/ressources/analysis/forms-of-the-israel-hamas-conflict-in-cyberspace"/>
    </url>
    <url>
        <loc>https://www.own.security/ressources/analyses/manipulations-de-linformation-pendant-les-jeux-olympiques-et-paralympiques-2024</loc>
    </url>
    <url>
        <loc>https://www.own.security/en/ressources/analysis/maritime-cyberthreat-landscape-2023</loc>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/ressources/analysis/maritime-cyberthreat-landscape-2023"/>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/ressources/analyses/panorama-de-la-cybermenace-maritime-2023"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/ressources/analyses/panorama-de-la-cybermenace-maritime-2023"/>
    </url>
    <url>
        <loc>https://www.own.security/ressources/analyses/panorama-de-la-cybermenace-maritime-2023</loc>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/ressources/analysis/maritime-cyberthreat-landscape-2023"/>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/ressources/analyses/panorama-de-la-cybermenace-maritime-2023"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/ressources/analyses/panorama-de-la-cybermenace-maritime-2023"/>
    </url>
    <url>
        <loc>https://www.own.security/ressources/analyses/maritime-cyberthreat-panorama-2022</loc>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/ressources/analyses/maritime-cyberthreat-panorama-2022"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/ressources/analyses/maritime-cyberthreat-panorama-2022"/>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/ressources/analysis/maritime-cyberthreat-panorama-2022"/>
    </url>
    <url>
        <loc>https://www.own.security/en/ressources/analysis/maritime-cyberthreat-panorama-2022</loc>
        <xhtml:link rel="alternate" hreflang="fr" href="https://www.own.security/ressources/analyses/maritime-cyberthreat-panorama-2022"/>
        <xhtml:link rel="alternate" hreflang="x-default" href="https://www.own.security/ressources/analyses/maritime-cyberthreat-panorama-2022"/>
        <xhtml:link rel="alternate" hreflang="en" href="https://www.own.security/en/ressources/analysis/maritime-cyberthreat-panorama-2022"/>
    </url>
    <url>
        <loc>https://www.own.security/ressources/analyses/panorama-des-menaces-cyber-de-lindustrie-agroalimentaire-2024-2025</loc>
    </url>
</urlset>