<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://astraqcyberdefence.com</loc>
<lastmod>2026-04-03T14:57:38.398Z</lastmod>
<changefreq>weekly</changefreq>
<priority>1</priority>
</url>
<url>
<loc>https://astraqcyberdefence.com/blog</loc>
<lastmod>2026-04-03T14:57:38.398Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://astraqcyberdefence.com/open-source</loc>
<lastmod>2026-04-03T14:57:38.398Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://astraqcyberdefence.com/case-studies</loc>
<lastmod>2026-04-03T14:57:38.398Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://astraqcyberdefence.com/privacy</loc>
<lastmod>2026-04-03T14:57:38.398Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.3</priority>
</url>
<url>
<loc>https://astraqcyberdefence.com/terms</loc>
<lastmod>2026-04-03T14:57:38.398Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.3</priority>
</url>
<url>
<loc>https://astraqcyberdefence.com/open-source/brahmastra-osint-tool</loc>
<lastmod>2026-04-03T14:57:38.398Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://astraqcyberdefence.com/blog/mobile-phishing-attack-vectors-2026</loc>
<lastmod>2026-04-03T14:57:38.398Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://astraqcyberdefence.com/blog/ai-threat-detection-vs-rule-based-security</loc>
<lastmod>2026-04-03T14:57:38.398Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://astraqcyberdefence.com/blog/alternative-pqc-frameworks</loc>
<lastmod>2026-04-03T14:57:38.398Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://astraqcyberdefence.com/blog/lattice-based-cryptography</loc>
<lastmod>2026-04-03T14:57:38.398Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://astraqcyberdefence.com/blog/os2-interpolation</loc>
<lastmod>2026-04-03T14:57:38.398Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://astraqcyberdefence.com/blog/os2-correlation</loc>
<lastmod>2026-04-03T14:57:38.398Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://astraqcyberdefence.com/blog/os2-vessel-detection</loc>
<lastmod>2026-04-03T14:57:38.398Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://astraqcyberdefence.com/blog/os2-overview</loc>
<lastmod>2026-04-03T14:57:38.398Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://astraqcyberdefence.com/blog/quantum-threat-foundations</loc>
<lastmod>2026-04-03T14:57:38.398Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://astraqcyberdefence.com/blog/nciipc-ai-grand-challenge</loc>
<lastmod>2026-04-03T14:57:38.398Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://astraqcyberdefence.com/blog/langchain-1</loc>
<lastmod>2026-04-03T14:57:38.398Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://astraqcyberdefence.com/blog/control-plane-resilience</loc>
<lastmod>2026-04-03T14:57:38.398Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://astraqcyberdefence.com/blog/enterprise-audit-logging</loc>
<lastmod>2026-04-03T14:57:38.398Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://astraqcyberdefence.com/blog/secure-agent-networking</loc>
<lastmod>2026-04-03T14:57:38.398Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://astraqcyberdefence.com/blog/secure-microvm-runtime</loc>
<lastmod>2026-04-03T14:57:38.398Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://astraqcyberdefence.com/blog/polymorphic-workload-orchestrator</loc>
<lastmod>2026-04-03T14:57:38.398Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://astraqcyberdefence.com/blog/rag-guardrails-hallucination-prevention</loc>
<lastmod>2026-04-03T14:57:38.398Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://astraqcyberdefence.com/blog/scaling-rag-systems</loc>
<lastmod>2026-04-03T14:57:38.398Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://astraqcyberdefence.com/blog/multi-tenant-rag-isolation</loc>
<lastmod>2026-04-03T14:57:38.398Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://astraqcyberdefence.com/blog/evaluating-rag-with-ragas</loc>
<lastmod>2026-04-03T14:57:38.398Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://astraqcyberdefence.com/blog/multi-hop-rag-agents</loc>
<lastmod>2026-04-03T14:57:38.398Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://astraqcyberdefence.com/blog/production-ready-rag-guide</loc>
<lastmod>2026-04-03T14:57:38.398Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://astraqcyberdefence.com/blog/imc-2025-grant-win</loc>
<lastmod>2026-04-03T14:57:38.398Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://astraqcyberdefence.com/blog/rising-threat-of-phishing</loc>
<lastmod>2026-04-03T14:57:38.398Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://astraqcyberdefence.com/case-studies/mongo-bleed</loc>
<lastmod>2026-04-03T14:57:38.398Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://astraqcyberdefence.com/case-studies/react-2-shell</loc>
<lastmod>2026-04-03T14:57:38.398Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://astraqcyberdefence.com/case-studies/solarwinds-cyberattack</loc>
<lastmod>2026-04-03T14:57:38.398Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
</urlset>
