<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//blog.se.works/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://blog.se.works/</loc>
		<lastmod>2025-03-14T22:47:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://blog.se.works/2019/07/03/quantifying-the-cost-of-stolen-and-tampered-apps/</loc>
		<lastmod>2019-07-03T17:30:52+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2020/10/190704_003744-1-1-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2019/09/12/tweaking-extended-isolation-forests/</loc>
		<lastmod>2019-09-12T20:15:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2020/10/Tweaking_iso_forest_social_hd-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2019/10/30/pentoma-private-is-here/</loc>
		<lastmod>2019-10-30T17:43:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2020/10/Pentoma_Private_On-Prem-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2020/03/06/4-things-to-know-about-penetration-testing-ai/</loc>
		<lastmod>2020-03-06T23:19:14+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2020/10/4thingstoknowaboutpentestingandai_featured-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2020/03/10/how-penetration-testing-helps-securing-businesses/</loc>
		<lastmod>2020-03-10T21:10:13+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2020/10/How-Penetration-Testing-Helps-Securing-Businesses-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2020/03/27/8-recommendations-for-web-application-security/</loc>
		<lastmod>2020-03-27T17:58:34+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2020/10/8-recommendations-for-web-application-security-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2020/04/02/10-cost-effective-security-tips-for-smbs/</loc>
		<lastmod>2020-04-02T19:37:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2020/10/10-Cost-effective-security-tips-for-smbs-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2020/05/08/operational-technology-security-the-security-blind-spot/</loc>
		<lastmod>2020-05-08T20:44:39+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2020/10/otsecurity_thesecurityblindspot-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2020/05/28/penetration-testing-manual-vs-automated/</loc>
		<lastmod>2022-07-16T02:51:13+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2020/05/Penetration-Testing_ManualvsAutomated-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://i0.wp.com/blog.se.works/wp-content/uploads/2020/05/Penetration-Testing_ManualvsAutomated.png?resize=680%2C306&amp;ssl=1</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2018/03/09/what-is-the-difference-between-vulnerability-scanning-and-penetration-testing/</loc>
		<lastmod>2022-07-16T02:52:54+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2018/03/What-is-the-Difference-between-Vulnerability-Scanning-and-Penetration-Testing-Blog-IMG.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2018/03/21/an-introduction-to-penetration-testing/</loc>
		<lastmod>2022-07-16T02:55:02+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2018/03/An-Introduction-to-Penetration-Testing-Blog-IMG.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2019/11/15/seworks-is-now-aws-public-sector-partner/</loc>
		<lastmod>2022-07-16T03:56:22+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2020/10/SEW_AWS-Public-Sector-Partner-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2018/04/17/10-most-common-web-security-vulnerabilities/</loc>
		<lastmod>2022-07-16T03:58:19+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2018/04/Blog_Post_Banners_10-Most-Common-Web-Security-Vulnerabilities.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2016/11/18/9-enterprise-mobile-security-best-practices/</loc>
		<lastmod>2022-07-21T21:58:49+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/9-Enterprise-Mobile-Security-Best-Practices-Blog-IMG-6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2016/12/01/mobile-security-startup-seworks-raises-8-2-million-from-softbank-qualcomm-samsung-others/</loc>
		<lastmod>2022-07-21T22:00:59+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/Mobile-security-startup-Seworks-raises-8.2-million-from-SoftBank-Qualcomm-Samsung-others-Blog-IMG-V2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2016/11/29/how-to-secure-mobile-apps-using-the-best-anti-hacking-software/</loc>
		<lastmod>2022-07-21T22:02:19+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/How-to-Secure-Mobile-Apps-using-the-Best-Anti-Hacking-Software-Blog-IMG.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2020/04/10/7-common-mistakes-in-penetration-testing/</loc>
		<lastmod>2022-07-21T22:13:15+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2020/10/7-common-mistakes-pt-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2018/04/03/vulnerability-scanning-what-no-one-is-talking-about/</loc>
		<lastmod>2022-07-21T22:17:16+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2018/04/Vulnerability-Scanning-What-No-One-Is-Talking-About-Blog-IMG.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2017/05/25/understanding-insecure-data-storage-how-to-approach-it/</loc>
		<lastmod>2022-07-21T22:23:43+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/Understanding-Insecure-Data-Storage-and-How-To-Approach-It-Blog-IMG.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2017/09/27/what-is-the-difference-between-white-hat-grey-hat-and-black-hat-hackers/</loc>
		<lastmod>2022-07-21T22:27:27+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2017/09/What-Is-The-Difference-Between-White-Hat-Grey-Hat-and-Black-Hat-Hackers-Blog-IMG-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2017/05/11/your-business-can-and-will-suffer-after-a-mobile-hack/</loc>
		<lastmod>2022-07-22T02:51:12+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/Your-Business-Can-and-Will-Suffer-After-A-Mobile-Hack-Blog-IMG-8.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2018/02/02/mobile-app-security-back-to-the-basics/</loc>
		<lastmod>2022-07-22T04:24:14+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/Mobile-App-Security-Back-to-the-Basics-Blog-IMG.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2018/03/19/vulnerability-scanning-dont-fail-because-you-didnt-do-it/</loc>
		<lastmod>2022-07-23T10:05:22+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2018/03/Vulnerability-Scanning-Dont-Fail-because-you-Didnt-Do-It-Blog-IMG.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2018/03/12/what-is-apk/</loc>
		<lastmod>2022-07-23T10:06:30+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2018/03/What-is-APK-Blog-IMG.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2018/02/27/the-official-launch-of-our-ai-powered-pen-testing-solution/</loc>
		<lastmod>2022-07-23T10:08:13+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2018/02/Blog_Post_Banners_Introducing-Pentoma.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2018/03/07/connected-cars-are-talking-to-hackers/</loc>
		<lastmod>2022-07-23T10:09:23+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2018/03/Blog_Post_Banners_Connected-Cars-Are-Talking-To-Hackers.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2018/02/14/how-hackers-are-using-your-apps-to-mine-cryptocurrency/</loc>
		<lastmod>2022-07-23T10:10:47+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/How-Hackers-Are-Using-Your-Apps-To-Mine-Cryptocurrency.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2019/02/06/meet-seworks-at-mwc-2019/</loc>
		<lastmod>2022-07-23T21:36:04+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2019/02/mwc1_2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2018/06/04/the-current-security-state-of-top-fitness-mobile-apps/</loc>
		<lastmod>2022-07-23T21:52:14+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2018/06/Blog_Post_Banners_The_Current_Security_State_Of_Top_Fitness_Apps.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2019/05/06/introducing-our-new-logos/</loc>
		<lastmod>2022-07-23T21:54:03+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2019/05/Screen-Shot-2019-05-01-at-10.46.11-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2018/05/29/cybersecurity-what-every-ceo-and-cfo-should-know/</loc>
		<lastmod>2022-07-23T21:56:12+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2018/05/Blog_Post_Banners_Cybersecurity_What-Every-CEO-and-CFO-Should-Know.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2018/05/24/our-effort-to-comply-the-gdpr/</loc>
		<lastmod>2022-07-23T21:57:58+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2018/05/Blog_Post_Banners_GDPR_Comply.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2019/04/15/how-pentoma-helps-an-ecommerce-unicorns-cyber-posture/</loc>
		<lastmod>2022-07-23T21:59:40+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2019/04/Screen-Shot-2019-04-12-at-12.11.28-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2018/03/27/5-misconceptions-you-have-about-mobile-app-security/</loc>
		<lastmod>2022-07-23T22:01:19+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2018/03/5-Misconceptions-you-have-about-Mobile-App-Security-Blog-IMG.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2018/02/27/introducing-the-new-updated-scan-by-appsolid/</loc>
		<lastmod>2022-07-23T22:03:07+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2018/02/Blog_Post_Banners_Introducing-The-New-Updated_Scan-By-AppSolid.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2018/02/20/if-you-have-a-mobile-app-you-need-security-software/</loc>
		<lastmod>2022-07-23T22:04:46+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2018/02/If-you-have-a-Mobile-App-you-need-Security-Software-Blog-IMG.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2018/02/14/what-is-mobile-app-security-vulnerability-scanning/</loc>
		<lastmod>2022-07-23T22:06:01+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2018/02/What-is-Mobile-App-Security-Vulnerability-Scanning-Blog-IMG.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2018/02/02/feel-confident-in-your-mobile-application-once-and-for-all/</loc>
		<lastmod>2022-07-23T22:09:58+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2018/02/Feel-Confident-in-Your-Mobile-Application-Once-and-For-All-Blog-IMG.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2018/01/19/see-how-easily-you-can-secure-your-mobile-application/</loc>
		<lastmod>2022-07-23T22:11:48+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/See-How-Easily-You-Can-Secure-Your-Mobile-Application-Blog-IMG.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2018/01/11/do-not-launch-your-app-until-you-read-this/</loc>
		<lastmod>2022-07-23T22:12:52+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/Attention-Mobile-App-Developers-Do-Not-Launch-Your-App-Until-You-Read-This-Blog-IMG.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2018/01/03/what-experts-are-saying-about-mobile-application-security/</loc>
		<lastmod>2022-07-23T22:13:38+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/What-Experts-are-saying-about-Mobile-Application-Security-Blog-IMG.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2018/01/02/mobile-application-security-taboos-you-should-break/</loc>
		<lastmod>2022-07-23T22:14:16+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/Mobile-Application-Security-Taboos-You-Should-Break-Blog-IMG.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2017/12/29/why-your-business-should-analyze-its-application-security/</loc>
		<lastmod>2022-07-23T22:15:18+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/Why-Your-Business-Needs-to-Analyze-its-Application-Security-Blog-IMG.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2017/12/18/why-it-pays-to-secure-your-mobile-application/</loc>
		<lastmod>2022-07-23T22:16:57+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/Why-it-Pays-to-Secure-Your-Mobile-Application-Blog-IMG.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2017/12/07/high-profile-security-breaches-healthcare-industry/</loc>
		<lastmod>2022-07-23T22:17:38+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/High-Profile-Security-Breaches-Healthcare-Industry-Blog-IMG.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2017/12/06/high-profile-security-breaches-ecommmerce-industry/</loc>
		<lastmod>2022-07-23T22:19:22+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/High-Profile-Security-Breaches-eCommmerce-Industry-Blog-IMG.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2017/11/29/high-profile-security-breaches-finance-industry/</loc>
		<lastmod>2022-07-23T22:20:05+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/High-Profile-Security-Breaches-Finance-Industry-Blog-IMG.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2017/11/06/how-to-easily-secure-your-powerful-mobile-application/</loc>
		<lastmod>2022-07-23T22:21:15+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/How-to-Easily-Secure-your-Powerful-Mobile-Application-Blog-IMG.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2017/10/30/what-is-the-mobile-application-security-verification-standard/</loc>
		<lastmod>2022-07-23T22:22:23+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/What-is-the-Mobile-Application-Security-Verification-Standard-Blog-IMG.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2017/10/25/google-doc-when-should-you-test-your-applications-security/</loc>
		<lastmod>2022-07-23T22:23:06+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/When-should-you-test-your-Applications-Security-Blog-IMG.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2017/10/18/the-evolution-of-mobile-application-security/</loc>
		<lastmod>2022-07-23T22:23:46+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/The-Evolution-of-Mobile-Application-Security-Blog-IMG.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2017/10/11/how-mobile-application-security-is-making-the-world-a-better-place/</loc>
		<lastmod>2022-07-23T22:24:30+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/How-Mobile-Application-Security-is-making-the-World-a-Better-Place-Blog-IMG.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2017/10/05/what-is-app-wrapping/</loc>
		<lastmod>2022-07-23T22:27:14+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2017/10/What-is-App-Wrapping-Blog-IMG.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2017/09/28/android-vs-ios-which-platform-has-better-mobile-security/</loc>
		<lastmod>2022-07-23T22:27:57+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/Android-vs-IOS-Which-Platform-Has-Better-Mobile-Security-Blog-IMG.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2017/09/13/scary-mobile-security-statistics-to-be-mindful-of/</loc>
		<lastmod>2022-07-23T22:29:04+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/scary-mobile-security-stats.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2017/09/07/how-to-create-the-safest-and-most-comprehensive-environment-for-your-app-users/</loc>
		<lastmod>2022-07-23T23:24:56+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/How-To-Create-The-Safest-and-Most-Comprehensive-Environment-For-Your-App-Users-Blog-IMG.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2017/08/24/a-lesson-in-testing-your-code-vulnerabilities-and-the-tools-to-do-so/</loc>
		<lastmod>2022-07-23T23:25:30+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/A-Lesson-In-Testing-Your-Codes-Vulnerabilities-and-The-Tools-To-Do-So-Blog-IMG.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2017/08/22/a-breakdown-of-the-most-common-myths-about-launching-a-mobile-app/</loc>
		<lastmod>2022-07-23T23:26:09+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/A-Breakdown-of-The-Most-Common-Myths-About-Launching-a-Mobile-App-Blog-IMG.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2017/08/17/the-history-of-backloading-and-its-evolution-to-present-time/</loc>
		<lastmod>2022-07-23T23:26:41+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/The-History-of-Backloading-and-its-Evolution-to-Present-Time-Blog-IMG.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2017/08/04/5-secrets-to-source-code-protection-you-need-to-know/</loc>
		<lastmod>2022-07-23T23:27:23+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/5-Secrets-to-Source-Code-Protection-You-Need-To-Know-Blog-IMG.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2017/07/31/appsolid-featured-in-gartners-market-guide-for-application-shielding/</loc>
		<lastmod>2022-07-23T23:28:10+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/AppSolid-Featured-in-Gartners-Market-Guide-for-Mobile-Application-Security-Testing-Blog-IMG.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2017/07/27/how-to-secure-your-app-from-the-danger-of-hackers/</loc>
		<lastmod>2022-07-23T23:28:58+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/How-To-Secure-Your-App-From-The-Danger-Of-Hackers-Blog-IMG.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2017/07/26/the-dangers-of-app-piracy-and-fighting-back-with-security/</loc>
		<lastmod>2022-07-23T23:29:34+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/The-Dangers-of-App-Piracy-and-Fighting-Back-with-Security-Blog-IMG.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2017/07/21/mobile-application-security-the-good-the-bad-and-the-ugly/</loc>
		<lastmod>2022-07-23T23:30:40+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/Mobile-Application-Security-The-Good-The-Bad-and-The-Ugly-Blog-IMG.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2017/07/14/what-is-the-difference-between-obfuscation-and-encryption/</loc>
		<lastmod>2022-07-23T23:31:23+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/What-Is-The-Difference-Between-Obfuscation-And-Encryption-Blog-IMG.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2017/06/23/onelogin-security-breach-could-you-be-affected/</loc>
		<lastmod>2022-07-23T23:36:06+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/OneLogin-Security-Breach-Could-You-Be-Affected-Blog-IMG.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2017/06/22/poor-mobile-app-security-are-you-at-risk/</loc>
		<lastmod>2022-07-23T23:36:46+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/Poor-Mobile-App-Security-Are-You-At-Risk-Blog-IMG.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2017/06/21/how-mobile-hacking-can-damage-your-business-reputation/</loc>
		<lastmod>2022-07-23T23:37:19+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/How-Mobile-Hacking-Can-Damage-Your-Business-Reputation-Blog-IMG.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2017/06/15/10-things-you-need-to-know-about-the-biggest-ransomware-attack-in-history/</loc>
		<lastmod>2022-07-23T23:38:06+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/10-Things-You-Need-To-Know-About-The-Biggest-Ransomware-Attack-in-History-Blog-IMG.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2017/06/07/securing-the-mobile-workforce-starts-with-secure-applications/</loc>
		<lastmod>2022-07-23T23:39:12+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/Securing-The-Mobile-Workforce-Starts-With-Secure-Applications-Blog-MG.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2017/06/28/best-software-to-ensure-your-mobile-application-security/</loc>
		<lastmod>2022-07-23T23:39:31+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/Best-Softwares-To-Ensure-Your-Mobile-Applications-Security-Blog-IMG.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2017/06/29/security-challenges-in-a-mobile-fueled-world/</loc>
		<lastmod>2022-07-23T23:39:42+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/Security-Challenges-in-a-Mobile-Fueled-World-Blog-IMG.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2017/06/01/mobile-app-security-standards-to-be-aware-of/</loc>
		<lastmod>2022-07-23T23:40:47+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/Mobile-App-Security-Standards-To-Be-Aware-Of-Blog-IMG.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2017/05/17/mobile-app-development-5-concerning-security-issues/</loc>
		<lastmod>2022-07-23T23:41:44+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/Mobile-App-Development-5-Concerning-Security-Issues-Blog-IMG.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2017/05/04/common-missteps-in-mobile-application-security/</loc>
		<lastmod>2022-07-23T23:43:19+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/Common-Missteps-in-Mobile-Application-Security-Blog-IMG.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2017/04/26/mobile-application-security-10-best-practices-for-app-developers/</loc>
		<lastmod>2022-07-23T23:44:21+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/Mobile-Application-Security-10-Best-Practices-for-App-Developers-Blog-IMG.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2017/04/20/can-you-guarantee-your-mobile-app-is-secured-from-hackers/</loc>
		<lastmod>2022-07-23T23:45:21+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/Can-You-Guarantee-Your-Mobile-App-Is-Secured-From-Hackers-Blog-IMG.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2017/04/19/how-a-mobile-application-hack-can-hurt-your-business/</loc>
		<lastmod>2022-07-23T23:48:26+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/How-A-Mobile-Application-Hack-Can-Hurt-Your-Business-Blog-IMG.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2017/04/12/how-to-steer-clear-of-a-cyber-attack/</loc>
		<lastmod>2022-07-23T23:49:22+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/How-to-Steer-Clear-of-a-Cyber-Attack-Blog-IMG.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2017/04/06/nintendo-switch-already-hacked/</loc>
		<lastmod>2022-07-23T23:50:09+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/Nintendo-Switch-Already-Hacked-Blog-IMG.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2017/04/04/mobile-app-development-what-to-keep-your-eye-on/</loc>
		<lastmod>2022-07-23T23:50:54+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/Mobile-App-Development-What-to-Keep-Your-Eye-On-Blog-IMG.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2017/03/30/trending-application-security-concerns/</loc>
		<lastmod>2022-07-23T23:51:53+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/Trending-Application-Security-Concerns-Blog-IMG.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2017/03/28/the-evolution-of-ddos/</loc>
		<lastmod>2022-07-23T23:52:32+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/The-Evolution-of-DDoS-Blog-IMG.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2017/03/24/10-most-common-mobile-application-vulnerabilities/</loc>
		<lastmod>2022-07-23T23:53:22+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/10-Most-Common-Mobile-Application-Vulnerabilities-Blog-IMG.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2017/03/21/what-exactly-is-owasp/</loc>
		<lastmod>2022-07-23T23:54:04+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/What-Exactly-Is-OWASP-Blog-IMG.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2017/03/20/3-ways-to-protect-your-user-information-from-hacking-attacks/</loc>
		<lastmod>2022-07-23T23:54:51+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/3-Ways-to-Protect-Your-User-Information-From-Hacking-Attacks-Blog-IMG.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2017/03/15/ironically-a-cyber-attack-was-not-to-blame-for-last-weeks-aws-outage/</loc>
		<lastmod>2022-07-23T23:55:25+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/Ironically-A-Cyber-Attack-Was-Not-to-Blame-for-Last-Weeks-AWS-outage-Blog-IMG.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2017/03/09/mobile-application-security-two-step-verification-is-on-the-rise/</loc>
		<lastmod>2022-07-23T23:56:15+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/Mobile-Application-Security-Two-Step-Verification-Is-On-The-Rise-Blog-IMG.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2017/03/07/many-ios-applications-are-failing-to-secure-our-information/</loc>
		<lastmod>2022-07-23T23:56:56+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/Many-iOS-Applications-Are-Failing-To-Secure-Our-Information-Blog-IMG.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2017/03/02/app-developers-protect-your-source-code-before-its-too-late/</loc>
		<lastmod>2022-07-23T23:57:43+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/App-Developers-Protect-Your-Source-Code-Before-Its-Too-Late-Blog-IMG-8.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2017/02/28/source-code-protection-what-is-it-and-why-you-need-it/</loc>
		<lastmod>2022-07-23T23:58:24+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/Source-Code-Protection-What-Is-It-and-Why-You-Need-It-Blog-IMG.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2017/02/24/dont-fall-victim-to-a-security-breach/</loc>
		<lastmod>2022-07-23T23:59:13+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/Dont-Fall-Victim-to-a-Security-Breach-Nlog-IMG.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2017/02/23/10-tips-to-help-you-prevail-as-an-independent-app-developer/</loc>
		<lastmod>2022-07-23T23:59:54+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/10-Tips-to-Help-You-Prevail-as-an-Independent-App-Developer-Blo-IMG-8.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2017/02/17/yahoo-involved-in-one-of-the-largest-cyber-security-breaches-of-all-time/</loc>
		<lastmod>2022-07-24T00:00:31+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/Yahoo-Involved-in-one-of-the-largest-cyber-security-breaches-of-all-time-Blog-IMG.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2017/02/16/is-there-really-a-software-that-will-secure-my-mobile-application/</loc>
		<lastmod>2022-07-24T00:01:08+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/Is-There-Really-a-Software-That-Will-Secure-my-Mobile-Application-Blog-IMG.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2017/02/10/6-simple-steps-to-make-yourself-hack-proof/</loc>
		<lastmod>2022-07-24T00:17:38+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/6-Simple-Steps-to-Make-Yourself-Hack-Proof-Blog-IMG.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2017/02/09/our-pick-of-the-most-embarrassing-hacking-scenes-on-tv/</loc>
		<lastmod>2022-07-24T00:18:17+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/Our-Pick-of-The-Most-Embarassing-Hacking-Scenes-on-TV-Blog-IMG.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2017/02/03/thinking-of-developing-a-mobile-app-heres-what-you-need-to-be-aware-of/</loc>
		<lastmod>2022-07-24T00:19:03+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/Thinking-of-Developing-a-Mobile-App-Heres-What-You-Need-To-Be-Aware-Of-Blog-IMG.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2017/02/02/10-mobile-app-development-companies-that-youve-never-heard-of/</loc>
		<lastmod>2022-07-24T00:19:37+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/10-Mobile-App-Development-Companies-That-Youve-Never-Heard-Of-Blog-IMG.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2017/01/27/8-mobile-apps-that-will-make-your-life-easier/</loc>
		<lastmod>2022-07-24T00:20:18+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/8-Mobile-Apps-That-Will-Make-Your-Life-Easier-Blog-IMG.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2017/01/25/what-is-a-cyber-breach/</loc>
		<lastmod>2022-07-24T00:20:53+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/What-Is-a-Cyber-Breach-Blog-IMG.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2017/01/20/its-time-to-test-your-mobile-app-security/</loc>
		<lastmod>2022-07-24T00:21:25+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/Its-Time-to-Test-Your-Mobile-App-Security-Blog-IMG-6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2017/01/19/how-to-hack-a-mobile-app-its-pretty-simple/</loc>
		<lastmod>2022-07-24T00:22:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/How-to-Hack-a-Mobile-App-Its-Pretty-Simple-Blog-IMG.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2017/01/13/best-anti-hacking-software-to-secure-your-mobile-app/</loc>
		<lastmod>2022-07-24T00:24:22+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2020/10/Best-Anti-Hacking-Software-to-Secure-Your-Mobile-App-Blog-Image-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2020/10/Best-Anti-Hacking-Software-to-Secure-Your-Mobile-App-Blog-Image-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2017/01/11/5-ways-mobile-app-hacks-can-ruin-your-business/</loc>
		<lastmod>2022-07-24T00:25:19+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/5-Ways-Mobile-App-Hacks-Can-Ruin-Your-Business-Blog-IMG.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2017/01/06/mobile-app-security-how-to-tell-if-your-app-is-in-the-clear/</loc>
		<lastmod>2022-07-24T00:26:14+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/Mobile-App-Security-How-To-Tell-If-Your-App-Is-In-The-Clear-Blog-IMG.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2017/01/04/easy-android-binary-protection-methods/</loc>
		<lastmod>2022-07-24T00:26:59+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/Easy-Android-Binary-Protection-Methods-Blog-IMG.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2016/12/30/how-often-are-mobile-apps-hacked/</loc>
		<lastmod>2022-07-24T00:27:50+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/How-Often-Are-Mobile-Apps-Hacked-Blog-IMG.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2016/12/29/the-biggest-security-dangers-for-mobile-app-developers/</loc>
		<lastmod>2022-07-24T00:28:34+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/The-Biggest-Security-Dangers-For-Mobile-App-Developers.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2016/12/22/the-current-state-of-mobile-app-security-and-our-predictions-on-how-it-will-improve-in-2017/</loc>
		<lastmod>2022-07-24T00:29:26+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/The-Current-State-of-Mobile-App-Security-and-Our-Predictions-On-How-It-Will-Improve-in-2017-Blog-IMG.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2016/12/20/98-of-mobile-apps-are-not-secure-hidden-risks-and-what-you-need-to-know/</loc>
		<lastmod>2022-07-24T00:30:06+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/98-percent-of-Mobile-Apps-Are-Not-Secure-Hidden-Risks-and-What-You-Need-to-Know-Blog-IMG.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2016/12/14/7-mobile-application-security-testing-tools/</loc>
		<lastmod>2022-07-24T00:31:22+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/7-Mobile-Application-Security-Testing-Tools-Blog-IMG.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2016/12/09/what-is-mobile-app-security/</loc>
		<lastmod>2022-07-24T00:33:48+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/What-is-mobile-app-security-Blog-IMG.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2016/12/06/7-facts-about-mobile-security-your-business-should-know/</loc>
		<lastmod>2022-07-24T00:34:35+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/7-Facts-about-mobile-app-security-your-business-should-know-Blog-IMG.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2016/12/01/how-the-flood-of-mobile-apps-pose-growing-security-threats/</loc>
		<lastmod>2022-07-24T00:35:16+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/How-The-Flood-of-Mobile-Apps-Pose-Growing-Security-Threats-Blog-IMG.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2016/11/23/why-your-mobile-app-may-not-be-as-secure-as-you-think/</loc>
		<lastmod>2022-07-24T00:36:05+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/Why-Your-Mobile-App-May-Not-be-as-Secure-as-You-Think-Blog-IMG.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2016/11/17/mobile-app-security-tips-5-ways-to-secure-your-mobile-app-today/</loc>
		<lastmod>2022-07-24T00:36:44+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2022/07/Mobile-App-Security-Tips-5-Ways-to-Secure-Your-Mobile-App-Today-Blog-IMG.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.se.works/2025/03/14/how-your-credentials-get-leaked-and-what-happens-next/</loc>
		<lastmod>2025-03-14T22:47:36+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2025/03/resized_image_16_9-mini.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.se.works/wp-content/uploads/2025/03/resized_image_16_9-mini.png</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->