<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://thecybercompass.com/2026/02/28/deepfake-scams-voice-video-when-it-sounds-right-isnt-proof-anymore/</loc><image:image><image:loc>https://thecybercompass.com/wp-content/uploads/2026/02/deepfake-scams-voice-video-when-it-sounds-right-isnt-3.png</image:loc><image:title>deepfake-scams-voice-video-when-it-sounds-right-isnt</image:title></image:image><image:image><image:loc>https://thecybercompass.com/wp-content/uploads/2026/02/deepfake-scams-voice-video-when-it-sounds-right-isnt-2.png</image:loc><image:title>deepfake-scams-voice-video-when-it-sounds-right-isnt</image:title></image:image><image:image><image:loc>https://thecybercompass.com/wp-content/uploads/2026/02/deepfake-scams-voice-video-when-it-sounds-right-isnt-1.png</image:loc><image:title>deepfake-scams-voice-video-when-it-sounds-right-isnt</image:title></image:image><image:image><image:loc>https://thecybercompass.com/wp-content/uploads/2026/02/deepfake-scams-voice-video-when-it-sounds-right-isnt.png</image:loc><image:title>deepfake-scams-voice-video-when-it-sounds-right-isnt</image:title></image:image><lastmod>2026-02-28T08:27:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybercompass.com/2026/01/29/iot-devices-in-everyday-life-rising-cyber-risks/</loc><image:image><image:loc>https://thecybercompass.com/wp-content/uploads/2026/01/iot-devices-in-everyday-life-rising-cyber-risks.png</image:loc><image:title>iot-devices-in-everyday-life-rising-cyber-risks</image:title></image:image><lastmod>2026-01-29T05:37:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybercompass.com/2025/12/29/the-cyber-threats-that-defined-2024-2025/</loc><image:image><image:loc>https://thecybercompass.com/wp-content/uploads/2025/12/chatgpt-image-dec-29-2025-11_16_57-pm.png</image:loc><image:title>ChatGPT Image Dec 29, 2025, 11_16_57 PM</image:title></image:image><image:image><image:loc>https://thecybercompass.com/wp-content/uploads/2025/12/the-cyber-threats-that-defined-the-years-20242025-2.png</image:loc><image:title>the-cyber-threats-that-defined-the-years-20242025</image:title></image:image><image:image><image:loc>https://thecybercompass.com/wp-content/uploads/2025/12/the-cyber-threats-that-defined-the-years-20242025-1.png</image:loc><image:title>the-cyber-threats-that-defined-the-years-20242025</image:title></image:image><image:image><image:loc>https://thecybercompass.com/wp-content/uploads/2025/12/the-cyber-threats-that-defined-the-years-20242025.png</image:loc><image:title>the-cyber-threats-that-defined-the-years-20242025</image:title></image:image><image:image><image:loc>https://thecybercompass.com/wp-content/uploads/2025/12/the-cyber-threats-that-defined-20242025-1.png</image:loc><image:title>the-cyber-threats-that-defined-20242025</image:title></image:image><image:image><image:loc>https://thecybercompass.com/wp-content/uploads/2025/12/the-cyber-threats-that-defined-20242025.png</image:loc><image:title>the-cyber-threats-that-defined-20242025</image:title></image:image><lastmod>2025-12-29T13:26:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybercompass.com/2025/11/28/how-secure-is-your-password/</loc><image:image><image:loc>https://thecybercompass.com/wp-content/uploads/2025/11/how-secure-is-your-password-1.png</image:loc><image:title>how-secure-is-your-password</image:title></image:image><image:image><image:loc>https://thecybercompass.com/wp-content/uploads/2025/11/how-secure-is-your-password.png</image:loc><image:title>how-secure-is-your-password</image:title></image:image><image:image><image:loc>https://thecybercompass.com/wp-content/uploads/2025/11/screenshot-2025-11-28-153450-1.png</image:loc><image:title>Screenshot 2025-11-28 153450</image:title></image:image><image:image><image:loc>https://thecybercompass.com/wp-content/uploads/2025/11/screenshot-2025-11-28-153450.png</image:loc><image:title>Screenshot 2025-11-28 153450</image:title></image:image><image:image><image:loc>https://thecybercompass.com/wp-content/uploads/2025/11/screenshot-2025-11-28-152233-1.png</image:loc><image:title>Screenshot 2025-11-28 152233</image:title></image:image><image:image><image:loc>https://thecybercompass.com/wp-content/uploads/2025/11/screenshot-2025-11-28-152233.png</image:loc><image:title>Screenshot 2025-11-28 152233</image:title></image:image><lastmod>2025-11-28T05:58:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybercompass.com/2025/10/22/inside-a-hack-what-really-happens-before-the-system-falls/</loc><image:image><image:loc>https://thecybercompass.com/wp-content/uploads/2025/10/inside-a-hack-what-really-happens-before-the-system-falls.png</image:loc><image:title>inside-a-hack-what-really-happens-before-the-system-falls</image:title></image:image><lastmod>2025-10-22T04:37:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybercompass.com/2025/09/30/think-before-you-connect-the-truth-about-public-wi-fi/</loc><image:image><image:loc>https://thecybercompass.com/wp-content/uploads/2025/09/think-before-you-connect-the-truth-about-public-wi-fi-1.png</image:loc><image:title>think-before-you-connect-the-truth-about-public-wi-fi</image:title></image:image><image:image><image:loc>https://thecybercompass.com/wp-content/uploads/2025/09/think-before-you-connect-the-truth-about-public-wi-fi.png</image:loc><image:title>think-before-you-connect-the-truth-about-public-wi-fi</image:title></image:image><lastmod>2025-09-30T13:15:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybercompass.com/2025/08/30/how-hackers-steal-passwords-part-2-spraying-and-stuffing/</loc><image:image><image:loc>https://thecybercompass.com/wp-content/uploads/2025/08/hackers-steal-passwords-using-spraying-and-stuffing-4.png</image:loc><image:title>hackers-steal-passwords-using-spraying-and-stuffing</image:title></image:image><image:image><image:loc>https://thecybercompass.com/wp-content/uploads/2025/08/hackers-steal-passwords-using-spraying-and-stuffing-3.png</image:loc><image:title>hackers-steal-passwords-using-spraying-and-stuffing</image:title></image:image><image:image><image:loc>https://thecybercompass.com/wp-content/uploads/2025/08/hackers-steal-passwords-using-spraying-and-stuffing-2.png</image:loc><image:title>hackers-steal-passwords-using-spraying-and-stuffing</image:title></image:image><image:image><image:loc>https://thecybercompass.com/wp-content/uploads/2025/08/hackers-steal-passwords-using-spraying-and-stuffing-1.png</image:loc><image:title>hackers-steal-passwords-using-spraying-and-stuffing</image:title></image:image><image:image><image:loc>https://thecybercompass.com/wp-content/uploads/2025/08/hackers-steal-passwords-using-spraying-and-stuffing.png</image:loc><image:title>hackers-steal-passwords-using-spraying-and-stuffing</image:title></image:image><lastmod>2025-08-30T06:50:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybercompass.com/2025/07/23/how-hackers-steal-your-passwords-3-techniques-you-should-know/</loc><image:image><image:loc>https://thecybercompass.com/wp-content/uploads/2025/07/password-hacking-1.png</image:loc><image:title>password-hacking</image:title></image:image><image:image><image:loc>https://thecybercompass.com/wp-content/uploads/2025/07/password-hacking.png</image:loc><image:title>password-hacking</image:title></image:image><lastmod>2025-07-23T11:12:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybercompass.com/2025/06/30/your-cat-pics-are-at-risk-trojan-malware-on-official-app-stores/</loc><image:image><image:loc>https://thecybercompass.com/wp-content/uploads/2025/06/your-cat-pics-are-at-risk-trojan-malware-on-official-3.png</image:loc><image:title>your-cat-pics-are-at-risk-trojan-malware-on-official</image:title></image:image><image:image><image:loc>https://thecybercompass.com/wp-content/uploads/2025/06/your-cat-pics-are-at-risk-trojan-malware-on-official-2.png</image:loc><image:title>your-cat-pics-are-at-risk-trojan-malware-on-official</image:title></image:image><image:image><image:loc>https://thecybercompass.com/wp-content/uploads/2025/06/your-cat-pics-are-at-risk-trojan-malware-on-official-1.png</image:loc><image:title>your-cat-pics-are-at-risk-trojan-malware-on-official</image:title></image:image><image:image><image:loc>https://thecybercompass.com/wp-content/uploads/2025/06/your-cat-pics-are-at-risk-trojan-malware-on-official.png</image:loc><image:title>your-cat-pics-are-at-risk-trojan-malware-on-official</image:title></image:image><lastmod>2025-06-30T07:42:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybercompass.com/2025/05/27/beware-of-sms-scams-protect-yourself-from-fraudulent-messages/</loc><image:image><image:loc>https://thecybercompass.com/wp-content/uploads/2025/05/beware-of-sms-scams-protect-yourself-from-fraudulent-messages-3.png</image:loc><image:title>beware-of-sms-scams-protect-yourself-from-fraudulent-messages</image:title></image:image><image:image><image:loc>https://thecybercompass.com/wp-content/uploads/2025/05/beware-of-sms-scams-protect-yourself-from-fraudulent-messages-2.png</image:loc><image:title>beware-of-sms-scams-protect-yourself-from-fraudulent-messages</image:title></image:image><image:image><image:loc>https://thecybercompass.com/wp-content/uploads/2025/05/beware-of-sms-scams-protect-yourself-from-fraudulent-messages-1.png</image:loc><image:title>beware-of-sms-scams-protect-yourself-from-fraudulent-messages</image:title></image:image><image:image><image:loc>https://thecybercompass.com/wp-content/uploads/2025/05/beware-of-sms-scams-protect-yourself-from-fraudulent-messages.png</image:loc><image:title>beware-of-sms-scams-protect-yourself-from-fraudulent-messages</image:title></image:image><image:image><image:loc>https://thecybercompass.com/wp-content/uploads/2025/05/img_1152.png</image:loc><image:title>IMG_1152</image:title></image:image><lastmod>2025-05-27T02:21:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybercompass.com/2025/04/24/how-to-detect-and-avoid-malicious-email-links-understanding-domains/</loc><image:image><image:loc>https://thecybercompass.com/wp-content/uploads/2025/04/screenshot-2025-04-24-075936-1.jpg</image:loc><image:title>Screenshot 2025-04-24 075936</image:title></image:image><image:image><image:loc>https://thecybercompass.com/wp-content/uploads/2025/04/screenshot-2025-04-24-075936.jpg</image:loc><image:title>Screenshot 2025-04-24 075936</image:title></image:image><image:image><image:loc>https://thecybercompass.com/wp-content/uploads/2025/04/how-to-detect-and-avoid-malicious-email-links-texts-only-1.png</image:loc><image:title>how-to-detect-and-avoid-malicious-email-links-texts-only</image:title></image:image><image:image><image:loc>https://thecybercompass.com/wp-content/uploads/2025/04/how-to-detect-and-avoid-malicious-email-links-texts-only.png</image:loc><image:title>how-to-detect-and-avoid-malicious-email-links-texts-only</image:title></image:image><image:image><image:loc>https://thecybercompass.com/wp-content/uploads/2025/04/how-to-detect-and-avoid-malicious-email-links.png</image:loc><image:title>how-to-detect-and-avoid-malicious-email-links</image:title></image:image><image:image><image:loc>https://thecybercompass.com/wp-content/uploads/2025/04/how-to-detect-and-avoid-malicious-email-links-understanding-domains-5.png</image:loc><image:title>how-to-detect-and-avoid-malicious-email-links-understanding-domains</image:title></image:image><image:image><image:loc>https://thecybercompass.com/wp-content/uploads/2025/04/how-to-detect-and-avoid-malicious-email-links-understanding-domains-4.png</image:loc><image:title>how-to-detect-and-avoid-malicious-email-links-understanding-domains</image:title></image:image><image:image><image:loc>https://thecybercompass.com/wp-content/uploads/2025/04/how-to-detect-and-avoid-malicious-email-links-understanding-domains-3.png</image:loc><image:title>how-to-detect-and-avoid-malicious-email-links-understanding-domains</image:title></image:image><image:image><image:loc>https://thecybercompass.com/wp-content/uploads/2025/04/how-to-detect-and-avoid-malicious-email-links-understanding-domains-2.png</image:loc><image:title>how-to-detect-and-avoid-malicious-email-links-understanding-domains</image:title></image:image><image:image><image:loc>https://thecybercompass.com/wp-content/uploads/2025/04/how-to-detect-and-avoid-malicious-email-links-understanding-domains-1.png</image:loc><image:title>how-to-detect-and-avoid-malicious-email-links-understanding-domains</image:title></image:image><lastmod>2025-04-23T22:44:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybercompass.com/2024/12/24/dont-fall-for-it-the-s-c-a-m-rule-to-spot-a-scam-before-it-gets-you/</loc><image:image><image:loc>https://thecybercompass.com/wp-content/uploads/2024/12/scams-on-the-internet-1.png</image:loc><image:title>scams-on-the-internet</image:title></image:image><image:image><image:loc>https://thecybercompass.com/wp-content/uploads/2024/12/scams-on-the-internet.png</image:loc><image:title>scams-on-the-internet</image:title></image:image><image:image><image:loc>https://thecybercompass.com/wp-content/uploads/2024/12/about-scams-on-the-internet.png</image:loc><image:title>about-scams-on-the-internet</image:title></image:image><image:image><image:loc>https://thecybercompass.com/wp-content/uploads/2024/12/dont-fall-for-it-the-s-c-a-m-rule-to-spot-a.png</image:loc><image:title>dont-fall-for-it-the-s-c-a-m-rule-to-spot-a</image:title></image:image><lastmod>2025-04-23T21:29:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybercompass.com/2025/03/30/when-a-bottle-of-water-cost-me-150-a-wake-up-call-on-man-in-the-middle-attacks/</loc><image:image><image:loc>https://thecybercompass.com/wp-content/uploads/2025/03/man-in-the-middle-attack-2.png</image:loc><image:title>man-in-the-middle-attack</image:title></image:image><image:image><image:loc>https://thecybercompass.com/wp-content/uploads/2025/03/man-in-the-middle-attack-1.png</image:loc><image:title>man-in-the-middle-attack</image:title></image:image><image:image><image:loc>https://thecybercompass.com/wp-content/uploads/2025/03/man-in-the-middle-attack.png</image:loc><image:title>man-in-the-middle-attack</image:title></image:image><lastmod>2025-03-30T00:53:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybercompass.com/2025/02/22/social-engineering-the-human-hack/</loc><image:image><image:loc>https://thecybercompass.com/wp-content/uploads/2025/02/ingenieria-social-el-hackeo-humano-3.png</image:loc><image:title>ingenieria-social-el-hackeo-humano</image:title></image:image><image:image><image:loc>https://thecybercompass.com/wp-content/uploads/2025/02/ingenieria-social-el-hackeo-humano-2.png</image:loc><image:title>ingenieria-social-el-hackeo-humano</image:title></image:image><image:image><image:loc>https://thecybercompass.com/wp-content/uploads/2025/02/ingenieria-social-el-hackeo-humano-1.png</image:loc><image:title>ingenieria-social-el-hackeo-humano</image:title></image:image><image:image><image:loc>https://thecybercompass.com/wp-content/uploads/2025/02/ingenieria-social-el-hackeo-humano.png</image:loc><image:title>ingenieria-social-el-hackeo-humano</image:title></image:image><image:image><image:loc>https://thecybercompass.com/wp-content/uploads/2025/02/social-engineering-the-human-hack-1.png</image:loc><image:title>social-engineering-the-human-hack</image:title></image:image><image:image><image:loc>https://thecybercompass.com/wp-content/uploads/2025/02/social-engineering-the-human-hack.png</image:loc><image:title>social-engineering-the-human-hack</image:title></image:image><lastmod>2025-03-29T23:58:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybercompass.com/2024/11/28/los-riesgos-ocultos-al-buscar-en-google/</loc><image:image><image:loc>https://thecybercompass.com/wp-content/uploads/2024/11/malvertising-2-1.png</image:loc><image:title>Malvertising (2)</image:title></image:image><image:image><image:loc>https://thecybercompass.com/wp-content/uploads/2024/11/malvertising-2.png</image:loc><image:title>Malvertising (2)</image:title></image:image><image:image><image:loc>https://thecybercompass.com/wp-content/uploads/2024/11/a-searching-on-the-web-and-their-results.png</image:loc><image:title>a-searching-on-the-web-and-their-results</image:title></image:image><lastmod>2025-01-28T14:20:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybercompass.com/blog/</loc><lastmod>2025-01-28T13:46:50+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://thecybercompass.com/2025/01/27/from-vacation-to-vigilance-understanding-the-risks-of-weak-public-wi-fi/</loc><image:image><image:loc>https://thecybercompass.com/wp-content/uploads/2025/01/site-logo-1.png</image:loc><image:title>site-logo</image:title></image:image><image:image><image:loc>https://thecybercompass.com/wp-content/uploads/2025/01/site-logo.png</image:loc><image:title>site-logo</image:title></image:image><image:image><image:loc>https://thecybercompass.com/wp-content/uploads/2025/01/from-vacation-to-vigilance-understanding-the-risks-of-weak-public-1.png</image:loc><image:title>from-vacation-to-vigilance-understanding-the-risks-of-weak-public</image:title></image:image><image:image><image:loc>https://thecybercompass.com/wp-content/uploads/2025/01/from-vacation-to-vigilance-understanding-the-risks-of-weak-public.png</image:loc><image:title>from-vacation-to-vigilance-understanding-the-risks-of-weak-public</image:title></image:image><image:image><image:loc>https://thecybercompass.com/wp-content/uploads/2025/01/weak-security-in-a-public-wifi-1.png</image:loc><image:title>weak-security-in-a-public-wifi</image:title></image:image><image:image><image:loc>https://thecybercompass.com/wp-content/uploads/2025/01/weak-security-in-a-public-wifi.png</image:loc><image:title>weak-security-in-a-public-wifi</image:title></image:image><image:image><image:loc>https://thecybercompass.com/wp-content/uploads/2025/01/img_8852.png</image:loc><image:title>IMG_8852</image:title></image:image><lastmod>2025-01-28T12:02:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://thecybercompass.com/centered-heading-with-contact-form/</loc><lastmod>2025-01-28T11:33:17+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://thecybercompass.com/about/</loc><lastmod>2024-11-28T11:11:55+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://thecybercompass.com/disclaimer/</loc><lastmod>2024-11-27T15:29:32+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://thecybercompass.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2026-02-28T08:27:56+00:00</lastmod></url></urlset>
