<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://www.precursorsecurity.com</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>daily</changefreq>
<priority>1</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/about</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/about/careers</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/about/locations</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/about/meet-the-team</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/about/our-story</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/accreditations</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/accreditations/crest-penetration-testing</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/accreditations/crest-soc</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/accreditations/crest-vulnerability-assessment</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/accreditations/crown-commercial-supplier</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/blog</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/blog/cyber-security-glossary</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/contact</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/locations/edinburgh-office</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/locations/leeds-headquarters</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/locations/london-office</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/locations/newcastle-soc</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/privacy</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/sectors</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/sectors/education-sector-security</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/sectors/education-sector-security/phishing-protection-schools</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/sectors/energy-utilities-security</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/sectors/financial-services-security</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/sectors/financial-services-security/credential-stuffing-prevention</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/sectors/financial-services-security/dora-compliance</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/sectors/government-public-sector</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/sectors/healthcare-cyber-security</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/sectors/healthcare-cyber-security/nhs-dsp-toolkit-compliance</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/sectors/healthcare-cyber-security/ransomware-protection</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/sectors/legal-sector-security</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/sectors/property-real-estate-security</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/sectors/property-real-estate-security/iot-smart-building-security</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/sectors/retail-ecommerce-security</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/compliance</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/compliance/cyber-essentials-certification</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/compliance/cyber-essentials-plus</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/compliance/gdpr-data-protection-services</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/compliance/iso-27001-consultancy</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/compliance/pci-dss-compliance-testing</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/compliance/uk-cyber-security-resilience-bill-2025</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/compliance/uk-cyber-security-resilience-bill-2025/critical-supply-chain-rules</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/compliance/uk-cyber-security-resilience-bill-2025/data-centre-obligations</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/compliance/uk-cyber-security-resilience-bill-2025/incident-reporting-guide</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/compliance/uk-cyber-security-resilience-bill-2025/msp-requirements</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/cyber-insurance</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/defensive-security</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/defensive-security/edge-protect-attack-surface-management</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/defensive-security/incident-response</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/defensive-security/incident-response/digital-forensics-investigation</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/defensive-security/incident-response/emergency-cyber-breach-support</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/defensive-security/incident-response/retainer-services</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/defensive-security/managed-detection-response-mdr</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/defensive-security/mdr/bring-your-own-edr-integration</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/defensive-security/mdr/cloud-security-monitoring</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/defensive-security/mdr/endpoint-protection-response</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/defensive-security/mdr/identity-threat-detection</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/defensive-security/mdr/managed-microsoft-365-security</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/defensive-security/mdr/network-traffic-analysis</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/defensive-security/security-operations-centre</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/defensive-security/soc/uk-based-physical-soc-tour</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/defensive-security/threat-hunting</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/offensive-security</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/offensive-security/cloud-penetration-testing</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/offensive-security/cloud-penetration-testing/aws</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/offensive-security/cloud-penetration-testing/azure</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/offensive-security/cloud-penetration-testing/gcp</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/offensive-security/cloud-penetration-testing/microsoft-365</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/offensive-security/configuration-reviews</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/offensive-security/configuration-reviews/cloud-security-configuration</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/offensive-security/configuration-reviews/database-configuration-assessment</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/offensive-security/configuration-reviews/firewall-configuration-assessment</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/offensive-security/configuration-reviews/firewall-rule-audits</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/offensive-security/configuration-reviews/remote-access-vpn-review</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/offensive-security/configuration-reviews/server-build-review</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/offensive-security/configuration-reviews/workstation-build-review</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/offensive-security/continuous-security-testing</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/offensive-security/external-network-penetration-test</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/offensive-security/external-network-penetration-test/attack-surface-management</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/offensive-security/external-network-penetration-test/osint-assessment</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/offensive-security/internal-network-penetration-test</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/offensive-security/internal-network-penetration-test/active-directory-security-assessment</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/offensive-security/internal-network-penetration-test/ad-password-audit</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/offensive-security/internal-network-penetration-test/citrix-vdi-breakout</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/offensive-security/internal-network-penetration-test/segmentation-testing</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/offensive-security/internal-network-penetration-test/wireless-network-penetration-test</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/offensive-security/mobile-application-penetration-test</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/offensive-security/mobile-application-penetration-test/android-application-assessment</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/offensive-security/mobile-application-penetration-test/ios-application-assessment</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/offensive-security/ncsc-ithc</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/offensive-security/ot-iot-security-assessment</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/offensive-security/penetration-testing</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/offensive-security/penetration-testing/cost</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/offensive-security/penetration-testing/single-page-application-spa</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/offensive-security/penetration-testing/types</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/offensive-security/penetration-testing/vs-vulnerability-scanning</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/offensive-security/red-team-operations</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/offensive-security/red-team-operations/adversarial-emulation</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/offensive-security/social-engineering</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/offensive-security/social-engineering/phishing-simulation</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/offensive-security/social-engineering/physical-intrusion-testing</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/offensive-security/social-engineering/vishing-smishing</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/offensive-security/web-application-penetration-test</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/offensive-security/web-application-penetration-test/api-security-testing</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/services/offensive-security/web-application-penetration-test/sso-configuration-assessment</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/terms</loc>
<lastmod>2026-04-16T19:23:10.815Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/blog/7-steps-to-secure-your-microsoft-365-environment</loc>
<lastmod>2026-04-16T19:22:27.986Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/blog/api-vs-web-application-penetration-testing</loc>
<lastmod>2026-04-16T19:22:27.986Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/blog/artificial-intelligence-for-security-from-copilots-to-agents</loc>
<lastmod>2026-04-16T19:22:27.986Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/blog/business-logic-vulnerabilities-what-scanners-miss</loc>
<lastmod>2026-04-16T19:22:27.986Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/blog/communicating-cyber-security-risk-to-the-board</loc>
<lastmod>2026-04-16T19:22:27.986Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/blog/crest-penetration-testing-guide</loc>
<lastmod>2026-04-16T19:22:27.986Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/blog/cross-site-scripting-xss-types-examples-and-prevention</loc>
<lastmod>2026-04-16T19:22:27.986Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/blog/cyber-essentials-the-essential-guide</loc>
<lastmod>2026-04-16T19:22:27.986Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/blog/cyber-essentials-vs-cyber-essentials-plus</loc>
<lastmod>2026-04-16T19:22:27.986Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/blog/cyber-security-due-diligence-ma-penetration-testing</loc>
<lastmod>2026-04-16T19:22:27.986Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/blog/hacker-group-belsen-group-leaks-15-000-fortigate-credentials-on-dark-web</loc>
<lastmod>2026-04-16T19:22:27.986Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/blog/how-to-secure-microsoft-office-desktop-deployments</loc>
<lastmod>2026-04-16T19:22:27.986Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/blog/incident-response-in-citrix-environments</loc>
<lastmod>2026-04-16T19:22:27.986Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/blog/insurance-and-cyber-security-managed-providers-working-together-blog</loc>
<lastmod>2026-04-16T19:22:27.986Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/blog/internal-vs-external-penetration-testing</loc>
<lastmod>2026-04-16T19:22:27.986Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/blog/managing-your-exposure-to-malicious-browser-extensions</loc>
<lastmod>2026-04-16T19:22:27.986Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/blog/mitre-releases-mitre-att-ck-v15</loc>
<lastmod>2026-04-16T19:22:27.986Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/blog/new-vulnerability-in-vmware-esxi-exploited-by-ransomware-actors</loc>
<lastmod>2026-04-16T19:22:27.986Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/blog/owasp-top-10-what-penetration-testers-look-for</loc>
<lastmod>2026-04-16T19:22:27.986Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/blog/post-merger-it-security-acquisition</loc>
<lastmod>2026-04-16T19:22:27.986Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/blog/precursor-awarded-position-on-ccs-g-cloud-14</loc>
<lastmod>2026-04-16T19:22:27.986Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/blog/precursor-security-achieves-crest-soc-accreditation</loc>
<lastmod>2026-04-16T19:22:27.986Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/blog/precursor-soc-detects-microsoft-direct-send-phishing</loc>
<lastmod>2026-04-16T19:22:27.986Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/blog/row-level-recklessness-testing-supabase-security</loc>
<lastmod>2026-04-16T19:22:27.986Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/blog/sast-vs-dast-vs-penetration-testing</loc>
<lastmod>2026-04-16T19:22:27.986Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/blog/seo-poisoning-delivering-msix-installer-malware</loc>
<lastmod>2026-04-16T19:22:27.986Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/blog/sql-injection-explained</loc>
<lastmod>2026-04-16T19:22:27.986Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/blog/the-beginners-guide-to-the-nhs-dsp-toolkit</loc>
<lastmod>2026-04-16T19:22:27.986Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/blog/the-beginners-guide-to-vulnerability-triage</loc>
<lastmod>2026-04-16T19:22:27.986Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/blog/the-cyber-security-perspective-on-mergers-acquisitions-and-investments</loc>
<lastmod>2026-04-16T19:22:27.986Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/blog/uk-cyber-security-resilience-bill-guide</loc>
<lastmod>2026-04-16T19:22:27.986Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/blog/understanding-managed-detection-and-response</loc>
<lastmod>2026-04-16T19:22:27.990Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/blog/vendor-onboarding-security-vetting-suppliers</loc>
<lastmod>2026-04-16T19:22:27.990Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/blog/vulnerability-assessment-vs-penetration-testing</loc>
<lastmod>2026-04-16T19:22:27.990Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/blog/vulnerability-remediation-do-not-forget-regression-testing</loc>
<lastmod>2026-04-16T19:22:27.990Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/blog/waf-bypass-why-a-firewall-alone-wont-protect-you</loc>
<lastmod>2026-04-16T19:22:27.990Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/blog/what-cyber-insurance-actually-covers</loc>
<lastmod>2026-04-16T19:22:27.990Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/blog/why-law-firms-and-the-legal-sector-are-such-an-attractive-target</loc>
<lastmod>2026-04-16T19:22:27.990Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.precursorsecurity.com/blog/woocommerce-subscriptions-persistent-xss-cve-2019-18834</loc>
<lastmod>2026-04-16T19:22:27.990Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
</urlset>
