<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://critical.lt/</loc>
    <lastmod>2023-06-11T18:21:10+03:00</lastmod>
    <changefreq>daily</changefreq>
    <priority>1.0</priority>
  </url>
  <url>
    <loc>https://critical.lt/blog/tele2-pildyk-sim-card-registration-bypass/</loc>
    <lastmod>2025-03-17T04:09:38+00:00</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://critical.lt/technology-research/</loc>
    <lastmod>2025-01-15T20:52:59+00:00</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://critical.lt/blog/path-traversal-vulnerability-in-prestashop-8-2-0/</loc>
    <lastmod>2024-10-15T23:00:35+00:00</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://critical.lt/blog/authorization-bypass-and-mass-assignment-in-pantera-crm/</loc>
    <lastmod>2024-07-12T01:36:49+00:00</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://critical.lt/blog/unauthenticated-remote-code-execution-and-path-traversal-in-labbis-bonus-software/</loc>
    <lastmod>2023-09-18T18:28:49+00:00</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://critical.lt/blog/revealing-the-identity-of-mark-sign-users/</loc>
    <lastmod>2023-06-11T18:43:20+00:00</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://critical.lt/digital-forensics-and-incident-response/</loc>
    <lastmod>2023-02-27T16:43:54+00:00</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://critical.lt/free-automated-vulnerability-scan/</loc>
    <lastmod>2023-02-27T16:26:03+00:00</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://critical.lt/mobile-application-security-testing/</loc>
    <lastmod>2023-02-25T13:09:20+00:00</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://critical.lt/about-us/</loc>
    <lastmod>2023-02-24T11:38:46+00:00</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://critical.lt/internet-of-things-and-hardware-security-audits/</loc>
    <lastmod>2023-02-24T11:32:52+00:00</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://critical.lt/blog/extraction-of-personally-identifiable-information-via-eparaksts-signing-extension/</loc>
    <lastmod>2023-02-24T11:30:45+00:00</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://critical.lt/contact/</loc>
    <lastmod>2023-02-24T10:19:34+00:00</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://critical.lt/blog/deanonymization-of-lithuanian-e-signature-users/</loc>
    <lastmod>2023-02-22T21:55:04+00:00</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://critical.lt/blog/paradox-insecurity-systems-ip150-internet-module-hijacking/</loc>
    <lastmod>2023-02-22T21:54:00+00:00</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://critical.lt/blog/ibm-spectrum-protect-exploiting-legacy-authentication-protocol/</loc>
    <lastmod>2023-02-22T21:53:08+00:00</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://critical.lt/blog/we-lock-unlocking-smart-locks-with-web-vulnerabilities/</loc>
    <lastmod>2023-02-22T21:52:14+00:00</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://critical.lt/blog/how-to-correctly-protect-fintech-apps-for-android-with-biometric-authentication/</loc>
    <lastmod>2023-02-22T21:47:50+00:00</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://critical.lt/not-found/</loc>
    <lastmod>2023-02-22T17:29:30+00:00</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://critical.lt/web-application-security-testing/</loc>
    <lastmod>2023-02-22T16:15:47+00:00</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://critical.lt/red-team-assessment/</loc>
    <lastmod>2023-02-22T16:15:24+00:00</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://critical.lt/infrastructure-penetration-test/</loc>
    <lastmod>2023-02-22T16:14:21+00:00</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://critical.lt/cloud-security-assessment/</loc>
    <lastmod>2023-02-22T16:12:21+00:00</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://critical.lt/source-code-review/</loc>
    <lastmod>2023-02-22T11:49:43+00:00</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://critical.lt/blog/</loc>
    <lastmod>2023-02-09T09:36:07+00:00</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
</urlset>
