<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://www.thyrasec.com/sitemap.xsl"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd">
<!-- Sitemap is generated on 2026-04-03 17:51:45 GMT -->
	<url>
		<loc>https://www.thyrasec.com/</loc>
		<lastmod>2023-12-11T18:07:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.thyrasec.com/blog/</loc>
		<lastmod>2024-05-24T09:56:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.thyrasec.com/secure-contact/</loc>
		<lastmod>2024-02-26T05:22:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.thyrasec.com/opt-out-preferences/</loc>
		<lastmod>2024-01-17T03:54:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.thyrasec.com/medical-device-security/</loc>
		<lastmod>2024-01-17T03:54:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.thyrasec.com/reverse-engineering/</loc>
		<lastmod>2024-01-17T04:08:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.thyrasec.com/product-penetration-testing/</loc>
		<lastmod>2024-01-17T03:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.thyrasec.com/hardware-security/</loc>
		<lastmod>2024-01-17T03:53:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.thyrasec.com/bluetooth-security/</loc>
		<lastmod>2024-01-17T03:50:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.thyrasec.com/terms-of-service/</loc>
		<lastmod>2024-01-17T03:55:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.thyrasec.com/contact/</loc>
		<lastmod>2024-01-17T03:52:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.thyrasec.com/about/</loc>
		<lastmod>2024-01-17T03:46:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.thyrasec.com/services/</loc>
		<lastmod>2024-01-17T03:55:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.thyrasec.com/privacy-policy/</loc>
		<lastmod>2024-01-17T03:56:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.thyrasec.com/blog/stealing-teslas-with-wireless-car-keyless-entry/</loc>
		<lastmod>2024-05-24T09:56:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.thyrasec.com/blog/hackers-guide-to-j-link-debuggers/</loc>
		<lastmod>2024-05-18T10:12:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.thyrasec.com/blog/a-guide-to-bluetooth-man-in-the-middle-mitm/</loc>
		<lastmod>2024-05-13T05:59:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.thyrasec.com/blog/integrating-mbedtls-by-example/</loc>
		<lastmod>2024-05-02T03:48:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.thyrasec.com/blog/reviewing-ble-and-bluetooth-vulnerabilities-and-attacks-of-2023/</loc>
		<lastmod>2024-02-13T08:33:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.thyrasec.com/blog/top-6-bluetooth-vulnerabilities/</loc>
		<lastmod>2024-02-11T15:54:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.thyrasec.com/blog/medical-device-cybersecurity/</loc>
		<lastmod>2024-01-30T16:11:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.thyrasec.com/blog/using-openssl-for-securing-bluetooth-and-wireless-devices/</loc>
		<lastmod>2024-01-28T04:54:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.thyrasec.com/blog/building-bluez-for-defense-and-offense/</loc>
		<lastmod>2024-01-19T06:40:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.thyrasec.com/blog/bluetooth-hid-vulnerabilities-in-android-macos-ios-linux-let-attackers-inject-data/</loc>
		<lastmod>2024-01-30T16:20:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.thyrasec.com/blog/happy-new-year-and-hello-2024/</loc>
		<lastmod>2024-01-17T23:05:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.thyrasec.com/blog/ble-attacks-and-real-world-consequences/</loc>
		<lastmod>2024-01-17T23:06:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.thyrasec.com/blog/extracting-firmware-from-eeprom-flash-and-emmc/</loc>
		<lastmod>2024-02-12T03:31:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.thyrasec.com/blog/firmware-reversing-and-analysis-tools/</loc>
		<lastmod>2024-02-01T19:42:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.thyrasec.com/blog/bluetooth-security-primer-classic-ble/</loc>
		<lastmod>2024-01-17T04:50:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.thyrasec.com/blog/top-10-wireless-security-issues/</loc>
		<lastmod>2024-01-17T06:47:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.thyrasec.com/blog/wireless-security-challenges/</loc>
		<lastmod>2024-01-17T07:04:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.thyrasec.com/blog/open-vs-closed-source-stack-security/</loc>
		<lastmod>2024-01-17T04:53:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.thyrasec.com/blog/thyrasec-mission/</loc>
		<lastmod>2024-01-19T04:42:29+00:00</lastmod>
	</url>
</urlset>
<!-- Sitemap is served from cache -->
