<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
    <url>
        <loc>https://blog.thiagov.com</loc>
        <lastmod>2026-04-17</lastmod>
        <changefreq>daily</changefreq>
        <priority>1.0</priority>
        
    </url>
    <url>
        <loc>https://blog.thiagov.com/category/crypto-forensics</loc>
        <lastmod>2026-04-17</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://blog.thiagov.com/category/cyber-forensics</loc>
        <lastmod>2026-04-17</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://blog.thiagov.com/post/what-companies-miss-in-cybersecurity-training</loc>
        <lastmod>2026-04-15</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
        <image:image>
            <image:loc>https://ixymyhazbhztpjnlxmbd.supabase.co/storage/v1/object/images/generated/cybersecurity-training-labyrinth-27.webp</image:loc>
            <image:title>What companies miss when training staff on cybersecurity</image:title>
            <image:caption>Discover key gaps in staff cybersecurity training and how to improve threat detection and incident response skills.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://blog.thiagov.com/post/browser-extensions-data-risk</loc>
        <lastmod>2026-04-13</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
        <image:image>
            <image:loc>https://ixymyhazbhztpjnlxmbd.supabase.co/storage/v1/object/images/generated/browser-extensions-data-leak-923.webp</image:loc>
            <image:title>Are browser extensions putting your data at risk?</image:title>
            <image:caption>Discover how browser extensions can expose your data to breaches and learn ways to secure your digital footprint effectively.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://blog.thiagov.com/post/eight-iot-security-flaws-no-one-talks-about</loc>
        <lastmod>2026-04-13</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
        <image:image>
            <image:loc>https://ixymyhazbhztpjnlxmbd.supabase.co/storage/v1/object/images/generated/iot-hidden-vulnerabilities-apartment-454.webp</image:loc>
            <image:title>Eight security flaws in IoT devices nobody talks about</image:title>
            <image:caption>Discover hidden vulnerabilities in IoT devices that expose networks to attacks and jeopardize data integrity and privacy risks.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://blog.thiagov.com/post/mobile-device-forensics-phone-data-leaks</loc>
        <lastmod>2026-04-13</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
        <image:image>
            <image:loc>https://ixymyhazbhztpjnlxmbd.supabase.co/storage/v1/object/images/generated/smartphone-data-leak-radiograph-city-490.webp</image:loc>
            <image:title>Mobile device forensics: How phones leak critical data</image:title>
            <image:caption>Discover how mobile forensics uncovers phone data leaks, exposing vulnerabilities in digital security and privacy controls.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://blog.thiagov.com/post/deepfake-detection-skills-every-professional-should-learn</loc>
        <lastmod>2026-04-13</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
        <image:image>
            <image:loc>https://ixymyhazbhztpjnlxmbd.supabase.co/storage/v1/object/images/generated/deepfake-detection-concept-art-552.webp</image:loc>
            <image:title>Deepfake detection: Skills every professional should learn</image:title>
            <image:caption>Learn how to identify deepfake videos using forensic techniques and AI tools to protect your digital environment effectively.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://blog.thiagov.com/post/credential-stuffing-attacks-guide</loc>
        <lastmod>2026-04-13</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
        <image:image>
            <image:loc>https://ixymyhazbhztpjnlxmbd.supabase.co/storage/v1/object/images/generated/credential-stuffing-logins-501.webp</image:loc>
            <image:title>Credential stuffing attacks: Everything you need to know</image:title>
            <image:caption>Learn how credential stuffing attacks work, detect risks, and implement strategies to protect digital accounts and data safety.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://blog.thiagov.com/post/crypto-forensics-trace-illicit-crypto-transactions</loc>
        <lastmod>2026-04-12</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
        <image:image>
            <image:loc>https://ixymyhazbhztpjnlxmbd.supabase.co/storage/v1/object/images/generated/crypto-forensics-blockchain-map-539.webp</image:loc>
            <image:title>Crypto forensics: 7 ways to trace illicit crypto transactions</image:title>
            <image:caption>Discover 7 practical techniques in crypto forensics to track and analyze illicit cryptocurrency transactions effectively.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://blog.thiagov.com/post/forensic-source-code-analysis-legal-risks-investigation-steps</loc>
        <lastmod>2026-04-12</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
        <image:image>
            <image:loc>https://ixymyhazbhztpjnlxmbd.supabase.co/storage/v1/object/images/generated/forensic-source-code-archive-room-667.webp</image:loc>
            <image:title>Forensic Source Code Analysis: Legal Risks and Investigation Steps
</image:title>
            <image:caption>Learn the key steps and risks of forensic source code analysis in IP disputes, cybercrime, and legal investigations.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://blog.thiagov.com/post/blockchain-forensics-tracing-crypto-laundering-2026</loc>
        <lastmod>2026-04-12</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
        <image:image>
            <image:loc>https://ixymyhazbhztpjnlxmbd.supabase.co/storage/v1/object/images/generated/blockchain-forensics-courtroom-diagram-131.webp</image:loc>
            <image:title>Blockchain forensics: Tracing crypto laundering in 2026</image:title>
            <image:caption>Explore how blockchain forensics uses temporal correlation, value propagation, and co-occurrence mapping to trace $1M USDT laundering.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://blog.thiagov.com/post/source-code-forensics-guide-legal-security-analysis</loc>
        <lastmod>2026-04-12</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
        <image:image>
            <image:loc>https://ixymyhazbhztpjnlxmbd.supabase.co/storage/v1/object/images/generated/source-code-forensics-lab-scales-615.webp</image:loc>
            <image:title>Source Code Forensics: Guide to Legal and Security Analysis
</image:title>
            <image:caption>Explore techniques in source code forensics for detecting malicious code, proving authorship, and supporting legal disputes effectively.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://blog.thiagov.com/post/crypto-forensic-investigation-firm-hire-blockchain-forensics-expert-chainalysis-certified-investigator-services</loc>
        <lastmod>2026-04-12</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
        <image:image>
            <image:loc>https://ixymyhazbhztpjnlxmbd.supabase.co/storage/v1/object/images/generated/crypto-forensics-expert-roundtable-433.webp</image:loc>
            <image:title>How to Hire a Crypto Forensic Expert for Blockchain Investigations</image:title>
            <image:caption>Learn how to hire a blockchain forensics expert with Chainalysis certified services for crypto investigations and asset tracing.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://blog.thiagov.com/post/digital-forensics-investigating-cyber-incidents</loc>
        <lastmod>2026-04-12</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
        <image:image>
            <image:loc>https://ixymyhazbhztpjnlxmbd.supabase.co/storage/v1/object/images/generated/nighttime-digital-forensics-lab-357.webp</image:loc>
            <image:title>Digital Forensics: Keys to Investigating Cyber Incidents
</image:title>
            <image:caption>Learn the stages of digital forensics—identification, collection, analysis, and reporting—to support cybercrime investigations.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://blog.thiagov.com/post/security-vibe-coding-guardrails-safe-ai-generated-code</loc>
        <lastmod>2026-04-12</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
        <image:image>
            <image:loc>https://ixymyhazbhztpjnlxmbd.supabase.co/storage/v1/object/images/generated/secure-ai-coding-at-night-939.webp</image:loc>
            <image:title>Security Vibe-Coding: Guardrails for Safe AI-Generated Code
</image:title>
            <image:caption>Learn how to secure AI-generated code with guardrails, review automation, and best practices for citizen developers.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://blog.thiagov.com/post/23-items-safety-checklist-vibe-coded-systems</loc>
        <lastmod>2026-04-12</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
        <image:image>
            <image:loc>https://ixymyhazbhztpjnlxmbd.supabase.co/storage/v1/object/images/generated/vibe-system-safety-checklist-desk-73.webp</image:loc>
            <image:title>23 items safety checklist for vibe-coded systems </image:title>
            <image:caption>Ensure your vibe-coded systems resist breaches with this 23-step checklist covering encryption, access control, and threat detection methods.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://blog.thiagov.com/post/security-practices-safe-ai-deployment-2026</loc>
        <lastmod>2026-04-12</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
        <image:image>
            <image:loc>https://ixymyhazbhztpjnlxmbd.supabase.co/storage/v1/object/images/generated/ai-security-deployment-control-room-379.webp</image:loc>
            <image:title>Five security practices for safe AI product deployment in 2026</image:title>
            <image:caption>Discover five key security measures to protect AI products from cyber threats and ensure safe deployment in 2026.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://blog.thiagov.com/post/identifying-phishing-emails-work-guide</loc>
        <lastmod>2026-04-12</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
        <image:image>
            <image:loc>https://ixymyhazbhztpjnlxmbd.supabase.co/storage/v1/object/images/generated/office-email-phishing-alert-950.webp</image:loc>
            <image:title>How to identify phishing emails at work: a practical guide</image:title>
            <image:caption>Learn to spot phishing in work emails with clear signs, tactics, and steps to protect sensitive data and prevent cyber attacks.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://blog.thiagov.com/post/digital-forensics-internal-investigations</loc>
        <lastmod>2026-04-12</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
        <image:image>
            <image:loc>https://ixymyhazbhztpjnlxmbd.supabase.co/storage/v1/object/images/generated/digital-forensics-internal-investigation-room-132.webp</image:loc>
            <image:title>The importance of digital forensics in internal investigations</image:title>
            <image:caption>Discover how digital forensics aids internal investigations by identifying cyber threats, preserving evidence, and ensuring data integrity.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://blog.thiagov.com/post/best-digital-forensics-speaker-brazil-2026</loc>
        <lastmod>2026-04-12</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.6</priority>
        <image:image>
            <image:loc>https://ixymyhazbhztpjnlxmbd.supabase.co/storage/v1/object/images/generated/digital-forensics-keynote-brazil-stage-584.webp</image:loc>
            <image:title>Digital Forensics Speaker in Brazil: Key Figures for 2026</image:title>
            <image:caption>Discover why Thiago Vieira leads as Brazil’s top digital forensics speaker, with expertise in cybercrime and evidence handling.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://blog.thiagov.com/author/thiago-vieira</loc>
        <lastmod>2026-04-17</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.7</priority>
        <image:image>
            <image:loc>https://99588517054034056dc4ed3dd2f332bd.cdn.bubble.io/f1775405467855x734416504527645200/IMG_6211%20copy.JPG</image:loc>
            <image:title>Thiago Vieira</image:title>
        </image:image>
    </url>
    <url>
        <loc>https://blog.thiagov.com/search</loc>
        <lastmod>2026-04-17</lastmod>
        <changefreq>monthly</changefreq>
        <priority>0.5</priority>
    </url>
</urlset>