<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1"><url><loc>https://www.kerberus.com/</loc></url><url><loc>https://www.kerberus.com/about/</loc></url><url><loc>https://www.kerberus.com/api/</loc></url><url><loc>https://www.kerberus.com/articles/</loc></url><url><loc>https://www.kerberus.com/articles/coverage/</loc></url><url><loc>https://www.kerberus.com/articles/fire/</loc></url><url><loc>https://www.kerberus.com/articles/human-behavior-web3-losses/</loc></url><url><loc>https://www.kerberus.com/articles/human-factor-real-time-protection-report/</loc></url><url><loc>https://www.kerberus.com/articles/kerberus-2025-year-in-review/</loc></url><url><loc>https://www.kerberus.com/articles/mintdefense-migration/</loc></url><url><loc>https://www.kerberus.com/articles/pocket_universe/</loc></url><url><loc>https://www.kerberus.com/articles/scaling-solana-safely/</loc></url><url><loc>https://www.kerberus.com/articles/solana/</loc></url><url><loc>https://www.kerberus.com/authors/alex-katz/</loc></url><url><loc>https://www.kerberus.com/authors/werner-vermaak/</loc></url><url><loc>https://www.kerberus.com/demo/</loc></url><url><loc>https://www.kerberus.com/docs/</loc></url><url><loc>https://www.kerberus.com/enterprise/</loc></url><url><loc>https://www.kerberus.com/explainer/poisoning/</loc></url><url><loc>https://www.kerberus.com/explainer/rpc/</loc></url><url><loc>https://www.kerberus.com/fire/onboarding/</loc></url><url><loc>https://www.kerberus.com/glossary/</loc></url><url><loc>https://www.kerberus.com/glossary/address-poisoning/</loc></url><url><loc>https://www.kerberus.com/glossary/ai-crypto-scam/</loc></url><url><loc>https://www.kerberus.com/glossary/amm-automated-market-maker/</loc></url><url><loc>https://www.kerberus.com/glossary/bitcoin/</loc></url><url><loc>https://www.kerberus.com/glossary/blockchain/</loc></url><url><loc>https://www.kerberus.com/glossary/centralized-exchange-cex/</loc></url><url><loc>https://www.kerberus.com/glossary/cross-chain-bridge-vulnerability/</loc></url><url><loc>https://www.kerberus.com/glossary/crypto-wallet-drainer/</loc></url><url><loc>https://www.kerberus.com/glossary/cryptocurrency/</loc></url><url><loc>https://www.kerberus.com/glossary/decentralized-application-dapp/</loc></url><url><loc>https://www.kerberus.com/glossary/decentralized-exchange-dex/</loc></url><url><loc>https://www.kerberus.com/glossary/defi-decentralized-finance/</loc></url><url><loc>https://www.kerberus.com/glossary/drainer-as-a-service-daas/</loc></url><url><loc>https://www.kerberus.com/glossary/ethereum-virtual-machine-evm/</loc></url><url><loc>https://www.kerberus.com/glossary/ethereum/</loc></url><url><loc>https://www.kerberus.com/glossary/fake-airdrop-scam/</loc></url><url><loc>https://www.kerberus.com/glossary/flash-loan-attack/</loc></url><url><loc>https://www.kerberus.com/glossary/front-end-compromise/</loc></url><url><loc>https://www.kerberus.com/glossary/gas-fee/</loc></url><url><loc>https://www.kerberus.com/glossary/honeypot/</loc></url><url><loc>https://www.kerberus.com/glossary/impersonation-attack/</loc></url><url><loc>https://www.kerberus.com/glossary/keylogger/</loc></url><url><loc>https://www.kerberus.com/glossary/layer-1/</loc></url><url><loc>https://www.kerberus.com/glossary/layer-2/</loc></url><url><loc>https://www.kerberus.com/glossary/liquidity-pool-drain/</loc></url><url><loc>https://www.kerberus.com/glossary/liquidity/</loc></url><url><loc>https://www.kerberus.com/glossary/malicious-approval/</loc></url><url><loc>https://www.kerberus.com/glossary/malware/</loc></url><url><loc>https://www.kerberus.com/glossary/mev-attack/</loc></url><url><loc>https://www.kerberus.com/glossary/multisig-wallet/</loc></url><url><loc>https://www.kerberus.com/glossary/non-custodial-wallet/</loc></url><url><loc>https://www.kerberus.com/glossary/non-fungible-token-nft/</loc></url><url><loc>https://www.kerberus.com/glossary/oracle-manipulation/</loc></url><url><loc>https://www.kerberus.com/glossary/private-key/</loc></url><url><loc>https://www.kerberus.com/glossary/proof-of-stake-pos/</loc></url><url><loc>https://www.kerberus.com/glossary/proof-of-work-pow/</loc></url><url><loc>https://www.kerberus.com/glossary/public-key/</loc></url><url><loc>https://www.kerberus.com/glossary/quantum-computing/</loc></url><url><loc>https://www.kerberus.com/glossary/reentrancy-attack/</loc></url><url><loc>https://www.kerberus.com/glossary/rugpull/</loc></url><url><loc>https://www.kerberus.com/glossary/seed-phrase/</loc></url><url><loc>https://www.kerberus.com/glossary/setapprovalforall-exploit/</loc></url><url><loc>https://www.kerberus.com/glossary/smart-contract-vulnerability/</loc></url><url><loc>https://www.kerberus.com/glossary/smart-contract/</loc></url><url><loc>https://www.kerberus.com/glossary/solana/</loc></url><url><loc>https://www.kerberus.com/glossary/sybil-attack/</loc></url><url><loc>https://www.kerberus.com/glossary/token/</loc></url><url><loc>https://www.kerberus.com/glossary/transaction-poisoning/</loc></url><url><loc>https://www.kerberus.com/glossary/web3-phishing/</loc></url><url><loc>https://www.kerberus.com/glossary/web3-security/</loc></url><url><loc>https://www.kerberus.com/glossary/web3-social-engineering/</loc></url><url><loc>https://www.kerberus.com/glossary/web3-wallet/</loc></url><url><loc>https://www.kerberus.com/glossary/web3/</loc></url><url><loc>https://www.kerberus.com/glossary/wrench-attack/</loc></url><url><loc>https://www.kerberus.com/glossary/yield-farming/</loc></url><url><loc>https://www.kerberus.com/learn/</loc></url><url><loc>https://www.kerberus.com/learn/address-poisoning-attacks-web3-guide/</loc></url><url><loc>https://www.kerberus.com/learn/biggest-crypto-narratives-2026/</loc></url><url><loc>https://www.kerberus.com/learn/bitcoin-for-beginners/</loc></url><url><loc>https://www.kerberus.com/learn/crypto-wallet-drainers-web3-guide/</loc></url><url><loc>https://www.kerberus.com/learn/crypto-wallet-hygiene-guide-2026/</loc></url><url><loc>https://www.kerberus.com/learn/honeypot-crypto-scam/</loc></url><url><loc>https://www.kerberus.com/learn/how-to-read-a-crypto-transaction-before-you-sign-it/</loc></url><url><loc>https://www.kerberus.com/learn/how-to-use-phantom-wallet/</loc></url><url><loc>https://www.kerberus.com/learn/kerberus-ceo-interview/</loc></url><url><loc>https://www.kerberus.com/learn/pig-butchering-romance-scams/</loc></url><url><loc>https://www.kerberus.com/learn/psychology-of-crypto-scams/</loc></url><url><loc>https://www.kerberus.com/learn/revoke-crypto-token-approvals/</loc></url><url><loc>https://www.kerberus.com/learn/solana-101-guide-ecosystem-security-narratives-trends/</loc></url><url><loc>https://www.kerberus.com/learn/web3-security-beginner-guide/</loc></url><url><loc>https://www.kerberus.com/learn/web3-security-threats/</loc></url><url><loc>https://www.kerberus.com/learn/web3-security-tools/</loc></url><url><loc>https://www.kerberus.com/learn/wef-2026-cybersecurity-report/</loc></url><url><loc>https://www.kerberus.com/learn/what-is-self-custody-in-crypto/</loc></url><url><loc>https://www.kerberus.com/onboarding/</loc></url><url><loc>https://www.kerberus.com/privacy-policy/</loc></url><url><loc>https://www.kerberus.com/scanner/</loc></url><url><loc>https://www.kerberus.com/terms-of-use/</loc></url><url><loc>https://www.kerberus.com/tracking/</loc></url><url><loc>https://www.kerberus.com/uninstall/</loc></url><url><loc>https://www.kerberus.com/users/</loc></url><url><loc>https://www.kerberus.com/widget/</loc></url></urlset>