<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 3, 2026 at 5:13 pm by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://errorcodepodcast.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Error Code</title>
		<link><![CDATA[https://errorcodepodcast.com]]></link>
		<description><![CDATA[Error Code]]></description>
		<lastBuildDate><![CDATA[Wed, 01 Apr 2026 15:40:01 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://errorcodepodcast.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://errorcodepodcast.com/episode/ep-82-kerberos-in-ot-rc4-downgrade-attacks/]]></guid>
			<link><![CDATA[https://errorcodepodcast.com/episode/ep-82-kerberos-in-ot-rc4-downgrade-attacks/]]></link>
			<title>EP 82: Kerberos in OT: RC4 Downgrade Attacks</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 15:40:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://errorcodepodcast.com/episode/ep-81root-of-trust-why-security-now-starts-in-silicon/]]></guid>
			<link><![CDATA[https://errorcodepodcast.com/episode/ep-81root-of-trust-why-security-now-starts-in-silicon/]]></link>
			<title>EP 81:Root of Trust: Why Security Now Starts in Silicon</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 15:38:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://errorcodepodcast.com/episode/ep-80-the-dangers-of-white-label-devices/]]></guid>
			<link><![CDATA[https://errorcodepodcast.com/episode/ep-80-the-dangers-of-white-label-devices/]]></link>
			<title>EP 80: The Dangers of White Label Devices</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 15:37:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://errorcodepodcast.com/episode/ep-79-ignore-ot-security-at-your-own-peril/]]></guid>
			<link><![CDATA[https://errorcodepodcast.com/episode/ep-79-ignore-ot-security-at-your-own-peril/]]></link>
			<title>EP 79: Ignore OT Security At Your Own Peril</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 15:36:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://errorcodepodcast.com/episode/ep-78-in-defense-of-autonomous-vehicles/]]></guid>
			<link><![CDATA[https://errorcodepodcast.com/episode/ep-78-in-defense-of-autonomous-vehicles/]]></link>
			<title>EP 78: In Defense of Autonomous Vehicles</title>
			<pubDate><![CDATA[Tue, 13 Jan 2026 15:29:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://errorcodepodcast.com/uncategorized/ep-77-building-the-worlds-first-cyber-physical-system-device-library/]]></guid>
			<link><![CDATA[https://errorcodepodcast.com/uncategorized/ep-77-building-the-worlds-first-cyber-physical-system-device-library/]]></link>
			<title>EP 77: Building the World’s First Cyber Physical System Device Library</title>
			<pubDate><![CDATA[Tue, 13 Jan 2026 15:28:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://errorcodepodcast.com/episode/ep-76-why-security-certs-for-new-medical-devices-might-just-work/]]></guid>
			<link><![CDATA[https://errorcodepodcast.com/episode/ep-76-why-security-certs-for-new-medical-devices-might-just-work/]]></link>
			<title>EP 76: Why Security Certs for New Medical Devices Might Just Work</title>
			<pubDate><![CDATA[Tue, 13 Jan 2026 15:26:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://errorcodepodcast.com/episode/ep-75-iot-based-living-off-the-land-attacks-and-air-gapping-solar-systems/]]></guid>
			<link><![CDATA[https://errorcodepodcast.com/episode/ep-75-iot-based-living-off-the-land-attacks-and-air-gapping-solar-systems/]]></link>
			<title>EP 75: IoT-based Living Off The Land Attacks and Air-Gapping Solar Systems</title>
			<pubDate><![CDATA[Tue, 13 Jan 2026 15:25:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://errorcodepodcast.com/episode/ep-35-outsized-kinetic-response-to-ot-attacks/]]></guid>
			<link><![CDATA[https://errorcodepodcast.com/episode/ep-35-outsized-kinetic-response-to-ot-attacks/]]></link>
			<title>EP 35: Outsized Kinetic Response to OT Attacks</title>
			<pubDate><![CDATA[Wed, 29 May 2024 17:12:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://errorcodepodcast.com/attribution/]]></guid>
			<link><![CDATA[https://errorcodepodcast.com/attribution/]]></link>
			<title>Attribution</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 07:09:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://errorcodepodcast.com/episode/ep-83-cybersecurity-and-risk-in-a-decentralized-energy-grid/]]></guid>
			<link><![CDATA[https://errorcodepodcast.com/episode/ep-83-cybersecurity-and-risk-in-a-decentralized-energy-grid/]]></link>
			<title>EP 83:  Cybersecurity and Risk in a Decentralized Energy Grid</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 15:41:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://errorcodepodcast.com/episode/ep-57-strengthening-embedded-device-security-with-cloud-based-scada/]]></guid>
			<link><![CDATA[https://errorcodepodcast.com/episode/ep-57-strengthening-embedded-device-security-with-cloud-based-scada/]]></link>
			<title>EP 57: Strengthening Embedded Device Security with Cloud-Based SCADA</title>
			<pubDate><![CDATA[Sun, 09 Mar 2025 23:50:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://errorcodepodcast.com/episode/ep-63-chief-hacking-officer/]]></guid>
			<link><![CDATA[https://errorcodepodcast.com/episode/ep-63-chief-hacking-officer/]]></link>
			<title>EP 63: Chief Hacking Officer</title>
			<pubDate><![CDATA[Mon, 02 Jun 2025 14:24:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://errorcodepodcast.com/episode/ep-69-adding-crypto-agility-to-ot-systems/]]></guid>
			<link><![CDATA[https://errorcodepodcast.com/episode/ep-69-adding-crypto-agility-to-ot-systems/]]></link>
			<title>EP 69: Adding Crypto Agility to OT Systems</title>
			<pubDate><![CDATA[Fri, 29 Aug 2025 21:48:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://errorcodepodcast.com/episode/ep-68-hacking-cruise-ships-and-data-centers/]]></guid>
			<link><![CDATA[https://errorcodepodcast.com/episode/ep-68-hacking-cruise-ships-and-data-centers/]]></link>
			<title>EP 68: Hacking Cruise Ships and Data Centers</title>
			<pubDate><![CDATA[Fri, 29 Aug 2025 21:46:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://errorcodepodcast.com/episode/ep-67-collateral-damage/]]></guid>
			<link><![CDATA[https://errorcodepodcast.com/episode/ep-67-collateral-damage/]]></link>
			<title>EP 67:  Collateral Damage</title>
			<pubDate><![CDATA[Fri, 29 Aug 2025 21:45:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://errorcodepodcast.com/episode/ep-66-secure-the-ot-code-that-actually-runs/]]></guid>
			<link><![CDATA[https://errorcodepodcast.com/episode/ep-66-secure-the-ot-code-that-actually-runs/]]></link>
			<title>EP 66: Secure the OT code that actually runs</title>
			<pubDate><![CDATA[Fri, 29 Aug 2025 21:44:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://errorcodepodcast.com/episode/ep-65-hacking-critical-infrastructure-through-supply-chains/]]></guid>
			<link><![CDATA[https://errorcodepodcast.com/episode/ep-65-hacking-critical-infrastructure-through-supply-chains/]]></link>
			<title>EP 65: Hacking Critical Infrastructure Through Supply Chains</title>
			<pubDate><![CDATA[Fri, 29 Aug 2025 21:43:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://errorcodepodcast.com/episode/ep-64-lotl-volt-typhoon/]]></guid>
			<link><![CDATA[https://errorcodepodcast.com/episode/ep-64-lotl-volt-typhoon/]]></link>
			<title>EP 64: LOTL, Volt Typhoon</title>
			<pubDate><![CDATA[Fri, 29 Aug 2025 21:42:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://errorcodepodcast.com/episode/ep-71-meeting-cybersecurity-requirements-that-dont-yet-exist/]]></guid>
			<link><![CDATA[https://errorcodepodcast.com/episode/ep-71-meeting-cybersecurity-requirements-that-dont-yet-exist/]]></link>
			<title>EP 71: Meeting Cybersecurity Requirements That Don’t Yet Exist</title>
			<pubDate><![CDATA[Fri, 17 Oct 2025 18:36:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://errorcodepodcast.com/episode/ep70-securing-medical-devices-you-might-not-have-thought-to-secure/]]></guid>
			<link><![CDATA[https://errorcodepodcast.com/episode/ep70-securing-medical-devices-you-might-not-have-thought-to-secure/]]></link>
			<title>EP70: Securing Medical Devices You Might Not Have Thought to Secure</title>
			<pubDate><![CDATA[Fri, 17 Oct 2025 18:35:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://errorcodepodcast.com/episode/ep-62-defending-the-unknown-in-ot-security/]]></guid>
			<link><![CDATA[https://errorcodepodcast.com/episode/ep-62-defending-the-unknown-in-ot-security/]]></link>
			<title>EP 62: Defending the Unknown in OT Security</title>
			<pubDate><![CDATA[Mon, 02 Jun 2025 14:22:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://errorcodepodcast.com/episode/ep-61-applying-zero-trust-to-ot-systems/]]></guid>
			<link><![CDATA[https://errorcodepodcast.com/episode/ep-61-applying-zero-trust-to-ot-systems/]]></link>
			<title>EP 61: Applying Zero Trust to OT systems</title>
			<pubDate><![CDATA[Mon, 02 Jun 2025 14:21:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://errorcodepodcast.com/episode/ep-60-hacking-solar-power-inverters/]]></guid>
			<link><![CDATA[https://errorcodepodcast.com/episode/ep-60-hacking-solar-power-inverters/]]></link>
			<title>EP 60: Hacking Solar Power Inverters</title>
			<pubDate><![CDATA[Mon, 02 Jun 2025 14:20:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://errorcodepodcast.com/episode/ep-59-automotive-hacking-in-your-own-garage/]]></guid>
			<link><![CDATA[https://errorcodepodcast.com/episode/ep-59-automotive-hacking-in-your-own-garage/]]></link>
			<title>EP 59: Automotive Hacking In Your Own Garage</title>
			<pubDate><![CDATA[Mon, 02 Jun 2025 14:19:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://errorcodepodcast.com/episode/ep-56-hacking-ot-and-ics-in-the-era-of-cloud-and-automation/]]></guid>
			<link><![CDATA[https://errorcodepodcast.com/episode/ep-56-hacking-ot-and-ics-in-the-era-of-cloud-and-automation/]]></link>
			<title>EP 56: Hacking OT and ICS in the Era of Cloud and Automation</title>
			<pubDate><![CDATA[Sun, 09 Mar 2025 23:49:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://errorcodepodcast.com/episode/ep-72-does-a-cissp-certification-make-sense-for-ot-yes/]]></guid>
			<link><![CDATA[https://errorcodepodcast.com/episode/ep-72-does-a-cissp-certification-make-sense-for-ot-yes/]]></link>
			<title>EP 72: Does a CISSP Certification Make Sense For OT? Yes!</title>
			<pubDate><![CDATA[Fri, 17 Oct 2025 18:37:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://errorcodepodcast.com/episode/ep-55-creating-secure-device-storage-for-autonomous-vehicles/]]></guid>
			<link><![CDATA[https://errorcodepodcast.com/episode/ep-55-creating-secure-device-storage-for-autonomous-vehicles/]]></link>
			<title>EP 55: Creating Secure Device Storage For Autonomous Vehicles</title>
			<pubDate><![CDATA[Sun, 09 Mar 2025 23:48:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://errorcodepodcast.com/episode/ep-54-from-cyber-chaos-to-control-lessons-from-a-kansas-water-district/]]></guid>
			<link><![CDATA[https://errorcodepodcast.com/episode/ep-54-from-cyber-chaos-to-control-lessons-from-a-kansas-water-district/]]></link>
			<title>EP 54: From Cyber Chaos to Control: Lessons from a Kansas Water District</title>
			<pubDate><![CDATA[Sun, 09 Mar 2025 23:47:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://errorcodepodcast.com/episode/ep-52-hacking-cellular-enabled-iot-devices/]]></guid>
			<link><![CDATA[https://errorcodepodcast.com/episode/ep-52-hacking-cellular-enabled-iot-devices/]]></link>
			<title>EP 52: Hacking Cellular-Enabled IoT Devices</title>
			<pubDate><![CDATA[Sun, 09 Mar 2025 23:45:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://errorcodepodcast.com/episode/ep-51-hacking-high-performance-race-cars/]]></guid>
			<link><![CDATA[https://errorcodepodcast.com/episode/ep-51-hacking-high-performance-race-cars/]]></link>
			<title>EP 51: Hacking High-Performance Race Cars</title>
			<pubDate><![CDATA[Sun, 09 Mar 2025 23:44:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://errorcodepodcast.com/episode/ep-50-keeping-the-lights-on-in-ukraine/]]></guid>
			<link><![CDATA[https://errorcodepodcast.com/episode/ep-50-keeping-the-lights-on-in-ukraine/]]></link>
			<title>EP 50: Keeping The Lights On In Ukraine</title>
			<pubDate><![CDATA[Wed, 20 Nov 2024 18:09:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://errorcodepodcast.com/episode/ep-39-hacking-water-systems-and-the-ot-skills-gap/]]></guid>
			<link><![CDATA[https://errorcodepodcast.com/episode/ep-39-hacking-water-systems-and-the-ot-skills-gap/]]></link>
			<title>EP 39: Hacking Water Systems and the OT Skills Gap</title>
			<pubDate><![CDATA[Mon, 06 Jan 2025 00:56:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://errorcodepodcast.com/episode/ep-42-ot-cert/]]></guid>
			<link><![CDATA[https://errorcodepodcast.com/episode/ep-42-ot-cert/]]></link>
			<title>EP 42: OT-CERT</title>
			<pubDate><![CDATA[Tue, 06 Aug 2024 21:12:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://errorcodepodcast.com/episode/ep-53-securing-smart-ot-systems-already-in-the-field/]]></guid>
			<link><![CDATA[https://errorcodepodcast.com/episode/ep-53-securing-smart-ot-systems-already-in-the-field/]]></link>
			<title>EP 53: Securing Smart OT Systems Already In The Field</title>
			<pubDate><![CDATA[Sun, 09 Mar 2025 23:46:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://errorcodepodcast.com/home/]]></guid>
			<link><![CDATA[https://errorcodepodcast.com/home/]]></link>
			<title>Home</title>
			<pubDate><![CDATA[Sun, 10 Nov 2024 19:35:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://errorcodepodcast.com/episode/ep-49-hacking-android-based-industrial-control-systems/]]></guid>
			<link><![CDATA[https://errorcodepodcast.com/episode/ep-49-hacking-android-based-industrial-control-systems/]]></link>
			<title>EP 49: Hacking Android-Based Industrial Control Systems</title>
			<pubDate><![CDATA[Sun, 10 Nov 2024 19:27:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://errorcodepodcast.com/episode/ep-48-the-new-insider-threat-hacking-corporate-office-devices/]]></guid>
			<link><![CDATA[https://errorcodepodcast.com/episode/ep-48-the-new-insider-threat-hacking-corporate-office-devices/]]></link>
			<title>EP 48: The New Insider Threat: Hacking Corporate Office Devices</title>
			<pubDate><![CDATA[Sun, 10 Nov 2024 19:18:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://errorcodepodcast.com/episode/ep-47-hacking-smart-buildings/]]></guid>
			<link><![CDATA[https://errorcodepodcast.com/episode/ep-47-hacking-smart-buildings/]]></link>
			<title>EP 47: Hacking Smart Buildings</title>
			<pubDate><![CDATA[Sun, 10 Nov 2024 19:17:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://errorcodepodcast.com/episode/ep-46-hacking-israeli-made-water-treatment-devices-in-pennsylvania/]]></guid>
			<link><![CDATA[https://errorcodepodcast.com/episode/ep-46-hacking-israeli-made-water-treatment-devices-in-pennsylvania/]]></link>
			<title>EP 46: Hacking Israeli-made Water Treatment Devices In Pennsylvania</title>
			<pubDate><![CDATA[Sun, 10 Nov 2024 19:16:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://errorcodepodcast.com/episode/ep-45-laser-fault-injections-on-a-shoestring-budget/]]></guid>
			<link><![CDATA[https://errorcodepodcast.com/episode/ep-45-laser-fault-injections-on-a-shoestring-budget/]]></link>
			<title>EP 45: Laser Fault Injections on a Shoestring Budget</title>
			<pubDate><![CDATA[Mon, 16 Sep 2024 16:48:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://errorcodepodcast.com/episode/ep-44-performing-security-assessments-on-ics-systems/]]></guid>
			<link><![CDATA[https://errorcodepodcast.com/episode/ep-44-performing-security-assessments-on-ics-systems/]]></link>
			<title>EP 44: Performing Security Assessments on ICS systems</title>
			<pubDate><![CDATA[Mon, 16 Sep 2024 16:47:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://errorcodepodcast.com/episode/ep-43-hacking-large-scale-off-grid-solar-systems-and-other-consumer-iot-devices/]]></guid>
			<link><![CDATA[https://errorcodepodcast.com/episode/ep-43-hacking-large-scale-off-grid-solar-systems-and-other-consumer-iot-devices/]]></link>
			<title>EP 43: Hacking Large-Scale Off-Grid Solar Systems and Other Consumer IoT Devices</title>
			<pubDate><![CDATA[Mon, 16 Sep 2024 16:45:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://errorcodepodcast.com/episode/ep-41-firmware-sboms-zero-trust-and-iot-truth-bombs/]]></guid>
			<link><![CDATA[https://errorcodepodcast.com/episode/ep-41-firmware-sboms-zero-trust-and-iot-truth-bombs/]]></link>
			<title>EP 41: Firmware SBOMs, Zero Trust, And IoT Truth Bombs</title>
			<pubDate><![CDATA[Tue, 06 Aug 2024 21:10:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://errorcodepodcast.com/episode/ep-58-hacking-office-supplies/]]></guid>
			<link><![CDATA[https://errorcodepodcast.com/episode/ep-58-hacking-office-supplies/]]></link>
			<title>EP 58: Hacking Office Supplies</title>
			<pubDate><![CDATA[Mon, 02 Jun 2025 14:18:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://errorcodepodcast.com/episode/ep-73-badbox-2-0-blurring-the-line-between-bots-and-human-for-cybercrime/]]></guid>
			<link><![CDATA[https://errorcodepodcast.com/episode/ep-73-badbox-2-0-blurring-the-line-between-bots-and-human-for-cybercrime/]]></link>
			<title>EP 73: BADBOX 2.0: Blurring the line between bots and human for cybercrime</title>
			<pubDate><![CDATA[Fri, 17 Oct 2025 18:39:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://errorcodepodcast.com/episode/ep-38-regulating-ot-data-breaches-and-ransomware-reporting/]]></guid>
			<link><![CDATA[https://errorcodepodcast.com/episode/ep-38-regulating-ot-data-breaches-and-ransomware-reporting/]]></link>
			<title>EP 38: Regulating OT Data Breaches And Ransomware Reporting</title>
			<pubDate><![CDATA[Tue, 11 Jun 2024 17:45:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://errorcodepodcast.com/episode/ep-37-solving-mysteries-saving-lives-just-another-day-with-ot-incident-response-and-forensics/]]></guid>
			<link><![CDATA[https://errorcodepodcast.com/episode/ep-37-solving-mysteries-saving-lives-just-another-day-with-ot-incident-response-and-forensics/]]></link>
			<title>EP 37: Solving Mysteries. Saving Lives.  Just Another Day with OT Incident Response and Forensics</title>
			<pubDate><![CDATA[Wed, 29 May 2024 17:15:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://errorcodepodcast.com/episode/ep-36-securing-scada-systems-in-the-cloud/]]></guid>
			<link><![CDATA[https://errorcodepodcast.com/episode/ep-36-securing-scada-systems-in-the-cloud/]]></link>
			<title>EP 36: Securing SCADA Systems In The Cloud</title>
			<pubDate><![CDATA[Wed, 29 May 2024 17:14:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://errorcodepodcast.com/episode/ep-40-hacking-iot-surveillance-cameras-for-espionage-operations/]]></guid>
			<link><![CDATA[https://errorcodepodcast.com/episode/ep-40-hacking-iot-surveillance-cameras-for-espionage-operations/]]></link>
			<title>EP 40: Hacking IoT Surveillance Cameras For Espionage Operations</title>
			<pubDate><![CDATA[Fri, 05 Jul 2024 20:28:28 +0000]]></pubDate>
		</item>
				</channel>
</rss>
