<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://yeticyberops.com.np/</loc>
<lastmod>2026-05-02T15:17:04.605Z</lastmod>
<priority>1</priority>
</url>
<url>
<loc>https://yeticyberops.com.np/services</loc>
<lastmod>2026-05-02T15:17:04.605Z</lastmod>
<priority>0.95</priority>
</url>
<url>
<loc>https://yeticyberops.com.np/about</loc>
<lastmod>2026-05-02T15:17:04.605Z</lastmod>
<priority>0.9</priority>
</url>
<url>
<loc>https://yeticyberops.com.np/blog</loc>
<lastmod>2026-05-02T15:17:04.605Z</lastmod>
<priority>0.9</priority>
</url>
<url>
<loc>https://yeticyberops.com.np/careers</loc>
<lastmod>2026-05-02T15:17:04.605Z</lastmod>
<priority>0.8</priority>
</url>
<url>
<loc>https://yeticyberops.com.np/contact</loc>
<lastmod>2026-05-02T15:17:04.605Z</lastmod>
<priority>0.85</priority>
</url>
<url>
<loc>https://yeticyberops.com.np/privacy</loc>
<lastmod>2026-05-02T15:17:04.605Z</lastmod>
<priority>0.3</priority>
</url>
<url>
<loc>https://yeticyberops.com.np/terms</loc>
<lastmod>2026-05-02T15:17:04.605Z</lastmod>
<priority>0.3</priority>
</url>
<url>
<loc>https://yeticyberops.com.np/blog/Your-IT-Vendor-Is-Not-Your-Security-Team</loc>
<lastmod>2026-05-02T00:00:00.000Z</lastmod>
<priority>0.8</priority>
</url>
<url>
<loc>https://yeticyberops.com.np/blog/The-Exposed-Attack-Surface</loc>
<lastmod>2026-05-02T00:00:00.000Z</lastmod>
<priority>0.8</priority>
</url>
</urlset>
