<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
  <url>
    <loc>https://nordvpn.com/blog/zero-party-data/</loc>
    <lastmod>2026-01-06</lastmod>
    <image:image>
      <image:loc>https://ic.nordcdn.com/v1/https://sb.nordcdn.com/m/cae578337f70084f/original/blog-featured-data-brokers-svg.svg</image:loc>
      <image:caption>data broker</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://nordvpn.com/blog/zero-trust-architecture/</loc>
    <lastmod>2026-01-06</lastmod>
    <image:image>
      <image:loc>https://ic.nordcdn.com/v1/https://sb.nordcdn.com/transform/1be7efc1-64ff-49b7-8405-fea401d39e1b/blog-featured-zero-trust-architecture-968x507?X-Nord-Credential=T4PcHqfACi8Naxvulzf4IE8XT4oypRTi0blOOGwbK2A8L4fcPw52k3qkvbkYH&amp;X-Nord-Signature=E%2BV3nSx%2FMZYlTkuCvbd7XgAGlp2G%2BGysfuR4Y%2Fy4kmY%3D</image:loc>
      <image:caption>Zero trust architecture: Definition, benefits, and implementation</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://nordvpn.com/blog/zeus-virus/</loc>
    <lastmod>2026-01-06</lastmod>
    <image:image>
      <image:loc>https://ic.nordcdn.com/v1/https://sb.nordcdn.com/m/f4a6397328e50e1b/original/blog-what-is-a-trojan-horse-laptop-bomb-dynamite-malware-1200-675-svg.svg</image:loc>
      <image:caption>trojan horse virus</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://nordvpn.com/blog/zombie-cookies/</loc>
    <lastmod>2026-01-06</lastmod>
    <image:image>
      <image:loc>https://sb.nordcdn.com/m/b590fa0f577fa757/webimage-blog-featured-website-tracking-svg.jpg</image:loc>
      <image:caption>How to detect, delete, or block zombie cookies?</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://nordvpn.com/blog/zoom-alternatives/</loc>
    <lastmod>2026-01-06</lastmod>
    <image:image>
      <image:loc>https://ic.nordcdn.com/v1/https://sb.nordcdn.com/transform/790b5b17-9df5-4cbf-839c-22daac49346b/zoom-alternatives-png?X-Nord-Credential=T4PcHqfACi8Naxvulzf4IE8XT4oypRTi0blOOGwbK2A8L4fcPw52k3qkvbkYH&amp;X-Nord-Signature=rHOXlwK8DjZcuWZMMj6c0dKvoEwXhQhSVuK%2BE6P1aVc%3D</image:loc>
      <image:caption>Zoom alternatives</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://nordvpn.com/blog/zoom-vulnerability/</loc>
    <lastmod>2025-05-17</lastmod>
    <xhtml:link rel="alternate" hreflang="de" href="https://nordvpn.com/de/blog/zoom-datenschutz/"/>
    <xhtml:link rel="alternate" hreflang="en" href="https://nordvpn.com/blog/zoom-vulnerability/"/>
    <xhtml:link rel="alternate" hreflang="es" href="https://nordvpn.com/es/blog/zoom-seguridad/"/>
    <xhtml:link rel="alternate" hreflang="nl" href="https://nordvpn.com/nl/blog/zoom-veilig/"/>
    <xhtml:link rel="alternate" hreflang="sv" href="https://nordvpn.com/sv/blog/zoom-sakerhet/"/>
    <image:image>
      <image:loc>https://ic.nordcdn.com/v1/https://sb.nordcdn.com/transform/703caa6f-b2da-4aaf-9433-b860df3403e4/blog-zoom-2x-png?X-Nord-Credential=T4PcHqfACi8Naxvulzf4IE8XT4oypRTi0blOOGwbK2A8L4fcPw52k3qkvbkYH&amp;X-Nord-Signature=V5M3vkSg3Zv3%2BY2SDemp27GAOx9UVeKdvPEWixJ9ckg%3D</image:loc>
      <image:caption>zoom safety</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://nordvpn.com/blog/zoombombing/</loc>
    <lastmod>2026-01-06</lastmod>
    <image:image>
      <image:loc>https://ic.nordcdn.com/v1/https://sb.nordcdn.com/m/3c2acf71d8ab844b/original/blog-featured-rainbow-table-attack-svg.svg</image:loc>
      <image:caption>Zoom bombing: Definition and prevention</image:caption>
    </image:image>
  </url>
</urlset>
