<?xml version="1.0" encoding="UTF-8"?>
<urlset
      xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
      xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
      xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9
            http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd">
<!-- created with Free Online Sitemap Generator www.xml-sitemaps.com -->


<url>
  <loc>https://qyntar.com/</loc>
  <lastmod>2026-04-21T10:13:17+00:00</lastmod>
  <priority>1.00</priority>
</url>
<url>
  <loc>https://qyntar.com/ai-security/</loc>
  <lastmod>2026-04-20T20:33:32+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://qyntar.com/blog/</loc>
  <lastmod>2026-04-17T16:50:17+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://qyntar.com/hu/</loc>
  <lastmod>2026-04-19T20:17:59+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://qyntar.com/services/pentest/</loc>
  <lastmod>2026-04-16T13:34:48+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://qyntar.com/services/hardening/</loc>
  <lastmod>2026-04-16T16:26:26+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://qyntar.com/services/gap-analysis/</loc>
  <lastmod>2026-04-16T17:06:51+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://qyntar.com/services/firewall-configuration-review/</loc>
  <lastmod>2026-04-16T17:31:14+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://qyntar.com/services/third-party-cybersecurity-assessment/</loc>
  <lastmod>2026-04-16T18:03:17+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://qyntar.com/services/cloud-security/</loc>
  <lastmod>2026-04-16T18:19:43+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://qyntar.com/services/vulnerability-prioritization/</loc>
  <lastmod>2026-04-16T19:47:35+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://qyntar.com/services/control-effectiveness-audit/</loc>
  <lastmod>2026-04-16T20:17:52+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://qyntar.com/services/incident-response/</loc>
  <lastmod>2026-04-17T11:05:03+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://qyntar.com/services/vciso/</loc>
  <lastmod>2026-04-16T13:05:36+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://qyntar.com/services/pre-ma-cybersecurity-due-diligence/</loc>
  <lastmod>2026-04-17T11:25:59+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://qyntar.com/services/ai-security/</loc>
  <lastmod>2026-04-16T14:51:22+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://qyntar.com/services/cybersecurity-maturity-audit/</loc>
  <lastmod>2026-04-17T14:26:58+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://qyntar.com/services/third-party-risk-management/</loc>
  <lastmod>2026-04-17T13:51:30+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://qyntar.com/ai-security/fundamentals/technological-characteristics-of-ai-systems/</loc>
  <lastmod>2026-04-20T20:33:36+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://qyntar.com/ai-security/fundamentals/objectives-of-ai-security/</loc>
  <lastmod>2026-04-20T20:33:35+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://qyntar.com/ai-security/fundamentals/functional-dimensions-of-ai-security/</loc>
  <lastmod>2026-04-20T20:33:35+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://qyntar.com/ai-security/fundamentals/scope-of-ai-security/</loc>
  <lastmod>2026-04-20T20:33:36+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://qyntar.com/ai-security/fundamentals/ai-security-vs-ai-safety/</loc>
  <lastmod>2026-04-20T20:33:34+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://qyntar.com/ai-security/fundamentals/foundations-of-traditional-cybersecurity/</loc>
  <lastmod>2026-04-20T20:33:35+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://qyntar.com/ai-security/fundamentals/security-characteristics-of-ai-systems/</loc>
  <lastmod>2026-04-20T20:33:36+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://qyntar.com/ai-security/fundamentals/key-differences/</loc>
  <lastmod>2026-04-20T20:33:35+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://qyntar.com/ai-security/fundamentals/evolution-of-security-strategies/</loc>
  <lastmod>2026-04-20T20:33:34+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://qyntar.com/ai-security/fundamentals/security-practice-implications/</loc>
  <lastmod>2026-04-20T20:33:36+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://qyntar.com/ai-security/fundamentals/ai-security-through-the-lifecycle-mlsecops/</loc>
  <lastmod>2026-04-20T20:33:34+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://qyntar.com/ai-security/executives/measurable-ai-security/</loc>
  <lastmod>2026-04-20T20:33:33+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://qyntar.com/ai-security/executives/ai-governance-accountability/</loc>
  <lastmod>2026-04-20T20:33:33+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://qyntar.com/ai-security/executives/strategic-framework-for-secure-ai-adoption/</loc>
  <lastmod>2026-04-20T20:33:34+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://qyntar.com/ai-security/compliance/international-standards-and-frameworks-in-ai-security/</loc>
  <lastmod>2026-04-20T20:33:33+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://qyntar.com/ai-security/threats/prompt-injection-taking-over-semantic-control/</loc>
  <lastmod>2026-04-20T20:33:38+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://qyntar.com/ai-security/threats/jailbreaking-systematic-bypass-of-behavioral-constraints/</loc>
  <lastmod>2026-04-20T20:33:37+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://qyntar.com/ai-security/threats/memory-poisoning-manipulating-agent-memory/</loc>
  <lastmod>2026-04-20T20:33:38+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://qyntar.com/ai-security/threats/model-inversion-data-reconstruction-from-model-outputs/</loc>
  <lastmod>2026-04-20T20:33:38+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://qyntar.com/ai-security/threats/membership-inference/</loc>
  <lastmod>2026-04-20T20:33:37+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://qyntar.com/ai-security/author/</loc>
  <lastmod>2026-04-20T20:40:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://qyntar.com/hu/ai-biztonsag/</loc>
  <lastmod>2026-04-20T20:34:31+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://qyntar.com/hu/blog/</loc>
  <lastmod>2026-04-19T20:17:59+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://qyntar.com/blog/2026/prompt-injection-enterprise-ai.html</loc>
  <lastmod>2026-04-17T16:44:59+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://qyntar.com/blog/2026/compliance-vs-real-security-critical-systems.html</loc>
  <lastmod>2026-04-17T16:02:16+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://qyntar.com/blog/2026/security-by-design-model-based-engineering.html</loc>
  <lastmod>2026-04-17T16:56:21+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://qyntar.com/hu/services/pentest/</loc>
  <lastmod>2026-04-19T20:18:03+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://qyntar.com/hu/services/hardening/</loc>
  <lastmod>2026-04-19T20:18:01+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://qyntar.com/hu/services/gap-analizis/</loc>
  <lastmod>2026-04-19T20:18:01+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://qyntar.com/hu/services/tuzfal-konfiguracio-felulvizsgalat/</loc>
  <lastmod>2026-04-19T20:18:03+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://qyntar.com/hu/services/beszallitoi-kiberbiztonsagi-vizsgalat/</loc>
  <lastmod>2026-04-19T20:18:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://qyntar.com/hu/services/felho-biztonsag/</loc>
  <lastmod>2026-04-19T20:18:01+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://qyntar.com/hu/services/exploitability-alapu-serulekenyseg-priorizalas/</loc>
  <lastmod>2026-04-19T20:18:01+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://qyntar.com/hu/services/kontrollhatekonysagi-audit/</loc>
  <lastmod>2026-04-19T20:18:03+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://qyntar.com/hu/services/incidenskezeles/</loc>
  <lastmod>2026-04-19T20:18:02+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://qyntar.com/hu/services/informaciobiztonsagi-felelos/</loc>
  <lastmod>2026-04-19T20:18:02+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://qyntar.com/hu/services/pre-ma-kiberbiztonsagi-atvilagitas/</loc>
  <lastmod>2026-04-19T20:18:03+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://qyntar.com/hu/services/ai-biztonsag/</loc>
  <lastmod>2026-04-19T20:18:00+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://qyntar.com/hu/services/kiberbiztonsagi-erettseg-audit/</loc>
  <lastmod>2026-04-19T20:18:02+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://qyntar.com/hu/services/harmadik-fel-kockazatkezeles/</loc>
  <lastmod>2026-04-19T20:18:02+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://qyntar.com/services/advanced-penetration-testing/</loc>
  <lastmod>2026-03-08T18:46:38+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://qyntar.com/services/model-based-cybersecurity/</loc>
  <lastmod>2026-03-08T18:50:17+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://qyntar.com/hu/ai-biztonsag/alapok/az-ai-rendszerek-technologiai-sajatossagai/</loc>
  <lastmod>2026-04-20T20:34:33+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://qyntar.com/hu/ai-biztonsag/alapok/az-ai-biztonsag-celrendszere/</loc>
  <lastmod>2026-04-20T20:34:32+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://qyntar.com/hu/ai-biztonsag/alapok/az-ai-biztonsag-funkcionalis-dimenzioi/</loc>
  <lastmod>2026-04-20T20:34:32+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://qyntar.com/hu/ai-biztonsag/alapok/az-ai-biztonsag-hatokore/</loc>
  <lastmod>2026-04-20T20:34:32+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://qyntar.com/hu/ai-biztonsag/alapok/ai-security-vs-ai-safety/</loc>
  <lastmod>2026-04-20T20:34:31+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://qyntar.com/hu/ai-biztonsag/alapok/hagyomanyos-kiberbiztonsag-fundamentumai/</loc>
  <lastmod>2026-04-20T20:34:33+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://qyntar.com/hu/ai-biztonsag/alapok/az-ai-rendszerek-biztonsagi-sajatossagai/</loc>
  <lastmod>2026-04-20T20:34:32+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://qyntar.com/hu/ai-biztonsag/alapok/kulcsfontossagu-kulonbsegek/</loc>
  <lastmod>2026-04-20T20:34:33+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://qyntar.com/hu/ai-biztonsag/alapok/biztonsagi-strategiak-fejlodese/</loc>
  <lastmod>2026-04-20T20:34:33+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://qyntar.com/hu/ai-biztonsag/alapok/kovetkezmenyek-a-biztonsagi-gyakorlatra/</loc>
  <lastmod>2026-04-20T20:34:33+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://qyntar.com/hu/ai-biztonsag/alapok/ai-biztonsag-az-eletciklus-tukreben-mlsecops/</loc>
  <lastmod>2026-04-20T20:34:31+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://qyntar.com/hu/ai-biztonsag/vezetoknek/merheto-ai-biztonsag/</loc>
  <lastmod>2026-04-20T20:34:37+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://qyntar.com/hu/ai-biztonsag/vezetoknek/ai-governance-felelosseg-es-elszamoltathatosag/</loc>
  <lastmod>2026-04-20T20:34:36+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://qyntar.com/hu/ai-biztonsag/vezetoknek/strategiai-keretrendszer-a-biztonsagos-ai-bevezeteshez/</loc>
  <lastmod>2026-04-20T20:34:37+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://qyntar.com/hu/ai-biztonsag/megfeleloseg/nemzetkozi-szabvanyok-es-keretrendszerek-az-ai-biztonsagban/</loc>
  <lastmod>2026-04-20T20:34:36+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://qyntar.com/hu/ai-biztonsag/fenyegetesek/prompt-injection-a-szemantikai-kontroll-atvetele/</loc>
  <lastmod>2026-04-20T20:34:35+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://qyntar.com/hu/ai-biztonsag/fenyegetesek/jailbreaking-a-viselkedesi-korlatok-szisztematikus-megkerulese/</loc>
  <lastmod>2026-04-20T20:34:34+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://qyntar.com/hu/ai-biztonsag/fenyegetesek/memoria-mergezes-az-agensmemoria-manipulacioja/</loc>
  <lastmod>2026-04-20T20:34:34+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://qyntar.com/hu/ai-biztonsag/fenyegetesek/modell-inverzio-adatrekonstrukcio-a-modell-kimenetei-alapjan/</loc>
  <lastmod>2026-04-20T20:34:35+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://qyntar.com/hu/ai-biztonsag/fenyegetesek/membership-inference-tagsagi-kovetkeztetes/</loc>
  <lastmod>2026-04-20T20:34:34+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://qyntar.com/hu/ai-biztonsag/szerzo/</loc>
  <lastmod>2026-04-20T20:39:15+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://qyntar.com/hu/ai-biztonsag/fenyegetesek/kontextus-manipulacio-a-kovetkeztetesi-lanc-elteritese/</loc>
  <lastmod>2026-04-20T20:34:34+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://qyntar.com/hu/ai-biztonsag/fenyegetesek/model-stealing-az-uzleti-ertek-es-a-szellemi-toke-eltulajdonitasa/</loc>
  <lastmod>2026-04-20T20:34:35+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://qyntar.com/hu/blog/2026/prompt-injection-vallalati-ai-rendszerekben.html</loc>
  <lastmod>2026-04-19T20:18:00+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://qyntar.com/hu/blog/2026/megfeleloseg-vs-valodi-biztonsag-kritikus-rendszerekben.html</loc>
  <lastmod>2026-04-19T20:18:00+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://qyntar.com/hu/blog/2026/security-by-design-model-alapu-rendszertervezesben.html</loc>
  <lastmod>2026-04-19T20:18:00+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://qyntar.com/hu//services/pentest/</loc>
  <lastmod>2026-04-19T20:18:03+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://qyntar.com/ai-security/threats/context-manipulation-reasoning-chain-hijacking/</loc>
  <lastmod>2026-04-20T20:33:37+00:00</lastmod>
  <priority>0.41</priority>
</url>
<url>
  <loc>https://qyntar.com/ai-security/threats/model-stealing-the-theft-of-business-value-and-intellectual-capital/</loc>
  <lastmod>2026-04-20T20:33:38+00:00</lastmod>
  <priority>0.41</priority>
</url>


</urlset>