<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://dev-www.threatdown.com/sitemap.xsl"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd">
<!-- Sitemap is generated on 2026-03-31 23:33:58 GMT -->
	<url>
		<loc>https://dev-www.threatdown.com/</loc>
		<lastmod>2026-03-13T15:48:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/</loc>
		<lastmod>2025-12-17T18:06:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/homepage-2/</loc>
		<lastmod>2026-03-05T20:00:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/mdr-roi-calculator/</loc>
		<lastmod>2026-02-26T17:45:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/typ-ransomware-prevention-checklist/</loc>
		<lastmod>2026-01-20T15:47:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-msp-ransomware-prevention-checklist/</loc>
		<lastmod>2026-01-20T16:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/typ-msp-mdr-demo/</loc>
		<lastmod>2026-01-16T14:21:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/request-msp-mdr-demo/</loc>
		<lastmod>2026-01-16T14:19:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-edr-mdr-xdr-guide/</loc>
		<lastmod>2026-01-20T18:26:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/coordinated-vulnerability-disclosure-program/cves/</loc>
		<lastmod>2026-01-12T09:44:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/request-typ-ransomware-prevention-guide/</loc>
		<lastmod>2026-01-20T13:51:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-msp-ransomware-prevention-guide/</loc>
		<lastmod>2026-01-09T13:20:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/case-studies/it-leasingteam/</loc>
		<lastmod>2026-01-14T22:05:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/typ-webinar-threatdown-partner-program-playbook-saxis/</loc>
		<lastmod>2025-12-17T20:32:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-saxis-threatdown-live-security-webinar-demo/</loc>
		<lastmod>2025-12-17T20:33:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-interworks-webinar-threatdown-partner-program-playbook/</loc>
		<lastmod>2025-12-18T08:10:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/typ-webinar-threatdown-partner-program-playbook-interworks/</loc>
		<lastmod>2026-01-06T15:33:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/typ-webinar-threatdown-partner-program-playbook-elovade-it/</loc>
		<lastmod>2025-12-16T10:32:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/elovade-it-webinar-threatdown-partner-program-playbook/</loc>
		<lastmod>2025-12-16T10:31:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/audit-logs-demo-video/</loc>
		<lastmod>2025-12-12T22:47:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/typ-webinar-threatdown-partner-program-playbook-naizak/</loc>
		<lastmod>2026-01-06T08:40:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-naizak-webinar-threatdown-partner-program-playbook/</loc>
		<lastmod>2026-01-06T09:01:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/typ-webinar-threatdown-partner-program-playbook-sysob/</loc>
		<lastmod>2025-12-18T12:02:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-sysob-webinar-threatdown-partner-program-playbook/</loc>
		<lastmod>2026-01-08T16:56:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-cms-webinar-threatdown-partner-program-playbook/</loc>
		<lastmod>2026-01-06T09:06:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/typ-webinar-threatdown-partner-program-playbook-cms/</loc>
		<lastmod>2025-12-08T17:35:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-nexus-partner-kit/</loc>
		<lastmod>2025-12-05T21:20:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/cms-download-mdr-evaluation-guide/</loc>
		<lastmod>2025-12-05T00:02:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/cms-thank-you-mdr-evaluation-guide/</loc>
		<lastmod>2025-12-05T00:00:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/email-security-webinar/</loc>
		<lastmod>2025-12-04T23:56:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/case-studies/st-bernards-high-school-transforms-their-security-posture/</loc>
		<lastmod>2025-12-04T23:55:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-business-compliance-checklist/</loc>
		<lastmod>2025-12-08T18:50:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-business-compliance-infographic/</loc>
		<lastmod>2025-12-08T18:32:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/typ-msp-mdr-evaluation-guide/</loc>
		<lastmod>2025-12-04T23:27:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-msp-mdr-evaluation-guide/</loc>
		<lastmod>2025-12-04T23:25:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/typ-constrained-resources-use-case/</loc>
		<lastmod>2025-12-05T21:43:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-constrained-resources-use-case/</loc>
		<lastmod>2025-12-04T23:21:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/typ-alert-fatigue-use-case/</loc>
		<lastmod>2025-12-04T23:20:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-alert-fatigue-use-case/</loc>
		<lastmod>2025-12-04T23:19:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/typ-5-ways-threatdown-mdr-can-transform-your-msp-business/</loc>
		<lastmod>2025-12-05T21:44:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-5-ways-threatdown-mdr-can-transform-your-msp-business/</loc>
		<lastmod>2025-12-04T23:01:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/typ-how-threatdown-mdr-works-for-msps/</loc>
		<lastmod>2025-12-04T23:08:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-msp-how-threatdown-mdr-works-for-msps/</loc>
		<lastmod>2025-12-04T22:56:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/typ-is-mdr-the-right-fit-for-my-msp-business-ebook/</loc>
		<lastmod>2025-12-04T23:10:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/msp-dl-is-mdr-the-right-fit-for-my-msp-business/</loc>
		<lastmod>2025-12-04T22:51:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/typ-msp-exec-summary-state-of-ransomware-2025/</loc>
		<lastmod>2025-12-04T23:12:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/partner-program-launch-video-disti/</loc>
		<lastmod>2025-11-11T16:37:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-msp-exec-summary-state-of-ransomware-2025/</loc>
		<lastmod>2025-12-04T22:38:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/partner-program/partner-program-launch/</loc>
		<lastmod>2025-11-10T22:26:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-business-compliance-framework/</loc>
		<lastmod>2025-12-17T20:59:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/thank-you-msp-meeting-request/</loc>
		<lastmod>2025-12-04T22:34:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/msp-dl-state-of-ransomware-2025/</loc>
		<lastmod>2025-12-04T22:31:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/typ-msp-state-of-ransomware-report/</loc>
		<lastmod>2025-12-04T22:22:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/web-release-october-2025/</loc>
		<lastmod>2025-12-05T21:47:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/typ-webinar-partner-emea-partner-program/</loc>
		<lastmod>2025-12-04T22:00:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-webinar-partner-emea-partner-program/</loc>
		<lastmod>2025-12-04T21:55:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-webinar-partner-amer-partner-program/</loc>
		<lastmod>2025-12-04T21:53:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/typ-webinar-partner-amer-partner-program/</loc>
		<lastmod>2025-12-04T21:59:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/vielen-dank-webinar-threatdown-in-der-dach-region-einheitlich-vernetzt-effektiv/</loc>
		<lastmod>2025-12-04T21:58:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/partner-webinar-threatdown-in-der-dach-region-einheitlich-vernetzt-effektiv/</loc>
		<lastmod>2025-12-04T21:51:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/press/</loc>
		<lastmod>2026-01-05T23:49:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/careers/</loc>
		<lastmod>2025-10-24T19:49:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/msp-meeting-request/</loc>
		<lastmod>2026-01-19T13:00:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/msp-meeting-request-thank-you/</loc>
		<lastmod>2025-12-05T21:51:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/careers/jobs/</loc>
		<lastmod>2025-10-22T16:11:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-ransomware-early-signs/</loc>
		<lastmod>2025-12-17T21:09:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/rep-meeting-link-ashi/</loc>
		<lastmod>2025-12-05T21:53:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/resources-msp-compliance-frameworks/</loc>
		<lastmod>2025-12-04T20:07:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-webinar-partner-emea-new-era/</loc>
		<lastmod>2025-12-04T19:51:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-webinar-dns-filtering-demo/</loc>
		<lastmod>2025-12-17T21:10:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/ba-mdr/</loc>
		<lastmod>2025-12-08T18:12:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/typ-webinar-partner-nam-new-era/</loc>
		<lastmod>2025-12-04T18:49:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-webinar-partner-nam-new-era/</loc>
		<lastmod>2025-12-04T19:53:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/partner-program/partner-reseller/reseller-application/tdsynnex/</loc>
		<lastmod>2026-01-06T17:51:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/typ-5-point-compliance-readiness-checklist-for-msps/</loc>
		<lastmod>2025-12-04T18:40:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-compliance-readiness-checklist-for-msps/</loc>
		<lastmod>2025-12-04T18:37:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-webinar-state-of-ransomware-2025/</loc>
		<lastmod>2025-12-17T21:11:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-webinar-patch-gaps-ai-risks/</loc>
		<lastmod>2026-01-14T16:44:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-industry-trends-ai-risks/</loc>
		<lastmod>2025-12-17T21:09:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/typ-msps-demystifying-complaince-frameworks-guide/</loc>
		<lastmod>2025-12-04T17:57:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-webinar-vulnerability-assessment-demo/</loc>
		<lastmod>2025-12-04T17:52:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-compliance-demystified-for-msps/</loc>
		<lastmod>2025-12-04T18:27:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/legal/subprocessors/subscriber-thank-you/</loc>
		<lastmod>2025-12-05T21:39:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-state-of-ransomware-2025/</loc>
		<lastmod>2025-12-17T21:14:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-mdr-evaluation-guide/</loc>
		<lastmod>2025-12-17T21:19:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-webinar-edr-demo-es/</loc>
		<lastmod>2025-12-12T15:19:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-edr-evaluation-guide/</loc>
		<lastmod>2025-12-17T21:24:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-webinar-edr-demo/</loc>
		<lastmod>2025-12-04T00:59:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/custom-quote/email-security/</loc>
		<lastmod>2025-12-04T00:38:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/products/email-security/</loc>
		<lastmod>2025-12-18T01:20:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-webinar-patch-management-demo/</loc>
		<lastmod>2025-12-04T00:20:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/typ-webinar-patch-management-demo/</loc>
		<lastmod>2025-12-04T00:16:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/legal/safe-deployment-practices-at-threatdown/</loc>
		<lastmod>2025-12-08T17:24:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/hub-ai-resources/</loc>
		<lastmod>2025-12-19T16:18:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/event-threatdown-on-tap/</loc>
		<lastmod>2025-12-03T23:47:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/thank-you-msp-webinar-cybercrime-in-ai/</loc>
		<lastmod>2025-12-03T23:35:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/what-is-a-trojan-horse/</loc>
		<lastmod>2025-12-15T21:06:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/what-is-sso/</loc>
		<lastmod>2025-12-15T21:03:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-social-engineering/</loc>
		<lastmod>2025-12-15T20:56:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-a-smishing/</loc>
		<lastmod>2025-12-15T20:51:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-a-signature-in-cybersecurity/</loc>
		<lastmod>2025-12-15T20:44:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-phishing-simulation/</loc>
		<lastmod>2025-12-15T20:21:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-polymorphic-phishing/</loc>
		<lastmod>2025-12-15T20:35:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-polymorphic-malware/</loc>
		<lastmod>2025-12-15T20:21:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/typ-ai-safety/</loc>
		<lastmod>2026-01-13T17:19:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-ai-safety/</loc>
		<lastmod>2025-12-08T18:38:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-owasp-top-ten/</loc>
		<lastmod>2025-12-12T23:32:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-osi-model/</loc>
		<lastmod>2025-12-12T23:24:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-edu-cybersecurity-guide-uk/</loc>
		<lastmod>2025-12-03T23:13:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-heuristic-analysis/</loc>
		<lastmod>2025-12-12T23:15:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-cve/</loc>
		<lastmod>2025-12-12T22:50:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-credential-stuffing/</loc>
		<lastmod>2025-12-12T22:44:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-webinar-cybercrime-in-ai/</loc>
		<lastmod>2025-12-19T16:08:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/typ-webinar-cybercrime-in-ai/</loc>
		<lastmod>2025-12-19T16:20:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/products/browser-phishing-protection/</loc>
		<lastmod>2025-12-18T01:23:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/products/firewall-management/</loc>
		<lastmod>2025-12-18T01:24:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/request-meeting-cybercrime-in-ai/</loc>
		<lastmod>2026-01-13T21:07:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/typ-cybercrime-in-ai/</loc>
		<lastmod>2026-01-13T17:17:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-cybercrime-in-ai/</loc>
		<lastmod>2026-01-13T17:15:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/request-edu-bundle/</loc>
		<lastmod>2025-11-28T18:38:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-threat-hunting-survey-sans/</loc>
		<lastmod>2025-12-08T18:37:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/request-meeting-may-fourth/</loc>
		<lastmod>2025-11-28T18:08:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-ransomware-emergency-kit/</loc>
		<lastmod>2025-12-08T18:35:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/partner-program/msp/oneview-trial-request/</loc>
		<lastmod>2025-03-18T21:49:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-spear-phishing/</loc>
		<lastmod>2025-12-12T22:37:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-clone-phishing/</loc>
		<lastmod>2025-12-12T22:30:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-phishing/</loc>
		<lastmod>2025-12-12T22:26:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-artificial-intelligence/</loc>
		<lastmod>2025-12-12T22:23:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-antivirus/</loc>
		<lastmod>2025-12-12T22:16:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/products/oneview/</loc>
		<lastmod>2025-12-22T16:45:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-quishing/</loc>
		<lastmod>2025-12-12T22:11:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-agentic-ai/</loc>
		<lastmod>2025-12-12T21:59:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-artificial-general-intelligence-agi/</loc>
		<lastmod>2025-12-12T21:50:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/products/dns-filtering/</loc>
		<lastmod>2025-12-18T01:18:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-sentinelone-comparison-report/</loc>
		<lastmod>2025-11-28T17:56:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/typ-sentinelone-comparison-report/</loc>
		<lastmod>2025-11-28T17:54:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/what-is-cl0p-ransomware/</loc>
		<lastmod>2025-12-12T21:42:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/</loc>
		<lastmod>2025-02-04T18:26:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-center/reports/</loc>
		<lastmod>2025-02-04T18:15:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-center/executive-pov/</loc>
		<lastmod>2025-02-04T18:15:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-center/</loc>
		<lastmod>2025-02-04T18:14:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/unlocked/</loc>
		<lastmod>2025-02-03T21:50:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/request-switch-and-save/</loc>
		<lastmod>2025-11-26T21:35:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-dora/</loc>
		<lastmod>2025-12-12T21:29:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-akira-ransomware/</loc>
		<lastmod>2025-12-12T20:59:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-black-basta-ransomware/</loc>
		<lastmod>2025-12-12T20:45:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-hive-ransomware/</loc>
		<lastmod>2025-12-12T20:34:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-lockbit-ransomware/</loc>
		<lastmod>2025-12-12T20:18:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-hunters-international-ransomware/</loc>
		<lastmod>2025-12-12T20:06:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-webinar-som-2025/</loc>
		<lastmod>2025-11-26T20:41:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/hub-ransomware/</loc>
		<lastmod>2026-01-07T13:41:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-apt/</loc>
		<lastmod>2025-12-12T19:51:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/partner-program/msp/schedule-a-oneview-demo/</loc>
		<lastmod>2025-11-26T19:00:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-trellix-comparison-report/</loc>
		<lastmod>2025-11-26T18:53:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-webinar-crush-ransomware/</loc>
		<lastmod>2025-11-26T18:43:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/typ-webinar-ransomware-rollback-demo/</loc>
		<lastmod>2025-11-26T18:11:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/request-ransomware-rollback/</loc>
		<lastmod>2025-11-26T18:12:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-alphv-blackcat-ransomware/</loc>
		<lastmod>2025-12-10T01:12:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-crowdstrike-comparison-report/</loc>
		<lastmod>2025-11-26T00:11:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-bitdefender-comparison-report/</loc>
		<lastmod>2025-11-26T00:10:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/partner-program/msp/msp-compare-vendors/</loc>
		<lastmod>2025-11-26T00:00:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/custom-quote/premium-support/</loc>
		<lastmod>2025-11-13T18:41:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/products/premium-support/</loc>
		<lastmod>2026-03-31T23:30:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/partner-program/msp/msp-success-kit/thank-you-msp-success-kit/</loc>
		<lastmod>2025-11-25T21:27:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/partner-program/msp/msp-success-kit/thank-you-5-ways-to-build-strong-customer-trust/</loc>
		<lastmod>2025-12-05T21:07:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/partner-program/msp/msp-success-kit/thank-you-the-formula-for-successful-msp-business/</loc>
		<lastmod>2025-12-05T21:09:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/partner-program/msp/msp-success-kit/thank-you-creating-wow-moments/</loc>
		<lastmod>2025-11-25T23:40:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-eset-comparison-report/</loc>
		<lastmod>2025-11-25T21:32:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/typ-eset-comparison-report/</loc>
		<lastmod>2025-11-25T21:29:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/partner-program/msp/xenex/</loc>
		<lastmod>2025-12-05T20:55:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/partner-program/msp/msp-success-kit/</loc>
		<lastmod>2025-12-18T00:18:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-endpoint-firewall/</loc>
		<lastmod>2025-12-10T01:02:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/partner-program/msp-thank-you/</loc>
		<lastmod>2025-11-25T19:48:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/contact-us/</loc>
		<lastmod>2025-11-25T19:05:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-prevention-checklist/</loc>
		<lastmod>2025-12-17T20:57:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-ransomware-prevention-guide/</loc>
		<lastmod>2025-12-17T20:57:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/explore-portfolio/</loc>
		<lastmod>2025-11-25T18:52:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-webroot-comparison-report/</loc>
		<lastmod>2025-11-25T17:23:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-open-xdr-vs-native-xdr/</loc>
		<lastmod>2025-12-10T00:58:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-ransomware-cheat-codes/</loc>
		<lastmod>2025-11-25T16:48:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/coordinated-vulnerability-disclosure-program/guidelines/</loc>
		<lastmod>2026-01-09T10:31:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/coordinated-vulnerability-disclosure-program/</loc>
		<lastmod>2026-01-12T09:45:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/typ-newsletter/</loc>
		<lastmod>2025-12-05T20:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/newsletter/</loc>
		<lastmod>2025-11-25T16:36:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/vs/sentinelone/</loc>
		<lastmod>2025-12-10T19:35:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-22-point-checklist/</loc>
		<lastmod>2025-11-25T16:05:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/request-ransomware-protection/</loc>
		<lastmod>2025-12-04T22:32:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-edu-ransomware-emergency-kit/</loc>
		<lastmod>2025-11-26T17:48:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-webinar-ransomware-cheat-codes/</loc>
		<lastmod>2025-11-26T17:42:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-10-step-recovery-plan/</loc>
		<lastmod>2025-11-24T22:31:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/partner-locator-request/</loc>
		<lastmod>2025-11-13T18:43:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-microsoft-comparison-report/</loc>
		<lastmod>2025-11-21T18:50:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/technology-integrations/tech-integrator-application/</loc>
		<lastmod>2025-11-14T01:06:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-state-of-malware-2024-deu/</loc>
		<lastmod>2025-11-21T01:15:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-state-of-malware-2024-uk/</loc>
		<lastmod>2025-11-21T00:53:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/typ-webinar-nis2-fra-2/</loc>
		<lastmod>2025-11-20T23:57:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-webinar-nis2-deu/</loc>
		<lastmod>2025-11-20T23:48:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-native-xdr/</loc>
		<lastmod>2025-12-10T00:51:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-webinar-payette-associates/</loc>
		<lastmod>2025-12-03T00:07:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/webinar-nello-typ/</loc>
		<lastmod>2025-11-26T17:48:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/game-change-with-mdr/</loc>
		<lastmod>2025-11-12T22:41:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-carbon-black-comparison-report/</loc>
		<lastmod>2025-11-14T01:37:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-kaspersky-comparison-report/</loc>
		<lastmod>2025-11-13T19:23:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-higher-ed-state-of-malware-2024/</loc>
		<lastmod>2025-11-13T17:45:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-edu-mrg-effitas/</loc>
		<lastmod>2025-11-13T17:44:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-cost-of-complexity/</loc>
		<lastmod>2025-11-13T17:43:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-state-of-malware-2024/</loc>
		<lastmod>2025-11-13T17:41:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-k12-state-of-malware-2024/</loc>
		<lastmod>2025-11-13T00:41:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-nis2-compliance/</loc>
		<lastmod>2025-11-13T17:40:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/partner-program/contact-us/</loc>
		<lastmod>2025-11-26T17:44:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-k12-ransomware-emergency-kit/</loc>
		<lastmod>2025-11-13T17:38:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-k12-is-mdr-right-2024/</loc>
		<lastmod>2025-11-13T17:36:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-prevention-guide-2024/</loc>
		<lastmod>2024-10-21T17:36:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-webinar-dedalus/</loc>
		<lastmod>2025-11-13T17:34:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-webinar-nis2/</loc>
		<lastmod>2025-11-13T17:33:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-state-of-ransomware-2024/</loc>
		<lastmod>2025-11-26T17:48:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/partner-enroll-with-electric/</loc>
		<lastmod>2025-11-13T17:30:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/partner-meeting-request/</loc>
		<lastmod>2025-11-13T17:29:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-is-mdr-right-2024/</loc>
		<lastmod>2025-11-13T17:28:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-mdr-guide-2024/</loc>
		<lastmod>2025-11-12T22:27:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-open-xdr/</loc>
		<lastmod>2025-12-10T00:47:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-sase/</loc>
		<lastmod>2025-12-10T00:38:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-ztna/</loc>
		<lastmod>2025-12-10T00:24:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-sd-wan/</loc>
		<lastmod>2025-12-10T00:03:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-mrg-effitas/</loc>
		<lastmod>2025-11-12T21:41:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-ldap/</loc>
		<lastmod>2025-12-09T23:56:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-yara-rule/</loc>
		<lastmod>2025-12-09T23:52:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/dl-2024-ransomware-emergency-kit/</loc>
		<lastmod>2024-10-21T17:38:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/what-is-dfir/</loc>
		<lastmod>2025-12-09T23:47:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-a-domain-controller/</loc>
		<lastmod>2025-12-09T23:35:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-arm/</loc>
		<lastmod>2025-12-09T23:28:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-arm64/</loc>
		<lastmod>2025-12-09T23:22:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-a-data-lake/</loc>
		<lastmod>2025-12-09T23:16:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-syslog/</loc>
		<lastmod>2025-12-09T23:11:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-rootkit/</loc>
		<lastmod>2025-12-09T23:06:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/webinar-nello/</loc>
		<lastmod>2025-12-02T23:57:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-active-directory/</loc>
		<lastmod>2025-12-09T22:57:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/vs/crowdstrike/</loc>
		<lastmod>2025-12-10T19:32:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/technology-integrations/teamviewer/</loc>
		<lastmod>2025-11-12T00:10:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-ttp/</loc>
		<lastmod>2025-12-09T19:24:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/thank-you-for-joining-our-newsletter/</loc>
		<lastmod>2025-11-11T23:53:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/vs/webroot/</loc>
		<lastmod>2025-12-10T19:26:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/products/nebula/</loc>
		<lastmod>2025-12-05T20:38:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-cmmc/</loc>
		<lastmod>2025-12-09T18:32:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-finra/</loc>
		<lastmod>2025-12-09T18:27:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-iso/</loc>
		<lastmod>2025-12-09T18:18:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-malvertising/</loc>
		<lastmod>2025-12-09T18:12:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-pum/</loc>
		<lastmod>2025-12-09T18:08:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-xdr/</loc>
		<lastmod>2025-12-09T18:03:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-pup/</loc>
		<lastmod>2025-12-09T17:58:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-soc-2/</loc>
		<lastmod>2025-12-09T17:55:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-sarbanes-oxley/</loc>
		<lastmod>2025-12-09T16:59:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-hitech/</loc>
		<lastmod>2024-06-06T16:48:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-epp/</loc>
		<lastmod>2025-12-09T16:42:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-cert/</loc>
		<lastmod>2025-12-09T16:01:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-cybersecurity/</loc>
		<lastmod>2025-12-09T15:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-nis2/</loc>
		<lastmod>2025-12-09T15:54:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-cyber-essentials/</loc>
		<lastmod>2025-12-09T15:46:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-hipaa/</loc>
		<lastmod>2024-06-03T19:19:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-pci-dss/</loc>
		<lastmod>2025-12-09T15:40:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-cisa/</loc>
		<lastmod>2025-12-09T15:26:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-ccpa/</loc>
		<lastmod>2025-12-09T15:22:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-glba/</loc>
		<lastmod>2025-12-09T15:17:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-ferpa/</loc>
		<lastmod>2025-12-09T15:13:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/legal/ccpa/</loc>
		<lastmod>2024-05-28T17:43:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-nist/</loc>
		<lastmod>2025-12-09T15:09:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-cipa/</loc>
		<lastmod>2025-12-09T15:03:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/demo-request/</loc>
		<lastmod>2025-11-14T00:53:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/vs/trend-micro/</loc>
		<lastmod>2025-12-10T19:24:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/legal/terms-of-service/</loc>
		<lastmod>2025-12-06T00:25:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/legal/accessibility/</loc>
		<lastmod>2025-12-06T00:31:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/vs/eset/</loc>
		<lastmod>2025-12-10T19:31:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/custom-quote/higher-education/</loc>
		<lastmod>2025-11-14T00:58:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/vs/trellix/</loc>
		<lastmod>2025-11-11T23:30:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/legal/copyright/</loc>
		<lastmod>2025-12-06T00:31:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/vs/kaspersky/</loc>
		<lastmod>2025-12-10T19:33:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/vs/microsoft/</loc>
		<lastmod>2025-12-10T19:34:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/vs/carbon-black/</loc>
		<lastmod>2025-12-10T19:27:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/vs/</loc>
		<lastmod>2025-12-01T17:47:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/technology-integrations/</loc>
		<lastmod>2025-12-17T17:44:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/what-is-security-awareness-training/</loc>
		<lastmod>2025-12-09T14:51:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-pretexting/</loc>
		<lastmod>2024-06-03T19:17:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-bring-your-own-device-byod/</loc>
		<lastmod>2025-12-09T03:02:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-business-email-compromise-bec/</loc>
		<lastmod>2025-12-09T02:46:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-gdpr/</loc>
		<lastmod>2025-12-09T02:33:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-alert-fatigue/</loc>
		<lastmod>2025-12-09T02:26:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-content-filtering/</loc>
		<lastmod>2025-12-09T02:17:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-data-protection/</loc>
		<lastmod>2025-12-09T02:09:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-data-loss-prevention-dlp/</loc>
		<lastmod>2025-12-09T02:04:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-incident-response/</loc>
		<lastmod>2025-12-09T02:01:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-zero-trust/</loc>
		<lastmod>2025-12-09T01:48:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-cloud-security/</loc>
		<lastmod>2025-12-09T01:37:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-soc-security-operations-center/</loc>
		<lastmod>2025-12-09T01:31:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-siem/</loc>
		<lastmod>2025-12-09T01:27:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-vulnerability-management/</loc>
		<lastmod>2025-12-09T01:23:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-patch-management/</loc>
		<lastmod>2025-12-09T01:18:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-ransomware/</loc>
		<lastmod>2025-12-09T01:14:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-next-generation-antivirus-ngav/</loc>
		<lastmod>2025-12-09T01:03:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-email-security/</loc>
		<lastmod>2025-12-09T01:00:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-cyber-espionage/</loc>
		<lastmod>2025-12-09T00:56:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/dns-poisoning-guide-what-is-dns-hijacking/</loc>
		<lastmod>2025-12-09T00:50:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-device-control/</loc>
		<lastmod>2025-12-09T00:45:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-threat-detection-and-response-tdr/</loc>
		<lastmod>2025-12-09T14:38:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-soar-security-orchestration-automation-and-response/</loc>
		<lastmod>2025-12-09T00:37:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-cyber-threat-hunting/</loc>
		<lastmod>2025-12-09T14:38:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-cyber-threat-intelligence/</loc>
		<lastmod>2025-12-09T14:38:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-mobile-device-management-mdm/</loc>
		<lastmod>2025-12-09T00:25:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-endpoint-detection-and-response-edr/</loc>
		<lastmod>2025-12-09T00:20:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-endpoint-security/</loc>
		<lastmod>2025-12-09T14:37:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-cyber-liability-insurance/</loc>
		<lastmod>2025-12-09T00:07:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/partner-program/partner-reseller/</loc>
		<lastmod>2025-12-05T19:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-a-brute-force-attack/</loc>
		<lastmod>2025-12-09T00:03:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-mobile-device-security/</loc>
		<lastmod>2025-12-09T14:37:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-mitre-attack-framework/</loc>
		<lastmod>2025-12-08T23:42:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-mdr/</loc>
		<lastmod>2025-12-18T21:44:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-hermeticwiper/</loc>
		<lastmod>2025-12-08T22:46:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-a-firewall/</loc>
		<lastmod>2025-12-08T22:35:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/legal/trust-and-compliance/</loc>
		<lastmod>2025-12-06T00:40:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/partner-program/msp/</loc>
		<lastmod>2025-12-18T17:53:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/partner-program/</loc>
		<lastmod>2025-12-05T20:35:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/custom-quote/endpoint-detection-and-response/</loc>
		<lastmod>2025-12-03T21:03:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/custom-quote/managed-threat-hunting/</loc>
		<lastmod>2025-11-14T00:40:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/custom-quote/endpoint-protection/</loc>
		<lastmod>2025-11-14T00:40:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/custom-quote/mobile-security/</loc>
		<lastmod>2025-11-14T00:40:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/custom-quote/security-advisor/</loc>
		<lastmod>2025-11-14T00:40:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/custom-quote/vulnerability-assessment/</loc>
		<lastmod>2025-11-14T00:40:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/custom-quote/patch-management/</loc>
		<lastmod>2025-11-14T00:41:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/custom-quote/application-block/</loc>
		<lastmod>2025-11-14T00:45:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/custom-quote/dns-filtering/</loc>
		<lastmod>2025-11-14T00:45:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/custom-quote/managed-detection-and-response/</loc>
		<lastmod>2025-11-14T00:47:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/custom-quote/k12/</loc>
		<lastmod>2025-11-14T00:48:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/custom-quote/</loc>
		<lastmod>2025-11-13T18:39:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/products/managed-threat-hunting/</loc>
		<lastmod>2025-12-18T01:22:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/products/managed-detection-and-response/</loc>
		<lastmod>2025-12-18T01:21:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/pricing/bundle-and-save/</loc>
		<lastmod>2025-12-05T19:47:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/products/endpoint-protection/</loc>
		<lastmod>2025-12-18T01:15:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/pricing/bundles/</loc>
		<lastmod>2024-12-03T16:13:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/products/mobile-security/</loc>
		<lastmod>2025-12-18T01:19:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/what-is-dns-filtering/</loc>
		<lastmod>2025-12-08T22:22:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/glossary/</loc>
		<lastmod>2025-06-10T19:16:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/products/patch-management/</loc>
		<lastmod>2025-12-18T01:17:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/legal/subprocessors/</loc>
		<lastmod>2025-12-08T17:32:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/legal/dpa/</loc>
		<lastmod>2025-12-15T18:08:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/partner-program/partner-reseller/reseller-application/</loc>
		<lastmod>2025-11-13T18:50:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/partner-program/msp/msp-application/</loc>
		<lastmod>2026-01-16T14:03:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/legal/lifecycle/</loc>
		<lastmod>2024-04-14T16:37:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/legal/managed-services-agreement/</loc>
		<lastmod>2025-12-06T00:57:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/legal/support-services-agreement/</loc>
		<lastmod>2025-12-06T00:52:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/legal/</loc>
		<lastmod>2026-01-09T17:03:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/legal/beta/</loc>
		<lastmod>2025-12-08T17:14:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/legal/gdpr-commitment/</loc>
		<lastmod>2025-12-15T17:53:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/legal/eula/</loc>
		<lastmod>2025-12-06T00:48:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/education/</loc>
		<lastmod>2025-12-01T17:37:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/products/application-block/</loc>
		<lastmod>2025-12-18T01:18:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/products/endpoint-detection-and-response/</loc>
		<lastmod>2026-01-16T20:51:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/legal/privacy-policy/</loc>
		<lastmod>2025-12-19T20:56:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/products/vulnerability-assessment/</loc>
		<lastmod>2025-12-18T01:15:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/pricing/</loc>
		<lastmod>2025-11-04T13:16:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/products/</loc>
		<lastmod>2025-06-26T17:30:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/try-now/</loc>
		<lastmod>2023-12-05T21:09:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/about-us/</loc>
		<lastmod>2025-12-18T01:34:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/products/security-advisor/</loc>
		<lastmod>2025-12-17T23:50:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/press/releases/cybercrime-enters-a-post-human-future-as-ai-drives-the-shift-to-machine-scale-attacks-according-to-threatdowns-2026-state-of-malware-report/</loc>
		<lastmod>2026-02-02T18:18:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/176-65-148-247/</loc>
		<lastmod>2026-01-21T07:22:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/95-214-55-246/</loc>
		<lastmod>2026-01-19T07:49:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/5-183-209-196/</loc>
		<lastmod>2026-01-19T07:41:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/resources/group-tyre-case-study/</loc>
		<lastmod>2026-01-16T18:26:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/204-76-203-6/</loc>
		<lastmod>2026-01-16T07:55:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/87-121-84-51/</loc>
		<lastmod>2026-01-16T07:47:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/35-216-195-77/</loc>
		<lastmod>2026-01-14T07:30:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/resources/2025-ransomware-prevention-checklist/</loc>
		<lastmod>2026-01-12T16:13:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/resources/2025-ransomware-prevention-guide/</loc>
		<lastmod>2026-01-12T16:10:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/antitrojanwalls-live/</loc>
		<lastmod>2026-01-12T07:27:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/87-121-84-24/</loc>
		<lastmod>2026-01-09T07:28:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/95-214-54-147/</loc>
		<lastmod>2026-01-09T07:20:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/89-42-231-200/</loc>
		<lastmod>2026-01-08T07:26:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/91-200-220-115/</loc>
		<lastmod>2026-01-06T07:24:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/91-202-233-79/</loc>
		<lastmod>2026-01-05T07:23:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/204-76-203-215/</loc>
		<lastmod>2026-01-01T10:53:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/206-71-158-17/</loc>
		<lastmod>2026-01-01T10:47:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/185-241-208-170/</loc>
		<lastmod>2025-12-31T09:46:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/195-178-110-162/</loc>
		<lastmod>2025-12-31T09:33:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/81-29-142-100/</loc>
		<lastmod>2025-12-30T06:58:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/54-81-212-11/</loc>
		<lastmod>2025-12-28T09:43:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/87-121-84-44/</loc>
		<lastmod>2025-12-27T09:52:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/198-44-136-252/</loc>
		<lastmod>2025-12-27T09:45:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/pup-optional-nibblrai/</loc>
		<lastmod>2025-12-26T10:54:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/91-224-92-128/</loc>
		<lastmod>2025-12-26T10:05:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/46-151-178-49/</loc>
		<lastmod>2025-12-26T09:58:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/34-75-127-116/</loc>
		<lastmod>2025-12-26T09:49:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/167-71-204-99/</loc>
		<lastmod>2025-12-24T09:05:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/pup-optional-pulsebrowser/</loc>
		<lastmod>2025-12-22T08:18:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/94-130-198-6/</loc>
		<lastmod>2025-12-22T07:48:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/84-239-5-34/</loc>
		<lastmod>2025-12-18T07:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/168-119-25-102/</loc>
		<lastmod>2025-12-18T07:49:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/167-235-163-216/</loc>
		<lastmod>2025-12-18T07:29:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/ai-orchestrated-cyberattacks/</loc>
		<lastmod>2025-12-17T18:10:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/adware-macshop/</loc>
		<lastmod>2025-12-17T07:53:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/81-29-142-50/</loc>
		<lastmod>2025-12-17T07:31:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/204-76-203-20/</loc>
		<lastmod>2025-12-17T07:25:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/172-245-21-30/</loc>
		<lastmod>2025-12-15T09:00:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/18-189-43-138/</loc>
		<lastmod>2025-12-15T08:43:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/176-65-132-67/</loc>
		<lastmod>2025-12-15T08:30:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/199-127-63-154/</loc>
		<lastmod>2025-12-15T08:24:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/173-249-217-7/</loc>
		<lastmod>2025-12-15T07:53:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/78587924-xyz/</loc>
		<lastmod>2025-12-15T07:41:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/ea6c0ac4-xyz/</loc>
		<lastmod>2025-12-15T07:29:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/resources/audit-logs-demo-video/</loc>
		<lastmod>2025-12-15T18:53:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/5-187-35-158/</loc>
		<lastmod>2025-12-12T08:11:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/84-239-16-47/</loc>
		<lastmod>2025-12-12T08:05:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/91-224-92-109/</loc>
		<lastmod>2025-12-10T08:10:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/3-138-204-93/</loc>
		<lastmod>2025-12-10T08:04:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/tracking-remote-ransomware-attacks-at-their-source/</loc>
		<lastmod>2025-12-10T11:55:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/91-239-216-99/</loc>
		<lastmod>2025-12-09T07:23:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/45-226-112-204/</loc>
		<lastmod>2025-12-08T10:28:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/91-232-238-106/</loc>
		<lastmod>2025-12-08T09:01:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/121-91-235-186/</loc>
		<lastmod>2025-12-08T08:43:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/94-156-152-7/</loc>
		<lastmod>2025-12-08T08:26:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/14-102-231-201/</loc>
		<lastmod>2025-12-08T08:20:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/spyware-stealer/</loc>
		<lastmod>2025-12-08T07:56:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/13-221-8-156/</loc>
		<lastmod>2025-12-05T07:24:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/36-255-98-221/</loc>
		<lastmod>2025-12-05T07:18:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/185-224-128-136/</loc>
		<lastmod>2025-12-04T07:52:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/92-63-197-180/</loc>
		<lastmod>2025-12-03T08:28:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/resources/navigating-compliance-for-business-leaders-infographic/</loc>
		<lastmod>2025-12-02T21:38:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/resources/compliance-readiness-checklist/</loc>
		<lastmod>2025-12-02T21:36:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/resources/compliance-framework-for-business-report/</loc>
		<lastmod>2025-12-02T21:35:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/195-154-176-209/</loc>
		<lastmod>2025-12-02T08:12:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/ey43-com/</loc>
		<lastmod>2025-12-01T08:50:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/176-65-148-16/</loc>
		<lastmod>2025-12-01T08:34:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/62-60-135-159/</loc>
		<lastmod>2025-12-01T08:18:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/157-245-158-239/</loc>
		<lastmod>2025-12-01T08:07:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/45-144-212-20/</loc>
		<lastmod>2025-12-01T08:01:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/141-98-11-172/</loc>
		<lastmod>2025-12-01T07:55:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/77-83-207-131/</loc>
		<lastmod>2025-12-01T07:49:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/37-46-199-54/</loc>
		<lastmod>2025-12-01T07:25:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/213-209-143-50/</loc>
		<lastmod>2025-11-28T07:57:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/174-138-87-36/</loc>
		<lastmod>2025-11-27T07:31:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/94-26-88-18/</loc>
		<lastmod>2025-11-26T08:16:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/217-60-248-181/</loc>
		<lastmod>2025-11-26T07:58:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/176-65-148-190/</loc>
		<lastmod>2025-11-26T07:49:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/192-159-99-95/</loc>
		<lastmod>2025-11-25T07:49:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/176-65-148-34/</loc>
		<lastmod>2025-11-25T07:43:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/87-120-191-124/</loc>
		<lastmod>2025-11-24T08:17:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/193-34-213-150/</loc>
		<lastmod>2025-11-24T08:10:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/89-42-231-77/</loc>
		<lastmod>2025-11-24T08:04:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/45-158-38-202/</loc>
		<lastmod>2025-11-20T08:08:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/45-135-193-9/</loc>
		<lastmod>2025-11-20T08:02:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/192-159-99-180/</loc>
		<lastmod>2025-11-19T08:40:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/185-91-127-97/</loc>
		<lastmod>2025-11-19T08:07:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/137-184-80-178/</loc>
		<lastmod>2025-11-19T08:01:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/wayfarerorthodox-com/</loc>
		<lastmod>2025-11-18T08:05:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/resources/securing-the-digital-frontier-from-inbox-to-endpoint/</loc>
		<lastmod>2025-11-17T21:03:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/coinminer-trojan-miner-dds/</loc>
		<lastmod>2025-11-17T10:31:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/87-121-84-52/</loc>
		<lastmod>2025-11-17T10:08:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/45-142-154-98/</loc>
		<lastmod>2025-11-17T08:32:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/176-65-148-122/</loc>
		<lastmod>2025-11-17T08:26:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/192-46-235-159/</loc>
		<lastmod>2025-11-17T08:19:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/91-239-216-8/</loc>
		<lastmod>2025-11-17T08:05:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/45-148-10-248/</loc>
		<lastmod>2025-11-14T08:05:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/192-159-99-47/</loc>
		<lastmod>2025-11-14T07:57:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/88-210-63-69/</loc>
		<lastmod>2025-11-13T07:27:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/trojan-downloader-mshta-generic/</loc>
		<lastmod>2025-11-12T08:23:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/press/releases/threatdown-launches-nexus-partner-program-strengthening-its-channel-first-commitment/</loc>
		<lastmod>2025-11-10T21:37:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/206-72-206-178/</loc>
		<lastmod>2025-11-11T08:14:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/185-224-128-19/</loc>
		<lastmod>2025-11-10T08:03:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/78-135-107-199/</loc>
		<lastmod>2025-11-10T07:57:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/backdoor-xworm/</loc>
		<lastmod>2025-11-07T09:04:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/resources/2025-state-of-ransomware-for-msps-report/</loc>
		<lastmod>2025-11-06T19:46:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/resources/compliance-readiness-checklist-for-msps/</loc>
		<lastmod>2025-11-06T19:39:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/resources/industry-trend-report-the-growing-risk-of-ai-accelerated-vulnerabilities/</loc>
		<lastmod>2025-11-06T17:52:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/71-6-232-30/</loc>
		<lastmod>2025-11-05T07:58:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/82-165-93-136/</loc>
		<lastmod>2025-11-04T07:57:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/157-245-254-133/</loc>
		<lastmod>2025-11-04T07:51:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/91-232-238-112/</loc>
		<lastmod>2025-11-04T07:44:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/inside-edr-freeze-how-threatdown-stops-the-attack-before-it-spreads/</loc>
		<lastmod>2025-11-20T18:47:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/185-224-128-14/</loc>
		<lastmod>2025-11-03T08:23:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/209-38-201-154/</loc>
		<lastmod>2025-11-03T08:16:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/79-124-62-61/</loc>
		<lastmod>2025-11-03T08:04:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/94-74-191-2/</loc>
		<lastmod>2025-11-03T07:58:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/94-74-191-5/</loc>
		<lastmod>2025-11-03T07:52:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/196-251-117-117/</loc>
		<lastmod>2025-10-31T07:45:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/78-159-130-8/</loc>
		<lastmod>2025-10-31T07:33:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/71-6-232-29/</loc>
		<lastmod>2025-10-29T07:28:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/196-251-81-153/</loc>
		<lastmod>2025-10-28T08:04:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/halocolor-com/</loc>
		<lastmod>2025-10-28T07:47:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/213-209-157-24/</loc>
		<lastmod>2025-10-27T08:49:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/38-45-72-115/</loc>
		<lastmod>2025-10-27T08:42:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/51-158-61-186/</loc>
		<lastmod>2025-10-27T08:35:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/195-178-110-136/</loc>
		<lastmod>2025-10-27T07:53:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/51-158-54-10/</loc>
		<lastmod>2025-10-27T07:44:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/206-191-154-44/</loc>
		<lastmod>2025-10-27T07:36:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/109-205-213-105/</loc>
		<lastmod>2025-10-27T07:27:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/pup-optional-sparkonsoft/</loc>
		<lastmod>2025-10-24T12:21:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/5-253-86-217/</loc>
		<lastmod>2025-10-23T07:13:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/192-159-99-162/</loc>
		<lastmod>2025-10-23T06:46:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/194-163-129-51/</loc>
		<lastmod>2025-10-22T07:15:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/213-209-157-218/</loc>
		<lastmod>2025-10-22T06:55:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/resources/5-early-signs-of-ransomware/</loc>
		<lastmod>2025-11-05T22:06:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/5-253-86-16/</loc>
		<lastmod>2025-10-21T06:40:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/45-142-193-27/</loc>
		<lastmod>2025-10-20T07:35:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/195-96-129-4/</loc>
		<lastmod>2025-10-20T07:27:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/87-120-191-127/</loc>
		<lastmod>2025-10-20T07:18:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/213-209-157-254/</loc>
		<lastmod>2025-10-20T06:54:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/54-208-3-108/</loc>
		<lastmod>2025-10-20T06:40:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/196-251-72-152/</loc>
		<lastmod>2025-10-17T06:57:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/yweakelandord-com/</loc>
		<lastmod>2025-10-17T06:50:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/45-58-127-135/</loc>
		<lastmod>2025-10-16T09:19:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/lleana-com/</loc>
		<lastmod>2025-10-16T09:12:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/snaptrckr-fun/</loc>
		<lastmod>2025-10-16T08:30:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/hotsoz-com/</loc>
		<lastmod>2025-10-16T08:19:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/trojan-mcrypt-msil-generic/</loc>
		<lastmod>2025-10-16T08:06:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/riskware-misusedlegit-gotoresolve/</loc>
		<lastmod>2025-10-15T06:51:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/196-251-117-16/</loc>
		<lastmod>2025-10-14T07:01:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/87-120-191-90/</loc>
		<lastmod>2025-10-14T06:53:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/87-120-191-91/</loc>
		<lastmod>2025-10-14T06:47:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/87-121-84-101/</loc>
		<lastmod>2025-10-14T06:40:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/198-54-129-60/</loc>
		<lastmod>2025-10-13T07:27:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/159-89-235-98/</loc>
		<lastmod>2025-10-13T07:16:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/88-214-50-114/</loc>
		<lastmod>2025-10-13T06:55:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/143-244-181-47/</loc>
		<lastmod>2025-10-13T06:48:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/45-88-186-85/</loc>
		<lastmod>2025-10-12T20:14:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/ku34bh9la09-com/</loc>
		<lastmod>2025-10-12T20:01:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/204-76-203-30/</loc>
		<lastmod>2025-10-10T06:43:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/94-156-152-38/</loc>
		<lastmod>2025-10-09T06:38:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/resources/rvt-case-study/</loc>
		<lastmod>2025-10-08T21:56:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/172-105-80-201/</loc>
		<lastmod>2025-10-08T06:31:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/87-120-191-37/</loc>
		<lastmod>2025-10-07T07:19:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/185-107-44-223/</loc>
		<lastmod>2025-10-07T07:12:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/185-177-72-48/</loc>
		<lastmod>2025-10-07T06:54:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/45-14-225-27/</loc>
		<lastmod>2025-10-07T06:47:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/oundhertobeconsist-org/</loc>
		<lastmod>2025-10-06T10:27:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/52-3-69-115/</loc>
		<lastmod>2025-10-06T10:06:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/45-38-44-226/</loc>
		<lastmod>2025-10-06T08:18:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/77-83-207-136/</loc>
		<lastmod>2025-10-06T07:58:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/88-210-63-67/</loc>
		<lastmod>2025-10-06T07:48:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/5-253-86-21/</loc>
		<lastmod>2025-10-06T07:35:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/195-178-110-160/</loc>
		<lastmod>2025-10-06T07:22:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/152-53-148-66/</loc>
		<lastmod>2025-10-06T07:14:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/generic-malware-gen-dds/</loc>
		<lastmod>2025-10-06T06:53:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/195-178-110-109/</loc>
		<lastmod>2025-10-03T07:34:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/195-178-110-15/</loc>
		<lastmod>2025-10-03T07:27:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/213-209-157-162/</loc>
		<lastmod>2025-10-03T07:13:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/lfarewesbeginn-com/</loc>
		<lastmod>2025-10-03T06:57:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/46-150-83-21/</loc>
		<lastmod>2025-10-02T07:02:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/resources/it-leasingteam-case-study/</loc>
		<lastmod>2025-10-01T17:34:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/ahacdn-me/</loc>
		<lastmod>2025-10-01T06:53:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/144-172-97-117/</loc>
		<lastmod>2025-09-30T07:48:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/94-74-164-59/</loc>
		<lastmod>2025-09-30T07:31:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/pup-optional-onebrowser/</loc>
		<lastmod>2025-09-30T07:22:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/185-243-96-116/</loc>
		<lastmod>2025-09-29T09:06:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/176-65-132-155/</loc>
		<lastmod>2025-09-29T08:49:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/31-59-58-241/</loc>
		<lastmod>2025-09-29T08:42:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/193-17-183-25/</loc>
		<lastmod>2025-09-29T08:35:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/23-95-184-98/</loc>
		<lastmod>2025-09-29T08:29:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/195-178-110-201/</loc>
		<lastmod>2025-09-29T08:23:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/173-230-153-69/</loc>
		<lastmod>2025-09-29T08:17:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/ransom-qilin/</loc>
		<lastmod>2025-09-29T07:17:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/192-159-99-101/</loc>
		<lastmod>2025-09-26T07:23:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/124-198-131-145/</loc>
		<lastmod>2025-09-26T07:14:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/124-198-132-121/</loc>
		<lastmod>2025-09-26T07:05:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/176-97-210-9/</loc>
		<lastmod>2025-09-25T06:30:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/resources/2025-state-of-ransomware-webinar/</loc>
		<lastmod>2025-09-24T20:46:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/91-224-92-34/</loc>
		<lastmod>2025-09-24T07:00:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/204-76-203-29/</loc>
		<lastmod>2025-09-24T06:52:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/80-75-212-83/</loc>
		<lastmod>2025-09-23T06:32:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/resources/endpoint-evaluation-guide/</loc>
		<lastmod>2025-09-22T21:06:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/31-222-238-6/</loc>
		<lastmod>2025-09-22T09:46:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/45-88-186-32/</loc>
		<lastmod>2025-09-22T09:40:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/playhubconnect-com/</loc>
		<lastmod>2025-09-22T09:33:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/parashparyro-com/</loc>
		<lastmod>2025-09-22T09:25:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/solidlypall-shop/</loc>
		<lastmod>2025-09-22T09:19:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/spyware-jsceal/</loc>
		<lastmod>2025-09-22T09:10:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/pup-optional-convertmate/</loc>
		<lastmod>2025-09-22T08:51:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/pup-optional-calendaromatic/</loc>
		<lastmod>2025-09-22T07:40:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/resources/contarini-leopoldo-case-study/</loc>
		<lastmod>2025-09-25T17:41:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/54-226-226-57/</loc>
		<lastmod>2025-09-19T09:17:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/5-187-35-27/</loc>
		<lastmod>2025-09-19T09:10:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/160-191-243-178/</loc>
		<lastmod>2025-09-19T08:03:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/162-55-212-128/</loc>
		<lastmod>2025-09-19T07:54:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/nlargeconsult-org/</loc>
		<lastmod>2025-09-19T07:22:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/dskwke-com/</loc>
		<lastmod>2025-09-18T06:39:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/147-135-31-115/</loc>
		<lastmod>2025-09-17T07:23:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/178-22-31-192/</loc>
		<lastmod>2025-09-17T07:16:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/trojan-pyengyloader/</loc>
		<lastmod>2025-09-17T07:09:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/osx-agentproxy/</loc>
		<lastmod>2025-09-16T07:39:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/213-136-76-19/</loc>
		<lastmod>2025-09-15T07:16:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/45-135-194-20/</loc>
		<lastmod>2025-09-15T07:07:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/37-60-141-156/</loc>
		<lastmod>2025-09-15T07:00:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/viiiwovl-com/</loc>
		<lastmod>2025-09-15T06:31:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/196-251-84-66/</loc>
		<lastmod>2025-09-12T06:23:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/dsiyzy-com/</loc>
		<lastmod>2025-09-12T06:16:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/press/in-the-news/ai-emerges-as-the-hope-and-risk-for-overloaded-socs/</loc>
		<lastmod>2025-10-22T16:49:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/45-156-87-179/</loc>
		<lastmod>2025-09-11T06:42:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/press/in-the-news/students-pose-inside-threat-to-education-sector/</loc>
		<lastmod>2025-10-22T16:46:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/press/releases/syncro-and-threatdown-partner-to-simplify-security-for-msps/</loc>
		<lastmod>2025-09-08T21:55:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/198-55-98-117/</loc>
		<lastmod>2025-09-09T07:18:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/45-140-19-101/</loc>
		<lastmod>2025-09-09T07:10:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/212-11-64-8/</loc>
		<lastmod>2025-09-08T08:55:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/178-22-24-60/</loc>
		<lastmod>2025-09-08T08:49:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/79-124-49-194/</loc>
		<lastmod>2025-09-08T08:42:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/103-20-103-50/</loc>
		<lastmod>2025-09-08T08:36:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/trojan-hijackloader/</loc>
		<lastmod>2025-09-08T08:29:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/37-60-141-158/</loc>
		<lastmod>2025-09-08T07:05:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/92-42-201-26/</loc>
		<lastmod>2025-09-08T06:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/148-113-198-50/</loc>
		<lastmod>2025-09-08T06:51:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/91-99-211-200/</loc>
		<lastmod>2025-09-08T06:44:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/87-120-191-13/</loc>
		<lastmod>2025-09-05T07:10:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/138-36-152-214/</loc>
		<lastmod>2025-09-05T07:02:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/185-156-73-166/</loc>
		<lastmod>2025-09-05T06:55:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/starprize-za-com/</loc>
		<lastmod>2025-09-05T06:47:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/185-93-89-97/</loc>
		<lastmod>2025-09-04T07:19:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/178-16-54-100/</loc>
		<lastmod>2025-09-04T07:12:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/104-250-164-117/</loc>
		<lastmod>2025-09-02T07:35:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/oglalavoodoo-world/</loc>
		<lastmod>2025-09-02T07:27:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/trojan-crypt-msil/</loc>
		<lastmod>2025-09-02T07:16:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/95-214-55-63/</loc>
		<lastmod>2025-09-01T07:17:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/45-135-193-100/</loc>
		<lastmod>2025-09-01T07:03:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/195-96-129-61/</loc>
		<lastmod>2025-09-01T06:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/press/in-the-news/ransomware-gang-takedowns-causing-explosion-of-new-smaller-groups/</loc>
		<lastmod>2025-10-22T16:46:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/how-nist-is-going-to-secure-ai/</loc>
		<lastmod>2025-08-29T16:21:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/196-251-72-128/</loc>
		<lastmod>2025-08-29T06:49:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/45-135-194-10/</loc>
		<lastmod>2025-08-29T06:40:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/176-9-38-245/</loc>
		<lastmod>2025-08-28T07:29:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/resources/demystifying-compliance-for-msps-report/</loc>
		<lastmod>2025-08-26T17:29:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/5-253-86-23/</loc>
		<lastmod>2025-08-26T06:52:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/185-169-4-184/</loc>
		<lastmod>2025-08-26T06:45:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/204-76-203-8/</loc>
		<lastmod>2025-08-25T07:51:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/146-70-76-43/</loc>
		<lastmod>2025-08-25T07:42:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/139-45-197-106/</loc>
		<lastmod>2025-08-25T07:12:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/dolastagne-rest/</loc>
		<lastmod>2025-08-25T07:00:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/pup-optional-pdfeditor/</loc>
		<lastmod>2025-08-25T06:49:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/77-90-185-47/</loc>
		<lastmod>2025-08-22T08:50:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/196-251-69-194/</loc>
		<lastmod>2025-08-22T08:42:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/pup-optional-zoominfo/</loc>
		<lastmod>2025-08-22T08:18:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/179-43-161-226/</loc>
		<lastmod>2025-08-21T07:18:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/87-121-84-45/</loc>
		<lastmod>2025-08-21T07:10:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/91-224-92-14/</loc>
		<lastmod>2025-08-21T07:02:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/press/in-the-news/how-malwarebytes-ceo-marcin-kleczynski-accidentally-became-the-internets-spyware-defender/</loc>
		<lastmod>2025-10-22T16:46:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/45-156-87-165/</loc>
		<lastmod>2025-08-20T06:56:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/press/in-the-news/february-ransomware-attacks-hit-record-high-as-threatdown-reports-25-annual-surge/</loc>
		<lastmod>2025-10-22T16:45:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/resources/2025-state-of-ransomware/</loc>
		<lastmod>2025-08-19T15:18:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/press/releases/ransomware-attacks-surge-25-year-over-year-as-new-report-from-threatdown-reveals-alarming-global-expansion-and-evolving-tactics/</loc>
		<lastmod>2025-08-18T21:15:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/voguelift-biz/</loc>
		<lastmod>2025-08-19T07:15:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/bossedmarlier-help/</loc>
		<lastmod>2025-08-18T09:23:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/78-128-114-38/</loc>
		<lastmod>2025-08-18T09:11:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/125-23-91-131/</loc>
		<lastmod>2025-08-18T09:05:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/185-91-127-22/</loc>
		<lastmod>2025-08-18T08:23:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/185-116-107-53/</loc>
		<lastmod>2025-08-18T08:00:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/87-121-84-25/</loc>
		<lastmod>2025-08-18T07:46:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/176-65-149-187/</loc>
		<lastmod>2025-08-18T07:38:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/107-189-11-181/</loc>
		<lastmod>2025-08-18T07:31:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/192-159-99-169/</loc>
		<lastmod>2025-08-18T07:21:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/riskware-misusedlegit-ps/</loc>
		<lastmod>2025-08-18T07:07:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/trojan-downloader-powershell/</loc>
		<lastmod>2025-08-15T09:42:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/172-121-111-230/</loc>
		<lastmod>2025-08-15T07:43:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/45-141-233-208/</loc>
		<lastmod>2025-08-15T07:14:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/press/in-the-news/new-threatdown-gm-kendra-krause-on-plans-to-scale-up-with-msps/</loc>
		<lastmod>2025-10-22T16:44:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/press/in-the-news/sophos-fortinet-vet-to-lead-threatdown/</loc>
		<lastmod>2025-10-22T16:44:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/press/releases/malwarebytes-appoints-kendra-krause-as-general-manager-of-threatdown-business-unit/</loc>
		<lastmod>2025-08-13T19:50:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/83-222-191-218/</loc>
		<lastmod>2025-08-14T08:53:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/103-117-147-234/</loc>
		<lastmod>2025-08-14T08:20:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/173-253-128-11/</loc>
		<lastmod>2025-08-14T08:12:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/196-251-117-75/</loc>
		<lastmod>2025-08-14T07:49:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/162-255-116-181/</loc>
		<lastmod>2025-08-14T07:20:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/87-120-191-128/</loc>
		<lastmod>2025-08-14T07:13:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/ai-has-fully-defeated-how-most-people-authenticate/</loc>
		<lastmod>2025-08-13T12:37:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/193-46-255-46/</loc>
		<lastmod>2025-08-13T07:27:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/176-65-148-225/</loc>
		<lastmod>2025-08-13T07:20:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/207-167-67-230/</loc>
		<lastmod>2025-08-12T06:38:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/trojan-jsceal/</loc>
		<lastmod>2025-08-11T09:22:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/trojan-starter-rtpscript/</loc>
		<lastmod>2025-08-11T08:59:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/196-251-86-50/</loc>
		<lastmod>2025-08-11T07:25:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/161-97-157-34/</loc>
		<lastmod>2025-08-11T07:16:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/5-53-123-43/</loc>
		<lastmod>2025-08-11T07:06:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/81-17-23-243/</loc>
		<lastmod>2025-08-11T06:59:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/81-17-23-242/</loc>
		<lastmod>2025-08-11T06:52:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/157-10-52-168/</loc>
		<lastmod>2025-08-08T08:38:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/dsd1gy-com/</loc>
		<lastmod>2025-08-08T08:31:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/litewo-xyz/</loc>
		<lastmod>2025-08-07T07:54:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/141-98-11-20/</loc>
		<lastmod>2025-08-06T07:00:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/124-198-132-230/</loc>
		<lastmod>2025-08-05T06:53:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/pc-app-store/</loc>
		<lastmod>2025-08-04T07:36:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/83-222-190-246/</loc>
		<lastmod>2025-08-04T07:21:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/5-253-246-108/</loc>
		<lastmod>2025-08-04T07:06:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/137-74-131-208/</loc>
		<lastmod>2025-08-04T06:49:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/204-76-203-49/</loc>
		<lastmod>2025-08-01T06:34:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/144-172-110-50/</loc>
		<lastmod>2025-08-01T06:27:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/78-108-178-104/</loc>
		<lastmod>2025-07-30T06:57:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/45-142-154-10/</loc>
		<lastmod>2025-07-30T06:50:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/213-136-86-137/</loc>
		<lastmod>2025-07-29T06:33:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/virus-m0yv/</loc>
		<lastmod>2025-07-28T08:25:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/149-86-227-127/</loc>
		<lastmod>2025-07-28T07:55:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/205-185-121-110/</loc>
		<lastmod>2025-07-28T07:48:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/45-135-194-136/</loc>
		<lastmod>2025-07-28T07:03:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/89-190-156-34/</loc>
		<lastmod>2025-07-28T06:55:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/astonishlandmassnervy-com/</loc>
		<lastmod>2025-07-28T06:40:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/51-159-106-48/</loc>
		<lastmod>2025-07-25T06:38:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/204-76-203-193/</loc>
		<lastmod>2025-07-24T07:42:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/80-75-212-17/</loc>
		<lastmod>2025-07-24T06:40:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/happysmurf-com/</loc>
		<lastmod>2025-07-24T06:28:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/press/in-the-news/malwarebytes-expands-cloud-platform-with-real-time-email-security-capabilities/</loc>
		<lastmod>2025-10-22T16:43:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/press/releases/malwarebytes-expands-threatdown-portfolio-with-email-security/</loc>
		<lastmod>2025-07-25T17:21:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/email-security/</loc>
		<lastmod>2025-07-21T20:08:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/185-91-127-107/</loc>
		<lastmod>2025-07-22T06:41:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/196-251-83-51/</loc>
		<lastmod>2025-07-21T08:07:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/81-17-21-242/</loc>
		<lastmod>2025-07-21T08:00:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/3-148-147-222/</loc>
		<lastmod>2025-07-21T07:46:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/45-38-44-190/</loc>
		<lastmod>2025-07-21T07:39:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/resources/dms-st-bernards-high-school-case-study/</loc>
		<lastmod>2025-11-17T19:05:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/93-123-72-134/</loc>
		<lastmod>2025-07-18T06:59:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/replevysquab-top/</loc>
		<lastmod>2025-07-18T06:51:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/193-142-146-168/</loc>
		<lastmod>2025-07-17T08:16:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/149-50-96-114/</loc>
		<lastmod>2025-07-17T08:12:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/46-19-141-91/</loc>
		<lastmod>2025-07-17T08:10:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/52-14-122-207/</loc>
		<lastmod>2025-07-16T08:10:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/68-69-186-238/</loc>
		<lastmod>2025-07-16T08:03:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/ds96gk-com/</loc>
		<lastmod>2025-07-16T07:55:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/154-212-141-8/</loc>
		<lastmod>2025-07-15T08:34:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/91-224-92-17/</loc>
		<lastmod>2025-07-15T07:15:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/207-167-64-24/</loc>
		<lastmod>2025-07-15T07:03:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/resources/using-chatgpt-and-other-generative-ais-safely/</loc>
		<lastmod>2025-07-14T17:28:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/46-8-112-33/</loc>
		<lastmod>2025-07-14T06:48:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/3-136-67-107/</loc>
		<lastmod>2025-07-14T06:40:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/45-194-66-6/</loc>
		<lastmod>2025-07-14T06:34:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/press/in-the-news/pause-at-your-peril-why-cybercriminals-love-uncertain-times/</loc>
		<lastmod>2025-10-22T16:43:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/ds8fc0-com/</loc>
		<lastmod>2025-07-11T08:36:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/204-76-203-18/</loc>
		<lastmod>2025-07-11T07:36:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/134-209-113-89/</loc>
		<lastmod>2025-07-10T08:20:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/161-35-1-219/</loc>
		<lastmod>2025-07-10T08:11:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/159-65-29-59/</loc>
		<lastmod>2025-07-10T06:41:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/sacwumsf-com/</loc>
		<lastmod>2025-07-10T06:33:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/45-194-66-8/</loc>
		<lastmod>2025-07-09T08:14:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/press/in-the-news/teens-side-hustle-became-a-multi-hundred-million-dollar-business/</loc>
		<lastmod>2025-10-22T16:41:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/45-194-66-7/</loc>
		<lastmod>2025-07-08T06:42:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/remoteportscan/</loc>
		<lastmod>2025-07-04T06:50:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/176-65-151-51/</loc>
		<lastmod>2025-07-04T06:45:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/137-83-91-37/</loc>
		<lastmod>2025-07-02T09:14:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/osx-longage/</loc>
		<lastmod>2025-07-02T08:04:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/threatdown-shines-bright-with-multiple-g2-awards-and-top-tier-av-lab-performance/</loc>
		<lastmod>2025-07-01T21:23:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/87-121-84-212/</loc>
		<lastmod>2025-06-30T08:28:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/196-251-117-9/</loc>
		<lastmod>2025-06-30T08:16:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/87-121-84-16/</loc>
		<lastmod>2025-06-30T08:10:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/185-218-84-46/</loc>
		<lastmod>2025-06-30T08:03:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/185-218-84-45/</loc>
		<lastmod>2025-06-30T07:56:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/185-218-84-47/</loc>
		<lastmod>2025-06-30T07:50:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/185-218-84-40/</loc>
		<lastmod>2025-06-27T06:39:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/46-19-141-90/</loc>
		<lastmod>2025-06-26T06:47:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/141-255-162-250/</loc>
		<lastmod>2025-06-24T06:43:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/176-65-148-75/</loc>
		<lastmod>2025-06-23T07:46:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/46-19-142-154/</loc>
		<lastmod>2025-06-23T07:36:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/45-135-194-34/</loc>
		<lastmod>2025-06-23T07:27:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/obqj2-com/</loc>
		<lastmod>2025-06-23T07:19:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/68-183-106-187/</loc>
		<lastmod>2025-06-20T09:22:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/161-35-53-231/</loc>
		<lastmod>2025-06-20T09:15:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/157-230-13-170/</loc>
		<lastmod>2025-06-20T09:09:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/173-212-223-233/</loc>
		<lastmod>2025-06-20T08:55:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/riskware-gpuz-vulndriver/</loc>
		<lastmod>2025-06-20T08:47:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/144-172-103-59/</loc>
		<lastmod>2025-06-19T08:19:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/144-172-103-221/</loc>
		<lastmod>2025-06-19T08:13:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/press/releases/fokus-msp-gmbh-partners-with-malwarebytes-to-deliver-award-winning-threat-detection-and-response/</loc>
		<lastmod>2025-07-21T17:35:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/simplehelp-exploited-by-dragonforce-ransomware-group/</loc>
		<lastmod>2025-06-18T10:11:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/atomic-stealer-now-using-clipboard-hijacking-to-target-macs/</loc>
		<lastmod>2025-06-19T08:30:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/141-98-10-162/</loc>
		<lastmod>2025-06-18T07:19:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/144-172-116-95/</loc>
		<lastmod>2025-06-18T07:11:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/resources/2025-cybersecurity-guide-for-education-uk-edition/</loc>
		<lastmod>2025-06-17T22:04:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/resources/3-tactics-to-crush-ransomware-webinar/</loc>
		<lastmod>2025-06-17T22:02:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/resources/cybercrime-in-the-age-of-ai-webinar/</loc>
		<lastmod>2025-06-17T20:04:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/resources/state-of-malware-2025-webinar/</loc>
		<lastmod>2025-06-17T20:05:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/162-254-3-108/</loc>
		<lastmod>2025-06-17T06:57:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/entwithoughtsu-com/</loc>
		<lastmod>2025-06-17T06:50:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/resources/2025-cybersecurity-guide-for-education/</loc>
		<lastmod>2025-06-16T17:42:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/104-248-119-235/</loc>
		<lastmod>2025-06-16T08:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/143-198-115-148/</loc>
		<lastmod>2025-06-16T08:51:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/stikroltiltoowi-net/</loc>
		<lastmod>2025-06-16T08:44:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/securelogger-net/</loc>
		<lastmod>2025-06-16T08:33:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/osx-atomicstealer/</loc>
		<lastmod>2025-06-16T07:06:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/p2yn-com/</loc>
		<lastmod>2025-06-13T06:54:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/june-2025-microsoft-patch-tuesday-fixes-two-zero-days/</loc>
		<lastmod>2025-06-12T15:23:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/196-251-88-60/</loc>
		<lastmod>2025-06-12T07:02:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/87-121-84-208/</loc>
		<lastmod>2025-06-12T06:29:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/resources/cybercrime-in-the-age-of-ai-report/</loc>
		<lastmod>2025-06-11T16:38:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/87-121-84-34/</loc>
		<lastmod>2025-06-11T08:29:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/193-3-23-86/</loc>
		<lastmod>2025-06-11T08:21:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/qainfcnvfensl-site/</loc>
		<lastmod>2025-06-10T07:04:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/zrlqm-com/</loc>
		<lastmod>2025-06-10T06:53:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/196-251-84-199/</loc>
		<lastmod>2025-06-08T16:17:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/176-65-148-52/</loc>
		<lastmod>2025-06-08T16:10:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/79-124-8-120/</loc>
		<lastmod>2025-06-08T15:47:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/83-222-191-94/</loc>
		<lastmod>2025-06-08T15:29:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/83-222-190-66/</loc>
		<lastmod>2025-06-08T15:22:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/jzwfaybzrhusx-tech/</loc>
		<lastmod>2025-06-08T15:14:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/185-169-4-150/</loc>
		<lastmod>2025-06-06T06:44:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/196-251-83-222/</loc>
		<lastmod>2025-06-05T07:05:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/193-37-69-113/</loc>
		<lastmod>2025-06-05T06:56:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/45-142-193-91/</loc>
		<lastmod>2025-06-05T06:48:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/criminals-smuggle-phishing-code-in-svg-images/</loc>
		<lastmod>2025-06-04T12:30:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/176-65-148-6/</loc>
		<lastmod>2025-06-04T07:05:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/edr-vs-mdr-vs-xdr-whats-the-difference/</loc>
		<lastmod>2025-06-03T12:42:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/threatdown-introduces-auto-isolation/</loc>
		<lastmod>2025-06-04T13:43:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/bkngnet-com/</loc>
		<lastmod>2025-06-03T06:35:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/resources/humankind-case-study/</loc>
		<lastmod>2025-06-02T15:19:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/104-167-221-114/</loc>
		<lastmod>2025-06-02T06:49:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/193-142-147-109/</loc>
		<lastmod>2025-06-02T06:41:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/196-251-73-96/</loc>
		<lastmod>2025-06-02T06:29:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/adx-com-ru/</loc>
		<lastmod>2025-05-30T06:40:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/196-251-70-216/</loc>
		<lastmod>2025-05-29T17:32:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/kmspico-explained-no-kms-is-not-kill-microsoft/</loc>
		<lastmod>2025-06-05T13:53:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/196-251-86-80/</loc>
		<lastmod>2025-05-29T07:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/when-you-shouldnt-trust-a-trusted-root-certificate/</loc>
		<lastmod>2025-05-28T16:48:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/185-218-84-7/</loc>
		<lastmod>2025-05-28T07:06:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/185-218-86-52/</loc>
		<lastmod>2025-05-28T06:59:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/pup-optional-infatica/</loc>
		<lastmod>2025-05-27T07:29:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/45-136-154-250/</loc>
		<lastmod>2025-05-27T06:40:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/198-55-98-76/</loc>
		<lastmod>2025-05-27T06:32:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/83-222-190-102/</loc>
		<lastmod>2025-05-26T07:40:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/176-65-149-182/</loc>
		<lastmod>2025-05-26T07:29:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/196-251-83-76/</loc>
		<lastmod>2025-05-26T07:22:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/193-233-237-174/</loc>
		<lastmod>2025-05-26T07:14:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/amt3-com/</loc>
		<lastmod>2025-05-26T07:07:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/171-22-28-10/</loc>
		<lastmod>2025-05-23T08:15:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/176-65-148-227/</loc>
		<lastmod>2025-05-23T07:56:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/x3os-com/</loc>
		<lastmod>2025-05-22T07:02:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/193-3-23-80/</loc>
		<lastmod>2025-05-21T07:19:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/149-100-11-243/</loc>
		<lastmod>2025-05-21T07:01:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/89-42-231-140/</loc>
		<lastmod>2025-05-20T06:50:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/204-76-203-219/</loc>
		<lastmod>2025-05-20T06:43:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/may-2025-patch-tuesday-includes-five-zero-day-vulnerabilities/</loc>
		<lastmod>2025-05-19T14:30:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/176-65-148-250/</loc>
		<lastmod>2025-05-19T06:48:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/176-65-149-137/</loc>
		<lastmod>2025-05-19T06:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/23-137-105-165/</loc>
		<lastmod>2025-05-16T06:54:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/80-75-212-45/</loc>
		<lastmod>2025-05-16T06:46:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/introducing-browser-phishing-protection-enhanced-web-security-for-your-organization/</loc>
		<lastmod>2025-05-01T06:38:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/threatdown-introduces-firewall-management/</loc>
		<lastmod>2025-05-07T08:53:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/press/releases/ai-powered-cybercrime-surges-as-hackers-embrace-generative-and-autonomous-ai-according-to-new-malwarebytes-report/</loc>
		<lastmod>2025-07-25T17:18:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/196-251-73-140/</loc>
		<lastmod>2025-05-14T05:28:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/195-82-146-150/</loc>
		<lastmod>2025-05-14T05:20:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/press/releases/crn-recognizes-six-malwarebytes-channel-leaders-on-the-2025-women-of-the-channel-list/</loc>
		<lastmod>2025-07-25T17:16:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/45-135-194-53/</loc>
		<lastmod>2025-05-11T18:14:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/196-251-117-66/</loc>
		<lastmod>2025-05-11T10:00:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/107-174-224-18/</loc>
		<lastmod>2025-05-11T09:50:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/45-135-194-43/</loc>
		<lastmod>2025-05-11T09:33:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/91-236-116-242/</loc>
		<lastmod>2025-05-11T09:26:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/resources/benner-group-case-study/</loc>
		<lastmod>2025-06-30T20:22:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/45-95-147-209/</loc>
		<lastmod>2025-05-09T07:08:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/zlink0-com/</loc>
		<lastmod>2025-05-09T06:49:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/149-50-108-70/</loc>
		<lastmod>2025-05-08T07:45:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/45-139-104-15/</loc>
		<lastmod>2025-05-08T07:35:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/80-66-75-121/</loc>
		<lastmod>2025-05-08T07:27:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/ransomware-in-april-2025-ransomhub-is-gone/</loc>
		<lastmod>2025-05-07T12:07:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/204-76-203-35/</loc>
		<lastmod>2025-05-07T08:47:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/attainthreatfluffy-com/</loc>
		<lastmod>2025-05-07T08:38:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/xxx-100-200-300/</loc>
		<lastmod>2025-05-15T10:21:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/185-218-84-39/</loc>
		<lastmod>2025-05-06T07:00:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/176-65-148-243/</loc>
		<lastmod>2025-05-06T06:52:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/trojan-agent-nsis/</loc>
		<lastmod>2025-05-06T06:44:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/resources/2025-sans-threat-hunting-survey/</loc>
		<lastmod>2025-05-05T21:52:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/88-80-185-83/</loc>
		<lastmod>2025-05-05T07:36:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/196-251-86-175/</loc>
		<lastmod>2025-05-05T07:28:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/straightforwardaudition-com/</loc>
		<lastmod>2025-05-05T07:20:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/156-238-2-154/</loc>
		<lastmod>2025-05-02T07:04:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/176-65-149-188/</loc>
		<lastmod>2025-05-02T07:01:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/163-61-110-122/</loc>
		<lastmod>2025-05-02T06:46:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/196-251-87-129/</loc>
		<lastmod>2025-05-01T06:32:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/how-and-where-malware-authors-like-to-hide-their-code/</loc>
		<lastmod>2025-04-30T17:15:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/ransomware-in-march-2025/</loc>
		<lastmod>2025-04-30T15:02:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/18-221-225-145/</loc>
		<lastmod>2025-04-30T06:37:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/193-46-255-124/</loc>
		<lastmod>2025-04-29T09:40:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/185-218-84-178/</loc>
		<lastmod>2025-04-29T09:32:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/35-216-165-97/</loc>
		<lastmod>2025-04-29T09:24:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/194-163-159-240/</loc>
		<lastmod>2025-04-29T09:16:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/press/releases/malwarebytes-ignites-partner-success-with-targeted-channel-initiatives/</loc>
		<lastmod>2025-07-25T17:12:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/trojan-dropper-nsis/</loc>
		<lastmod>2025-04-28T09:57:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/osx-odyssey/</loc>
		<lastmod>2025-04-28T09:22:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/196-251-86-64/</loc>
		<lastmod>2025-04-28T08:51:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/3-148-226-33/</loc>
		<lastmod>2025-04-28T08:45:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/185-208-159-64/</loc>
		<lastmod>2025-04-25T06:23:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/43-207-114-9/</loc>
		<lastmod>2025-04-24T07:23:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/196-251-87-86/</loc>
		<lastmod>2025-04-24T07:15:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/saw1nq6cb-sbs/</loc>
		<lastmod>2025-04-24T07:11:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/new-in-nebula-oneview-cve-tags-for-ransomware-linked-vulnerabilities/</loc>
		<lastmod>2025-04-23T22:11:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/75-119-146-30/</loc>
		<lastmod>2025-04-23T07:02:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/193-142-146-19/</loc>
		<lastmod>2025-04-23T06:56:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/198-251-88-248/</loc>
		<lastmod>2025-04-22T07:01:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/195-82-146-145/</loc>
		<lastmod>2025-04-20T09:37:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/nannyirrationalacquainted-com/</loc>
		<lastmod>2025-04-20T09:25:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/save-our-cve-last-minute-rescue-critical-pillar-of-cybersecurity/</loc>
		<lastmod>2025-04-16T20:26:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/has-ai-changed-malicious-script-obfuscation-techniques/</loc>
		<lastmod>2025-04-16T09:21:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/185-224-128-90/</loc>
		<lastmod>2025-04-16T07:13:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/gcdn-co/</loc>
		<lastmod>2025-04-15T07:35:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/celebrating-our-partners-of-the-year-recognizing-excellence-and-innovation/</loc>
		<lastmod>2025-04-15T06:49:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/living-off-the-land-lotl-attacks-detecting-ransomware-gangs-hiding-in-plain-sight/</loc>
		<lastmod>2025-04-14T11:34:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/185-36-81-82/</loc>
		<lastmod>2025-04-14T08:47:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/170-39-218-2/</loc>
		<lastmod>2025-04-14T07:55:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/196-251-80-2/</loc>
		<lastmod>2025-04-14T07:36:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/trojan-dropper-go/</loc>
		<lastmod>2025-04-14T07:06:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/one-in-five-fortune-500-companies-leaked-credentials-in-the-past-30-days/</loc>
		<lastmod>2025-04-11T12:52:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/threatsweeper-xyz/</loc>
		<lastmod>2025-04-11T08:51:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/195-211-191-76/</loc>
		<lastmod>2025-04-10T07:50:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/45-135-193-65/</loc>
		<lastmod>2025-04-10T07:40:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/april-2025-patch-tuesday-includes-one-zero-day/</loc>
		<lastmod>2025-04-09T10:56:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/185-44-77-91/</loc>
		<lastmod>2025-04-09T06:54:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/185-255-122-19/</loc>
		<lastmod>2025-04-09T06:47:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/83-222-190-254/</loc>
		<lastmod>2025-04-07T08:53:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/103-177-168-178/</loc>
		<lastmod>2025-04-07T08:46:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/157-230-6-155/</loc>
		<lastmod>2025-04-07T07:06:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/81-17-20-106/</loc>
		<lastmod>2025-04-07T06:59:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/91-199-163-16/</loc>
		<lastmod>2025-04-07T06:52:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/196-251-71-106/</loc>
		<lastmod>2025-04-04T07:13:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/67-207-85-60/</loc>
		<lastmod>2025-04-03T06:54:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/fake-booking-com-emails-target-hotels/</loc>
		<lastmod>2025-04-02T13:38:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/195-211-191-127/</loc>
		<lastmod>2025-04-01T08:26:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/196-251-69-197/</loc>
		<lastmod>2025-04-01T08:20:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/196-251-70-175/</loc>
		<lastmod>2025-04-01T07:11:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/tnmc6xr71o-sbs/</loc>
		<lastmod>2025-03-31T08:02:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/154-81-156-10/</loc>
		<lastmod>2025-03-31T06:59:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/95-214-55-23/</loc>
		<lastmod>2025-03-31T06:35:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/193-200-78-21/</loc>
		<lastmod>2025-03-30T14:50:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/154-81-156-34/</loc>
		<lastmod>2025-03-30T14:42:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/154-81-156-35/</loc>
		<lastmod>2025-03-30T14:35:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/45-82-78-100/</loc>
		<lastmod>2025-03-30T12:03:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/45-82-78-101/</loc>
		<lastmod>2025-03-30T11:56:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/196-251-70-87/</loc>
		<lastmod>2025-03-30T11:46:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/185-196-220-57/</loc>
		<lastmod>2025-03-28T07:41:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/38-110-46-209/</loc>
		<lastmod>2025-03-27T07:39:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/154-81-156-40/</loc>
		<lastmod>2025-03-27T07:37:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/154-81-156-20/</loc>
		<lastmod>2025-03-26T07:30:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/why-your-software-is-the-new-malware/</loc>
		<lastmod>2025-03-25T13:24:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/ab1n-net/</loc>
		<lastmod>2025-03-25T07:40:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/167-86-69-190/</loc>
		<lastmod>2025-03-24T08:36:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/185-40-4-51/</loc>
		<lastmod>2025-03-24T08:29:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/210-56-24-212/</loc>
		<lastmod>2025-03-24T08:12:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/185-91-127-83/</loc>
		<lastmod>2025-03-24T08:06:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/45-90-163-37/</loc>
		<lastmod>2025-03-24T07:52:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/ransomware-group-mora_001-targets-fortinet-applications/</loc>
		<lastmod>2025-03-21T14:19:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/91-212-166-95/</loc>
		<lastmod>2025-03-21T07:51:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/product-of-the-year-avlab-honors-threatdown-endpoint-protection/</loc>
		<lastmod>2025-03-20T13:01:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/neverstoprotation-com/</loc>
		<lastmod>2025-03-20T07:42:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/welcome-to-the-era-of-macos-stealers/</loc>
		<lastmod>2025-03-19T14:26:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/introducing-threatdown-oneview-free-self-serve-trial-for-msps/</loc>
		<lastmod>2025-03-19T18:14:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/hpyrdr-com/</loc>
		<lastmod>2025-03-19T09:03:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/madurird-com/</loc>
		<lastmod>2025-03-17T18:32:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/199-30-231-5/</loc>
		<lastmod>2025-03-17T18:19:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/ransomware-in-february-2025-cl0p-and-ransomhub-run-riot/</loc>
		<lastmod>2025-03-17T19:20:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/18-221-137-47/</loc>
		<lastmod>2025-03-17T07:45:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/67-205-166-198/</loc>
		<lastmod>2025-03-14T08:21:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/134-209-73-255/</loc>
		<lastmod>2025-03-14T08:16:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/67-205-169-214/</loc>
		<lastmod>2025-03-14T08:00:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/206-189-206-158/</loc>
		<lastmod>2025-03-14T07:53:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/olopruy-com/</loc>
		<lastmod>2025-03-14T07:43:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/147-182-176-83/</loc>
		<lastmod>2025-03-13T07:35:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/press/releases/malwarebytes-wins-inaugural-mrg-effitas-product-of-the-year/</loc>
		<lastmod>2025-07-21T19:25:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/product-of-the-year/</loc>
		<lastmod>2025-03-12T12:08:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/march-2025-patch-tuesday-severity-over-quantity/</loc>
		<lastmod>2025-03-12T12:17:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/64-226-65-154/</loc>
		<lastmod>2025-03-12T07:38:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/phishing-now-available-on-your-favorite-app-store/</loc>
		<lastmod>2025-03-11T15:20:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/154-81-156-7/</loc>
		<lastmod>2025-03-11T08:08:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/83-222-191-150/</loc>
		<lastmod>2025-03-11T07:57:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/press/releases/bakotech-adds-malwarebytes-award-winning-threatdown-cybersecurity-products-to-its-portfolio/</loc>
		<lastmod>2025-07-21T19:30:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/rainfallcloud28-site/</loc>
		<lastmod>2025-03-10T09:27:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/45-136-154-251/</loc>
		<lastmod>2025-03-10T09:14:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/196-251-81-239/</loc>
		<lastmod>2025-03-10T07:51:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/51-159-195-137/</loc>
		<lastmod>2025-03-10T07:43:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/87-121-84-131/</loc>
		<lastmod>2025-03-10T07:36:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/phishers-go-interplanetary-to-get-company-login-credentials/</loc>
		<lastmod>2025-03-09T18:01:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/158-69-165-242/</loc>
		<lastmod>2025-03-07T08:00:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/18-217-194-148/</loc>
		<lastmod>2025-03-05T09:28:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/5-182-209-113/</loc>
		<lastmod>2025-03-05T09:21:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/resources/it-msp-case-study/</loc>
		<lastmod>2025-03-04T19:51:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/195-178-110-54/</loc>
		<lastmod>2025-03-04T08:06:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/91-199-163-52/</loc>
		<lastmod>2025-03-04T07:58:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/204-76-203-15/</loc>
		<lastmod>2025-03-03T08:15:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/18-117-57-162/</loc>
		<lastmod>2025-03-03T08:00:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/196-251-86-78/</loc>
		<lastmod>2025-03-03T07:48:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/109-236-61-115/</loc>
		<lastmod>2025-03-03T07:29:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/193-68-89-31/</loc>
		<lastmod>2025-03-03T07:21:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/18-190-163-148/</loc>
		<lastmod>2025-02-28T09:29:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/204-76-203-80/</loc>
		<lastmod>2025-02-27T09:04:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/infighting-brings-down-the-black-basta-ransomware-group/</loc>
		<lastmod>2025-02-26T12:41:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/crypt-trojan-msil-dds/</loc>
		<lastmod>2025-02-26T10:01:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/185-224-128-97/</loc>
		<lastmod>2025-02-26T09:17:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/ai-as-you-know-it-is-dead-and-cybersecurity-will-never-be-the-same/</loc>
		<lastmod>2025-02-25T16:50:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/trojan-crypt-generic/</loc>
		<lastmod>2025-02-25T08:18:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/46-19-143-58/</loc>
		<lastmod>2025-02-25T07:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/162-215-216-231/</loc>
		<lastmod>2025-02-25T07:51:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/enhanced-bonus-qr-code-phish-steals-microsoft-credentials/</loc>
		<lastmod>2025-02-25T10:55:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/usb-worms-still-wriggling-on-to-under-protected-computers-after-all-these-years/</loc>
		<lastmod>2025-02-24T15:05:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/osx-frigidstealer/</loc>
		<lastmod>2025-02-24T10:55:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/192-241-149-123/</loc>
		<lastmod>2025-02-24T10:41:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/137-184-131-161/</loc>
		<lastmod>2025-02-24T10:35:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/176-9-113-114/</loc>
		<lastmod>2025-02-24T10:27:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/196-251-72-73/</loc>
		<lastmod>2025-02-24T10:19:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/92-246-87-21/</loc>
		<lastmod>2025-02-24T10:10:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/212-71-238-210/</loc>
		<lastmod>2025-02-24T10:03:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/91-191-213-210/</loc>
		<lastmod>2025-02-24T09:57:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/194-120-230-215/</loc>
		<lastmod>2025-02-24T09:06:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/3-234-214-64/</loc>
		<lastmod>2025-02-24T08:48:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/146-70-76-35/</loc>
		<lastmod>2025-02-21T09:31:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/185-156-73-55/</loc>
		<lastmod>2025-02-21T09:24:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/185-224-0-202/</loc>
		<lastmod>2025-02-21T09:16:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/185-73-23-151/</loc>
		<lastmod>2025-02-20T08:24:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/194-85-251-35/</loc>
		<lastmod>2025-02-20T08:16:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/172-232-133-233/</loc>
		<lastmod>2025-02-20T08:04:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/popdemission-com/</loc>
		<lastmod>2025-02-21T09:32:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/pup-optional-bitcleaner/</loc>
		<lastmod>2025-02-17T10:35:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/185-93-89-118/</loc>
		<lastmod>2025-02-17T10:09:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/149-56-85-65/</loc>
		<lastmod>2025-02-17T10:02:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/204-76-203-41/</loc>
		<lastmod>2025-02-17T09:49:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/195-178-110-163/</loc>
		<lastmod>2025-02-17T09:42:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/5-59-248-127/</loc>
		<lastmod>2025-02-13T09:53:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/95-214-53-198/</loc>
		<lastmod>2025-02-13T09:43:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/89-248-165-13/</loc>
		<lastmod>2025-02-13T08:27:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/four-zero-days-in-februarys-patch-tuesday/</loc>
		<lastmod>2025-02-12T15:58:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/ransomware-groups-were-faster-stealthier-and-more-active-than-ever-in-2024/</loc>
		<lastmod>2025-02-24T12:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/45-148-10-90/</loc>
		<lastmod>2025-02-12T08:13:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/209-141-46-155/</loc>
		<lastmod>2025-02-12T07:49:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/analyzing-a-mispadu-trojans-attack-chain/</loc>
		<lastmod>2025-02-11T13:25:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/hacktool-autokms-rtpscript/</loc>
		<lastmod>2025-02-10T10:08:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/193-68-89-10/</loc>
		<lastmod>2025-02-10T09:55:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/179-43-160-138/</loc>
		<lastmod>2025-02-10T09:46:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/195-3-223-73/</loc>
		<lastmod>2025-02-10T09:31:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/87-120-113-185/</loc>
		<lastmod>2025-02-10T08:36:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/chaseherbalpasty-com/</loc>
		<lastmod>2025-02-10T08:16:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/systemtracer-life/</loc>
		<lastmod>2025-02-10T08:17:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/trojan-script-e-generic/</loc>
		<lastmod>2025-02-07T09:13:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/172-93-107-98/</loc>
		<lastmod>2025-02-06T08:39:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/194-50-16-252/</loc>
		<lastmod>2025-02-06T08:28:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/204-76-203-71/</loc>
		<lastmod>2025-02-05T08:15:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/threatdown-state-of-malware-report-2025/</loc>
		<lastmod>2025-12-19T20:44:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/press/releases/cms-distribution-partners-with-malwarebytes-to-enhance-cybersecurity-offerings-for-resellers/</loc>
		<lastmod>2025-07-25T17:28:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/109-236-61-85/</loc>
		<lastmod>2025-02-04T08:08:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/press/releases/agentic-ai-will-revolutionize-cybercrime-in-2025-according-to-malwarebytes-state-of-malware-report/</loc>
		<lastmod>2025-07-25T17:06:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/resources/2025-state-of-malware/</loc>
		<lastmod>2025-06-11T16:18:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/87-121-84-7/</loc>
		<lastmod>2025-02-03T10:04:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/95-211-229-245/</loc>
		<lastmod>2025-02-03T09:56:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/195-178-110-224/</loc>
		<lastmod>2025-02-03T08:36:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/ransomware-in-january-2024-bad-news-for-us-healthcare/</loc>
		<lastmod>2025-03-17T19:44:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/193-68-89-5/</loc>
		<lastmod>2025-01-31T08:18:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/95-214-55-132/</loc>
		<lastmod>2025-01-31T07:57:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/more-cybercriminals-are-using-the-clipboard-hijacker-method/</loc>
		<lastmod>2025-01-27T15:13:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/109-236-61-84/</loc>
		<lastmod>2025-01-28T21:43:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/45-200-149-93/</loc>
		<lastmod>2025-01-28T21:43:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/62-210-145-15/</loc>
		<lastmod>2025-01-28T21:43:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/89-248-174-186/</loc>
		<lastmod>2025-01-28T21:43:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/depressively-net/</loc>
		<lastmod>2025-01-28T21:43:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/mastercard-fixes-potentially-catastrophic-dns-typo/</loc>
		<lastmod>2025-01-24T17:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/89-248-163-27/</loc>
		<lastmod>2025-01-28T21:43:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/semasu-net/</loc>
		<lastmod>2025-01-28T21:43:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/185-196-10-129/</loc>
		<lastmod>2025-01-28T21:43:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/what-is-sql-injection-sqli-and-how-can-it-be-prevented/</loc>
		<lastmod>2025-01-22T10:28:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/95-214-54-154/</loc>
		<lastmod>2025-01-28T21:43:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/141-94-75-26/</loc>
		<lastmod>2025-01-28T21:43:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/oxtzgomhodrz-top/</loc>
		<lastmod>2025-01-28T21:43:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/resources/endpoint-security-evaluation-guide-for-msps-and-resellers/</loc>
		<lastmod>2025-01-21T20:36:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/195-3-223-40/</loc>
		<lastmod>2025-01-28T21:43:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/185-196-8-92/</loc>
		<lastmod>2025-01-28T21:43:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/pup-optional-epibrowser/</loc>
		<lastmod>2025-01-28T21:43:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/146-19-24-18/</loc>
		<lastmod>2025-01-28T21:43:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/resources/msp-partner-program/</loc>
		<lastmod>2025-04-01T16:42:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/45-94-31-93/</loc>
		<lastmod>2025-01-28T21:43:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/79-124-56-250/</loc>
		<lastmod>2025-01-28T21:43:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/83-222-191-130/</loc>
		<lastmod>2025-01-28T21:43:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/83-222-191-146/</loc>
		<lastmod>2025-01-28T21:43:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/66-240-192-84/</loc>
		<lastmod>2025-01-28T21:43:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/172-245-40-172/</loc>
		<lastmod>2025-01-28T21:43:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/bullionglidingscuttle-com/</loc>
		<lastmod>2025-01-28T21:43:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/first-patch-tuesday-of-2025-includes-8-zero-day-vulnerabilities/</loc>
		<lastmod>2025-01-15T12:26:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/web-shop-spreads-socgolish-malware-and-steals-credit-cards/</loc>
		<lastmod>2025-01-15T13:11:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/95-181-182-182/</loc>
		<lastmod>2025-01-28T21:43:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/194-50-16-36/</loc>
		<lastmod>2025-01-28T21:43:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/dacllads-com/</loc>
		<lastmod>2025-01-28T21:43:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/92-63-196-142/</loc>
		<lastmod>2025-01-28T21:43:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/visiblyhiemal-shop/</loc>
		<lastmod>2025-01-28T21:43:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/37-111-131-38/</loc>
		<lastmod>2025-01-28T21:43:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/80-64-30-107/</loc>
		<lastmod>2025-01-28T21:43:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/akira-ransomware-drops-anydesk-client-on-compromised-systems/</loc>
		<lastmod>2025-01-09T13:33:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/what-is-a-man-in-the-middle-mitm-attack/</loc>
		<lastmod>2025-01-08T11:39:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/blissfulluck-cfd/</loc>
		<lastmod>2025-01-28T21:43:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/178-215-236-132/</loc>
		<lastmod>2025-01-28T21:43:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/69-16-230-165/</loc>
		<lastmod>2025-01-28T21:43:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/139-45-197/</loc>
		<lastmod>2025-02-21T09:32:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/149-28-49-123/</loc>
		<lastmod>2025-01-28T21:43:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/5-181-190-248/</loc>
		<lastmod>2025-01-28T21:43:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/193-142-146-232/</loc>
		<lastmod>2025-01-28T21:43:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/which-ports-to-monitor-for-ransomware-attacks/</loc>
		<lastmod>2025-01-03T13:20:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/209-126-87-5/</loc>
		<lastmod>2025-01-28T21:43:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/94-103-125-8/</loc>
		<lastmod>2025-01-28T21:43:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/193-200-78-250/</loc>
		<lastmod>2025-01-28T21:43:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/what-is-session-hijacking/</loc>
		<lastmod>2025-01-02T12:52:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/pup-optional-onelaunch/</loc>
		<lastmod>2025-01-02T10:09:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/154-213-187-19/</loc>
		<lastmod>2025-01-28T21:43:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/95-214-55-186/</loc>
		<lastmod>2025-01-28T21:43:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/193-142-146-175/</loc>
		<lastmod>2025-01-28T21:43:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/185-196-220-37/</loc>
		<lastmod>2025-01-28T21:43:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/coosync-com/</loc>
		<lastmod>2025-01-28T21:43:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/ransomware-in-december-2024-cl0p-returns/</loc>
		<lastmod>2025-03-17T20:17:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/clipboard-hijacker-tries-to-install-a-trojan/</loc>
		<lastmod>2025-01-01T15:52:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/185-16-39-9/</loc>
		<lastmod>2025-01-28T21:43:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/endowmentoverhangutmost-com/</loc>
		<lastmod>2025-01-28T21:43:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/154-213-187-231/</loc>
		<lastmod>2025-01-28T21:43:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/bankingbloatedcaptive-com/</loc>
		<lastmod>2025-01-28T21:43:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/a11k-com/</loc>
		<lastmod>2025-01-28T21:43:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/holahupa-com/</loc>
		<lastmod>2025-01-28T21:43:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/95-214-52-254/</loc>
		<lastmod>2025-01-28T21:43:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/isolatedovercomepasted-com/</loc>
		<lastmod>2025-01-28T21:43:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/divisiondrearilyunfiled-com/</loc>
		<lastmod>2025-01-28T21:43:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/appointeeivyspongy-com/</loc>
		<lastmod>2025-01-28T21:43:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/dood-work/</loc>
		<lastmod>2025-01-28T21:43:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/78-128-114-90/</loc>
		<lastmod>2025-01-28T21:43:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/46-101-225-141/</loc>
		<lastmod>2025-01-28T21:43:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/45-148-10-236/</loc>
		<lastmod>2025-01-28T21:43:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/87-120-120-18/</loc>
		<lastmod>2025-01-28T21:43:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/92-249-48-38/</loc>
		<lastmod>2025-01-28T21:43:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/sysrv-cryptomining-botnet-is-still-alive-and-kicking-out-the-competition/</loc>
		<lastmod>2024-12-23T21:30:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/gglnntqufw-life/</loc>
		<lastmod>2025-01-28T21:43:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/87-120-112-187/</loc>
		<lastmod>2025-01-28T21:43:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/193-46-254-155/</loc>
		<lastmod>2025-01-28T21:43:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/95-214-55-74/</loc>
		<lastmod>2025-01-28T21:43:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/179-43-185-238/</loc>
		<lastmod>2025-01-28T21:43:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/87-120-115-17/</loc>
		<lastmod>2025-01-28T21:42:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/press/releases/malwarebytes-expands-corporate-go-to-market-executive-leadership-team/</loc>
		<lastmod>2025-07-25T17:32:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/154-213-187-122/</loc>
		<lastmod>2025-01-28T21:42:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/194-55-186-154/</loc>
		<lastmod>2025-01-28T21:42:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/cleo-the-next-moveit-and-goanywhere/</loc>
		<lastmod>2024-12-17T16:37:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/45-148-10-205/</loc>
		<lastmod>2025-01-28T21:42:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/185-91-127-81/</loc>
		<lastmod>2025-01-28T21:42:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/80-94-93-191/</loc>
		<lastmod>2025-01-28T21:42:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/lookmommynohands-com/</loc>
		<lastmod>2025-01-28T21:42:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/top-5-most-dangerous-software-weaknesses-in-2024/</loc>
		<lastmod>2024-12-16T13:24:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/pup-optional-utorrent/</loc>
		<lastmod>2025-01-28T21:42:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/154-213-192-4/</loc>
		<lastmod>2025-01-28T21:42:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/89-248-165-110/</loc>
		<lastmod>2025-01-28T21:42:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/79-124-62-230/</loc>
		<lastmod>2025-01-28T21:42:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/80-64-30-210/</loc>
		<lastmod>2025-01-28T21:42:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/78-128-114-22/</loc>
		<lastmod>2025-01-28T21:42:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/preferouter-com/</loc>
		<lastmod>2025-01-28T21:42:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/flusoprano-com/</loc>
		<lastmod>2025-01-28T21:42:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/adultgames-space/</loc>
		<lastmod>2025-01-28T21:42:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/what-is-cross-site-request-forgery-csrf/</loc>
		<lastmod>2024-12-17T16:24:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/83-222-191-74/</loc>
		<lastmod>2025-01-28T21:42:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/83-222-191-58/</loc>
		<lastmod>2025-01-28T21:42:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/87-120-115-76/</loc>
		<lastmod>2025-01-28T21:42:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/december-patch-tuesday-fixes-one-actively-exploited-zero-day-vulnerability/</loc>
		<lastmod>2024-12-12T15:06:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/2024-mitre-attck-evaluation-results-threatdown-protects-every-step/</loc>
		<lastmod>2024-12-11T18:07:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/141-98-11-155/</loc>
		<lastmod>2025-01-28T21:42:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/osx-banshee/</loc>
		<lastmod>2024-12-10T10:50:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/pup-optional-brightdata/</loc>
		<lastmod>2025-01-28T21:42:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/162-243-160-128/</loc>
		<lastmod>2025-01-28T21:42:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/resources/msp-success-kit-ebook/</loc>
		<lastmod>2025-01-27T22:05:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/51-159-70-174/</loc>
		<lastmod>2025-01-28T21:42:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/press/releases/onecom-partners-with-malwarebytes-to-bring-threatdown-cybersecurity-solutions-to-uk-organizations/</loc>
		<lastmod>2025-07-25T17:34:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/what-is-cross-site-scripting-xss/</loc>
		<lastmod>2024-12-05T12:07:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/185-196-11-48/</loc>
		<lastmod>2025-01-28T21:42:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/80-94-95-157/</loc>
		<lastmod>2025-01-28T21:42:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/resources/formula-for-successful-msp-business/</loc>
		<lastmod>2025-01-27T22:05:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/resources/5-strategies-to-grow-mrr/</loc>
		<lastmod>2025-01-27T22:06:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/resources/5-ways-to-build-strong-customer-trust/</loc>
		<lastmod>2025-01-27T22:06:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/resources/create-wow-moments-with-customer-service/</loc>
		<lastmod>2025-01-27T22:06:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/38-46-220-87/</loc>
		<lastmod>2025-01-28T21:42:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/adware-opinionloader-generic/</loc>
		<lastmod>2025-01-28T21:42:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/osfultrbriolenai-info/</loc>
		<lastmod>2025-01-28T21:42:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/87-120-115-50/</loc>
		<lastmod>2025-01-28T21:42:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/74-50-83-218/</loc>
		<lastmod>2025-01-28T21:42:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/179-43-163-250/</loc>
		<lastmod>2025-01-28T21:42:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/resources/ransomware-rollback-express-demo/</loc>
		<lastmod>2025-01-16T14:20:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/pup-optional-pdfflex/</loc>
		<lastmod>2024-11-29T09:43:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/79-110-62-153/</loc>
		<lastmod>2025-01-28T21:42:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/179-43-133-122/</loc>
		<lastmod>2025-01-28T21:42:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/beluga-phishing-campaign-targets-onedrive-credentials/</loc>
		<lastmod>2024-11-28T11:19:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/95-214-53-202/</loc>
		<lastmod>2025-01-28T21:42:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/what-is-buffer-overflow/</loc>
		<lastmod>2024-11-27T11:32:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/209-97-170-76/</loc>
		<lastmod>2025-01-28T21:42:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/198-199-82-71/</loc>
		<lastmod>2025-01-28T21:42:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/195-178-110-57/</loc>
		<lastmod>2025-01-28T21:42:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/77-88-44-55/</loc>
		<lastmod>2025-01-28T21:42:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/dealctr-com/</loc>
		<lastmod>2025-01-28T21:42:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/wheelsetsur-net/</loc>
		<lastmod>2025-01-28T21:42:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/154-213-187-20/</loc>
		<lastmod>2025-01-28T21:42:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/34-151-208-99/</loc>
		<lastmod>2025-01-28T21:42:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/45-202-35-135/</loc>
		<lastmod>2025-01-28T21:42:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/206-81-16-139/</loc>
		<lastmod>2025-01-28T21:42:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/how-to-tame-ransomware-gangs-top-5-favorite-scripting-engines/</loc>
		<lastmod>2024-11-22T13:56:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/81-161-238-40/</loc>
		<lastmod>2025-01-28T21:42:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/104-248-229-185/</loc>
		<lastmod>2025-01-28T21:42:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/press/releases/superops-and-malwarebytes-partner-to-transform-cybersecurity-with-seamless-integration/</loc>
		<lastmod>2025-07-25T17:37:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/184-168-122-26/</loc>
		<lastmod>2025-01-28T21:42:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/141-98-11-175/</loc>
		<lastmod>2025-01-28T21:42:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/38-132-109-179/</loc>
		<lastmod>2025-01-28T21:42:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/45-148-10-122/</loc>
		<lastmod>2025-01-28T21:42:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/45-148-121-58/</loc>
		<lastmod>2025-01-28T21:42:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/5-182-210-124/</loc>
		<lastmod>2025-01-28T21:42:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/percentagesubsequentprosper-com/</loc>
		<lastmod>2025-01-28T21:42:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/r24dmp-de/</loc>
		<lastmod>2025-01-28T21:42:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/87-120-114-229/</loc>
		<lastmod>2025-01-28T21:42:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/45-202-35-17/</loc>
		<lastmod>2025-01-28T21:42:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/ygnus-com/</loc>
		<lastmod>2025-01-28T21:42:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/154-213-184-16/</loc>
		<lastmod>2025-01-28T21:42:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/45-148-10-237/</loc>
		<lastmod>2025-01-28T21:42:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/update-now-november-patch-tuesday-tackles-4-zero-days-two-actively-exploited/</loc>
		<lastmod>2024-11-14T10:51:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/93-123-109-215/</loc>
		<lastmod>2025-01-28T21:42:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/93-123-109-214/</loc>
		<lastmod>2025-01-28T21:42:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/178-215-238-131/</loc>
		<lastmod>2025-01-28T21:42:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/resources/holiday-ransomware-prevention-guide/</loc>
		<lastmod>2024-11-12T16:07:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/66-240-192-85/</loc>
		<lastmod>2025-01-28T21:42:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/89-187-163-193/</loc>
		<lastmod>2025-01-28T21:42:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/exceedinglytells-com/</loc>
		<lastmod>2025-01-28T21:42:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/concludedstoredtechnique-com/</loc>
		<lastmod>2025-01-28T21:42:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/zero-day-vulnerabilities/</loc>
		<lastmod>2024-11-11T14:15:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/194-50-16-198/</loc>
		<lastmod>2025-01-28T21:42:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/144-202-82-88/</loc>
		<lastmod>2025-01-28T21:42:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/198-7-127-39/</loc>
		<lastmod>2025-01-28T21:42:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/157-173-118-27/</loc>
		<lastmod>2025-01-28T21:42:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/boxif-xyz/</loc>
		<lastmod>2025-01-28T21:42:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/search-load-com/</loc>
		<lastmod>2025-01-28T21:42:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/157-230-91-126/</loc>
		<lastmod>2025-01-28T21:42:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/95-214-53-211/</loc>
		<lastmod>2025-01-28T21:42:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/185-234-216-123/</loc>
		<lastmod>2025-01-28T21:42:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/45-148-10-206/</loc>
		<lastmod>2025-01-28T21:42:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/31-220-1-88/</loc>
		<lastmod>2025-01-28T21:42:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/94-141-120-99/</loc>
		<lastmod>2025-01-28T21:42:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/how-black-basta-used-powershell-to-set-up-a-cobalt-strike-beacon/</loc>
		<lastmod>2024-11-05T17:37:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/adware-adload/</loc>
		<lastmod>2025-01-28T21:42:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/141-98-11-178/</loc>
		<lastmod>2025-01-28T21:42:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/astronomyfitmisguided-com/</loc>
		<lastmod>2025-01-28T21:42:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/165-232-170-216/</loc>
		<lastmod>2025-01-28T21:42:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/45-135-95-25/</loc>
		<lastmod>2025-01-28T21:42:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/89-248-165-117/</loc>
		<lastmod>2025-01-28T21:42:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/87-120-112-106/</loc>
		<lastmod>2025-01-28T21:42:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/rejectionbennetsmoked-com/</loc>
		<lastmod>2025-01-28T21:42:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/87-120-126-202/</loc>
		<lastmod>2025-01-28T21:42:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/80-76-51-245/</loc>
		<lastmod>2025-01-28T21:41:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/messengerreinsomething-com/</loc>
		<lastmod>2025-01-28T21:41:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/auntieminiature-com/</loc>
		<lastmod>2025-01-28T21:41:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/178-211-139-105/</loc>
		<lastmod>2025-01-28T21:41:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/ransomware-review-november-2024/</loc>
		<lastmod>2025-01-28T11:59:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/162-243-168-73/</loc>
		<lastmod>2025-01-28T21:41:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/157-245-142-145/</loc>
		<lastmod>2025-01-28T21:41:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/194-50-16-94/</loc>
		<lastmod>2025-01-28T21:41:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/bulkconflictpeculiarities-com/</loc>
		<lastmod>2025-01-28T21:41:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/202-112-237-233/</loc>
		<lastmod>2025-01-28T21:41:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/press/releases/malwarebytes-accelerates-mdr-momentum-with-enhanced-case-management-and-reporting-innovations/</loc>
		<lastmod>2025-07-25T17:41:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/introducing-streamlined-case-management-and-enhanced-monthly-reports/</loc>
		<lastmod>2024-12-09T18:10:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/riskware-setdefaultbrowser/</loc>
		<lastmod>2025-01-28T21:41:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/trojan-agent-vbs/</loc>
		<lastmod>2025-01-28T21:41:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/154-213-184-43/</loc>
		<lastmod>2025-01-28T21:41:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/95-214-53-91/</loc>
		<lastmod>2025-01-28T21:41:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/cdvmgqs-ggh-tech/</loc>
		<lastmod>2025-01-28T21:41:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/sympathizecrewfrugality-com/</loc>
		<lastmod>2025-01-28T21:41:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/zodiacdinner-com/</loc>
		<lastmod>2025-01-28T21:41:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/blissfulmass-com/</loc>
		<lastmod>2025-01-28T21:41:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/secprf2-com/</loc>
		<lastmod>2025-01-28T21:41:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/search-browser-com/</loc>
		<lastmod>2025-01-28T21:41:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/92-249-48-49/</loc>
		<lastmod>2025-01-28T21:41:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/95-214-55-79/</loc>
		<lastmod>2025-01-28T21:41:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/185-16-38-232/</loc>
		<lastmod>2025-01-28T21:41:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/199-195-250-229/</loc>
		<lastmod>2025-01-28T21:41:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/154-213-187-109/</loc>
		<lastmod>2025-01-28T21:41:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/178-215-238-11/</loc>
		<lastmod>2025-01-28T21:41:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/35-216-172-13/</loc>
		<lastmod>2025-01-28T21:41:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/resources/security-advisor-demo/</loc>
		<lastmod>2024-10-24T17:14:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/adz2you-xyz/</loc>
		<lastmod>2025-01-28T21:41:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/209-141-36-20/</loc>
		<lastmod>2025-01-28T21:41:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/154-213-186-74/</loc>
		<lastmod>2025-01-28T21:41:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/91-240-118-174/</loc>
		<lastmod>2025-01-28T21:41:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/156-67-105-41/</loc>
		<lastmod>2025-01-28T21:41:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/a-reminder-that-old-vulnerabilities-are-still-relevant/</loc>
		<lastmod>2024-10-22T21:49:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/179-43-191-19/</loc>
		<lastmod>2025-01-28T21:41:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/guxidrookr-com/</loc>
		<lastmod>2025-01-28T21:41:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/trojan-misplacedlegit-autoit/</loc>
		<lastmod>2025-01-28T21:41:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/baipahanoop-net/</loc>
		<lastmod>2025-01-28T21:41:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/blackenheartbreakrehearsal-com/</loc>
		<lastmod>2025-01-28T21:41:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/hikinghourcataract-com/</loc>
		<lastmod>2025-01-28T21:41:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/sunglassesexpensive-com/</loc>
		<lastmod>2025-01-28T21:41:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/185-191-126-248/</loc>
		<lastmod>2025-01-28T21:41:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/179-43-191-98/</loc>
		<lastmod>2025-01-28T21:41:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/179-43-168-146/</loc>
		<lastmod>2025-01-28T21:41:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/185-230-4-150/</loc>
		<lastmod>2025-01-28T21:41:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/194-180-49-70/</loc>
		<lastmod>2025-01-28T21:41:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/154-213-187-108/</loc>
		<lastmod>2025-01-28T21:41:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/hacktool-vmprotect/</loc>
		<lastmod>2025-01-28T21:41:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/admitad-com/</loc>
		<lastmod>2025-01-28T21:41:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/press/releases/new-teamviewer-and-malwarebytes-partnership-offers-streamlined-endpoint-security-for-it-teams/</loc>
		<lastmod>2025-07-28T19:18:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/exchange-server-2016-and-2019-have-less-than-a-year-to-live/</loc>
		<lastmod>2024-10-16T16:51:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/147-45-112-177/</loc>
		<lastmod>2025-01-28T21:41:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/147-45-112-147/</loc>
		<lastmod>2025-01-28T21:41:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/how-threat-actors-use-ai/</loc>
		<lastmod>2024-10-15T11:41:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/95-214-27-18/</loc>
		<lastmod>2025-01-28T21:41:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/147-45-112-6/</loc>
		<lastmod>2025-01-28T21:41:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/edonhisdhi-com/</loc>
		<lastmod>2025-01-28T21:41:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/54-198-68-150/</loc>
		<lastmod>2025-01-28T21:41:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/87-120-166-244/</loc>
		<lastmod>2025-01-28T21:41:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/198-98-54-234/</loc>
		<lastmod>2025-01-28T21:41:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/37-60-228-103/</loc>
		<lastmod>2025-01-28T21:41:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/95-214-54-53/</loc>
		<lastmod>2025-01-28T21:41:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/62-3-58-88/</loc>
		<lastmod>2025-01-28T21:41:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/141-98-11-67/</loc>
		<lastmod>2025-01-28T21:41:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/poperblocker-com/</loc>
		<lastmod>2025-01-28T21:41:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/leadshurriedlysoak-com/</loc>
		<lastmod>2025-01-28T21:41:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/ransomware-review-october-2024/</loc>
		<lastmod>2024-10-11T18:40:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/patch-now-palo-alto-expedition-vulnerabilities-could-leak-firewall-credentials/</loc>
		<lastmod>2024-10-11T13:46:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/45-200-148-70/</loc>
		<lastmod>2025-01-28T21:41:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/thircenosig-com/</loc>
		<lastmod>2025-01-28T21:41:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/update-now-five-zero-days-fixed-october-patch-tuesday/</loc>
		<lastmod>2024-10-10T16:42:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/hands-on-keyboard-hok-attacks-how-ransomware-gangs-attack-in-real-time/</loc>
		<lastmod>2024-10-10T15:16:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/3-141-165-160/</loc>
		<lastmod>2025-01-28T21:41:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/92-249-48-232/</loc>
		<lastmod>2025-01-28T21:41:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/87-120-113-203/</loc>
		<lastmod>2025-01-28T21:41:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/154-213-187-14/</loc>
		<lastmod>2025-01-28T21:41:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/ransomware-insurance-is-funding-cybercrime-says-white-house-official/</loc>
		<lastmod>2024-10-08T19:26:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/109-204-233-40/</loc>
		<lastmod>2025-01-28T21:41:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/5-tools-it-admins-should-block-right-now/</loc>
		<lastmod>2024-10-07T19:12:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/94-231-192-184/</loc>
		<lastmod>2025-01-28T21:41:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/178-211-139-196/</loc>
		<lastmod>2025-01-28T21:41:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/152-42-255-223/</loc>
		<lastmod>2025-01-28T21:41:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/87-120-115-119/</loc>
		<lastmod>2025-01-28T21:41:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/154-213-184-7/</loc>
		<lastmod>2025-01-28T21:41:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/pup-optional-shiftbrowser/</loc>
		<lastmod>2025-08-18T07:30:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/185-12-59-118/</loc>
		<lastmod>2025-01-28T21:41:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/zimbra-smtp-vulnerability-is-being-exploited-in-numbers/</loc>
		<lastmod>2024-10-03T13:16:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/bunkr-sk/</loc>
		<lastmod>2025-01-28T21:41:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/31-220-1-144/</loc>
		<lastmod>2025-01-28T21:41:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/a-visit-to-a-print-shop-put-a-password-stealer-on-a-co-workers-laptop/</loc>
		<lastmod>2024-10-01T15:58:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/watch-out-mobidash-android-adware-spread-through-phishing-and-online-links/</loc>
		<lastmod>2024-09-30T12:06:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/154-198-227-69/</loc>
		<lastmod>2025-01-28T21:41:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/18-116-203-201/</loc>
		<lastmod>2025-01-28T21:41:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/154-213-184-15/</loc>
		<lastmod>2025-01-28T21:41:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/80-82-65-14/</loc>
		<lastmod>2025-01-28T21:41:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/134-209-122-65/</loc>
		<lastmod>2025-01-28T21:41:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/79-110-62-195/</loc>
		<lastmod>2025-01-28T21:41:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/introducing-detection-center-centralized-threat-management-simplified/</loc>
		<lastmod>2024-09-27T18:30:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/hybrid-cloud-environments-are-not-safe-from-ransomware/</loc>
		<lastmod>2024-09-27T17:08:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/179-43-133-162/</loc>
		<lastmod>2025-01-28T21:41:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/91-92-242-213/</loc>
		<lastmod>2025-01-28T21:41:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/androids-rusty-new-code-shakes-off-huge-number-of-memory-safe-vulnerabilities/</loc>
		<lastmod>2024-09-26T22:20:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/new-integration-nebula-and-oneview-with-google-chronicle-siem/</loc>
		<lastmod>2024-09-25T19:15:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/146-88-240-121/</loc>
		<lastmod>2025-01-28T21:41:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/23-181-56-61/</loc>
		<lastmod>2025-01-28T21:41:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/13-59-91-49/</loc>
		<lastmod>2025-01-28T21:41:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/172-232-25-148/</loc>
		<lastmod>2025-01-28T21:41:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/obtaintrout-com/</loc>
		<lastmod>2025-01-28T21:41:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/bereaveencodefestive-com/</loc>
		<lastmod>2025-01-28T21:41:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/bathingdelicatedemise-com/</loc>
		<lastmod>2025-01-28T21:41:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/lookebonyhill-com/</loc>
		<lastmod>2025-01-28T21:41:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/north-korean-it-workers-or-how-not-to-solve-the-it-staff-shortage/</loc>
		<lastmod>2024-09-24T14:51:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/146-88-240-120/</loc>
		<lastmod>2025-01-28T21:41:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/154-213-184-23/</loc>
		<lastmod>2025-01-28T21:41:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/176-123-10-101/</loc>
		<lastmod>2025-01-28T21:41:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/examplesclasp-com/</loc>
		<lastmod>2025-01-28T21:41:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/154-213-187-244/</loc>
		<lastmod>2025-01-28T21:40:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/146-88-240-119/</loc>
		<lastmod>2025-01-28T21:40:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/179-43-150-154/</loc>
		<lastmod>2025-01-28T21:40:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/45-148-10-238/</loc>
		<lastmod>2025-01-28T21:40:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/92-249-48-213/</loc>
		<lastmod>2025-01-28T21:40:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/91-92-241-6/</loc>
		<lastmod>2025-01-28T21:40:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/23-228-72-18/</loc>
		<lastmod>2025-01-28T21:40:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/ivanti-patches-admin-bypass-for-cloud-services-appliance/</loc>
		<lastmod>2024-09-20T14:33:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/146-88-240-116/</loc>
		<lastmod>2025-01-28T21:40:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/134-122-29-30/</loc>
		<lastmod>2025-01-28T21:40:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/blog/attacker-or-it-admin-test-your-skills/</loc>
		<lastmod>2024-09-27T16:50:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/172-234-96-249/</loc>
		<lastmod>2025-01-28T21:40:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://dev-www.threatdown.com/threat-detections/193-111-248-148/</loc>
		<lastmod>2025-01-28T21:40:55+00:00</lastmod>
	</url>
</urlset>
<!-- Sitemap is served from cache -->
