<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://phisheye.com/about</loc>
<lastmod>2026-04-27T11:37:56.549Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/alternatives/bolster-alternatives</loc>
<lastmod>2026-04-27T11:37:56.549Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/alternatives/checkphish-alternatives</loc>
<lastmod>2026-04-27T11:37:56.549Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/blog/best-brand-protection-platforms</loc>
<lastmod>2026-04-27T11:37:56.553Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/blog/best-phishing-detection-and-takedown-platforms</loc>
<lastmod>2026-04-27T11:37:56.553Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/blog</loc>
<lastmod>2026-04-27T11:37:56.553Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/blog/takedown-metrics-that-matter-2026</loc>
<lastmod>2026-04-27T11:37:56.553Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/blog/why-centralize-digital-risk-2026</loc>
<lastmod>2026-04-27T11:37:56.553Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/case-studies/b2b-saas-phishing-surge</loc>
<lastmod>2026-04-27T11:37:56.553Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/case-studies/global-retail-typosquat-response</loc>
<lastmod>2026-04-27T11:37:56.553Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/case-studies</loc>
<lastmod>2026-04-27T11:37:56.553Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/comparisons/domain-monitoring-software-vs-managed-service</loc>
<lastmod>2026-04-27T11:37:56.553Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/comparisons/evaluating-brand-protection-platforms</loc>
<lastmod>2026-04-27T11:37:56.553Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/comparisons</loc>
<lastmod>2026-04-27T11:37:56.553Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/comparisons/phisheye-vs-bolster</loc>
<lastmod>2026-04-27T11:37:56.553Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/comparisons/phisheye-vs-brandshield</loc>
<lastmod>2026-04-27T11:37:56.553Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/comparisons/phisheye-vs-checkphish</loc>
<lastmod>2026-04-27T11:37:56.553Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/comparisons/phisheye-vs-cloudsek</loc>
<lastmod>2026-04-27T11:37:56.553Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/comparisons/phisheye-vs-cybelangel</loc>
<lastmod>2026-04-27T11:37:56.553Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/comparisons/phisheye-vs-doppel</loc>
<lastmod>2026-04-27T11:37:56.553Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/comparisons/phisheye-vs-flare</loc>
<lastmod>2026-04-27T11:37:56.553Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/comparisons/phisheye-vs-netcraft</loc>
<lastmod>2026-04-27T11:37:56.553Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/comparisons/phisheye-vs-phishfort</loc>
<lastmod>2026-04-27T11:37:56.553Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/comparisons/phisheye-vs-phishlabs</loc>
<lastmod>2026-04-27T11:37:56.553Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/comparisons/phisheye-vs-recorded-future</loc>
<lastmod>2026-04-27T11:37:56.553Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/comparisons/phisheye-vs-zerofox</loc>
<lastmod>2026-04-27T11:37:56.557Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/contact</loc>
<lastmod>2026-04-27T11:37:56.557Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/demo</loc>
<lastmod>2026-04-27T11:37:56.557Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary</loc>
<lastmod>2026-04-27T11:37:56.557Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/guides/documenting-evidence-for-abuse-reports</loc>
<lastmod>2026-04-27T11:37:56.557Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/guides/executive-impersonation-response-playbook</loc>
<lastmod>2026-04-27T11:37:56.557Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/guides/fake-app-monitoring-brand-programs</loc>
<lastmod>2026-04-27T11:37:56.557Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/guides/how-phishing-takedowns-work</loc>
<lastmod>2026-04-27T11:37:56.557Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/guides/how-typosquat-detection-works</loc>
<lastmod>2026-04-27T11:37:56.557Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/guides</loc>
<lastmod>2026-04-27T11:37:56.557Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/guides/prioritizing-digital-risk-alerts</loc>
<lastmod>2026-04-27T11:37:56.557Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/help</loc>
<lastmod>2026-04-27T11:37:56.557Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/</loc>
<lastmod>2026-04-27T11:37:56.557Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/platform</loc>
<lastmod>2026-04-27T11:37:56.557Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/pricing</loc>
<lastmod>2026-04-27T11:37:56.557Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/privacy</loc>
<lastmod>2026-04-27T11:37:56.557Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/products</loc>
<lastmod>2026-04-27T11:37:56.557Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/reports/digital-risk-brief-2026</loc>
<lastmod>2026-04-27T11:37:56.561Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/reports</loc>
<lastmod>2026-04-27T11:37:56.561Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/resources</loc>
<lastmod>2026-04-27T11:37:56.561Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/solutions</loc>
<lastmod>2026-04-27T11:37:56.561Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/terms</loc>
<lastmod>2026-04-27T11:37:56.561Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/trust</loc>
<lastmod>2026-04-27T11:37:56.561Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/products/phishing-scam-protection</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/products/brand-protection</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/products/typosquatting-protection</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/products/digital-risk-protection-services</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/products/executive-impersonation-protection</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/platform/domain-monitoring-takedowns</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/platform/social-media-monitoring-takedowns</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/platform/app-store-monitoring-takedowns</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/platform/dark-web-ai-monitoring</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/platform/automated-takedowns</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/solutions/financial-services</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/solutions/ecommerce</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/solutions/saas</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/solutions/brands</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/solutions/executive-protection</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/digital-risk-protection</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/brand-abuse</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/phishing</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/typosquatting</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/bec</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/executive-impersonation</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/takedown</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/lookalike-domain</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/homoglyph-attack</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/domain-monitoring</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/whois-rdap</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/certificate-transparency</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/smishing</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/vishing</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/credential-harvesting</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/phishing-kit</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/watering-hole-attack</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/malvertising</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/fake-app</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/social-impersonation</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/marketplace-abuse</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/abuse-desk</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/abuse-report</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/evidence-package</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/threat-intel-enrichment</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/recycle-rate</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/cybersquatting</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/udrp</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/digital-supply-chain-risk</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/vendor-sla-takedown</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/account-takeover-fraud</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/advanced-persistent-threat</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/ai-in-threat-intelligence</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/anti-money-laundering</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/botnet</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/brand-intelligence</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/brand-threat-protection</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/ceo-fraud</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/computer-emergency-response-team</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/credential-stuffing</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/credit-card-monitoring</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/cyber-fusion-center</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/cyber-risk-monitoring-and-digital-threat-monitoring</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/cyber-security-intelligence</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/cyber-threat-intelligence</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/cyberattack</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/dark-web</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/data-breach</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/data-broker</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/data-leak</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/ddos-attack</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/decision-intelligence-platform</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/deep-web</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/digital-executive-protection</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/disinformation-and-misinformation-in-threat-intelligence</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/dissemination-of-intelligence-data</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/dns-spoofing</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/email-spoofing</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/extended-detection-and-response</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/external-threat-intelligence</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/finished-intelligence</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/five-eyes</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/fraud</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/fraud-intelligence</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/geopolitical-intelligence</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/geopolitics</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/hacktivism</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/identity-fraud</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/impersonation-attack</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/incident-response-team</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/indicators-of-attack</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/indicators-of-compromise</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/information-sharing-and-analysis-centers</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/insider-threat</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/intelligence-analysis-software</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/intelligence-cycle</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/intelligence-requirements</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/kinetic-attack</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/know-your-customer</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/machine-learning</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/malware</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/man-in-the-middle-attack</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/mitre-att-and-ck-framework</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/open-source-security-intelligence-osint</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/operational-intelligence</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/osint-collection-plan</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/paste-sites</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/penetration-testing</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/personally-identifiable-information</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/pharming</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/physical-security-intelligence</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/priority-intelligence-requirements</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/protective-intelligence</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/ransomware</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/remote-code-execution</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/reputational-damage</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/secops-intelligence</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/security-information-and-event-managment</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/security-operations</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/shadow-it</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/soar</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/social-engineering</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/specific-intelligence-requirements</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/stix-taxii</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/strategic-political-intelligence</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/supply-chain-attack</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/tactical-intelligence</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/third-party-risk</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/threat-actor</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/threat-hunting-team</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/threat-intelligence-feed</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/threat-intelligence-lifecycle</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/threat-intelligence-platform</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/trademark-monitoring</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/ttps</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/unified-risk-intelligence</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/unstructured-data</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/vulnerability-analysis</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/vulnerability-intelligence</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/vulnerability-scanning</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
<url>
<loc>https://phisheye.com/glossary/whaling</loc>
<lastmod>2026-04-27T11:37:56.560Z</lastmod>
</url>
</urlset>
