<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://threatmate.com/</loc>
    <changefreq>weekly</changefreq>
    <priority>1.0</priority>
  </url>
  <url>
    <loc>https://threatmate.com/platform</loc>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://threatmate.com/platform/pentesting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatmate.com/platform/m365</loc>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatmate.com/platform/vulnerabilities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatmate.com/platform/dark-web</loc>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatmate.com/platform/endpoint</loc>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatmate.com/use-cases/prospecting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatmate.com/use-cases/attack-surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatmate.com/integrations</loc>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatmate.com/blog</loc>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://threatmate.com/resources</loc>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatmate.com/company</loc>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatmate.com/careers</loc>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://threatmate.com/security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatmate.com/demo</loc>
    <changefreq>monthly</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://threatmate.com/sample-report</loc>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatmate.com/agentic-pentesting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatmate.com/lobstertrap</loc>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatmate.com/distributors</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://threatmate.com/press</loc>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatmate.com/status</loc>
    <changefreq>weekly</changefreq>
    <priority>0.3</priority>
  </url>
  <url>
    <loc>https://threatmate.com/bug-bounty</loc>
    <changefreq>monthly</changefreq>
    <priority>0.4</priority>
  </url>
  <url>
    <loc>https://threatmate.com/privacy-request</loc>
    <changefreq>yearly</changefreq>
    <priority>0.3</priority>
  </url>
  <url>
    <loc>https://threatmate.com/legal</loc>
    <changefreq>monthly</changefreq>
    <priority>0.3</priority>
  </url>
  <url>
    <loc>https://threatmate.com/legal/privacy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.3</priority>
  </url>
  <url>
    <loc>https://threatmate.com/webinars/crown-jewel-discovery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://threatmate.com/webinars/agentic-pentesting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://threatmate.com/webinars/mythos-ready</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://threatmate.com/webinars/new-pentest-playbook</loc>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://threatmate.com/blog/ai-agent-got-ceo-banned-from-facebook</loc>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatmate.com/blog/ai-bots-attack-surface-how-to-secure-them</loc>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatmate.com/blog/attackers-use-ai-at-machine-speed-your-team-still-uses-email-here-s-why-that-s-a-problem</loc>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatmate.com/blog/podcast-left-of-boom-vs-right-of-boom</loc>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatmate.com/blog/left-of-boom-cybersecurity-an-explainer</loc>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatmate.com/blog/threatmate-appoints-patrick-albert-as-chief-operating-officer</loc>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatmate.com/blog/understanding-the-owasp-top-10-what-msps-need-to-know-in-2025</loc>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatmate.com/blog/cisa-just-gave-msps-a-microsoft-365-blueprint</loc>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatmate.com/blog/why-hackers-love-microsoft-365</loc>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatmate.com/blog/when-hackers-use-ai-why-defenders-must-evolve</loc>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatmate.com/blog/pentesting-for-msps-real-world-workflows-and-use-cases</loc>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatmate.com/blog/how-to-turn-cyber-risk-assessment-into-managed-service-revenue</loc>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatmate.com/blog/the-msp-guide-to-automated-penetration-testing</loc>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatmate.com/blog/why-vulnerability-scanning-is-no-longer-enough-for-msps</loc>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatmate.com/blog/securing-the-modern-attack-surface-a-continuous-approach</loc>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatmate.com/blog/the-role-of-dmarc-in-protecting-your-clients-brand-reputation</loc>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatmate.com/blog/microsoft-365-security-beyond-the-default-settings</loc>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatmate.com/blog/the-rise-of-identity-based-attacks-what-you-need-to-know</loc>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatmate.com/blog/what-happens-if-cve-funding-ends-the-backbone-of-vulnerability-disclosure-is-under-threat</loc>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatmate.com/blog/how-to-prioritize-vulnerabilities-when-everything-is-critical</loc>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatmate.com/blog/the-benefits-of-continuous-threat-exposure-management-ctem</loc>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatmate.com/blog/protecting-your-msp-practicing-what-you-preach-in-security</loc>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatmate.com/blog/how-is-attack-surface-management-different-from-vulnerability-management</loc>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatmate.com/blog/top-5-security-exposures-found-in-small-business-networks</loc>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatmate.com/blog/why-every-msp-needs-a-mission-plan-for-remediation</loc>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatmate.com/blog/2023-year-in-review-the-changing-face-of-smb-cyber-risk</loc>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatmate.com/blog/security-validation-proving-your-value-as-an-msp</loc>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatmate.com/blog/ssh-vulnerable-to-downgrade-attack</loc>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatmate.com/blog/the-future-of-automated-security-audits</loc>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatmate.com/blog/threat-actors-leak-9000-user-accounts-from-international-energy-company</loc>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatmate.com/blog/understanding-epss-a-better-way-to-prioritize-vulnerabilities</loc>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatmate.com/blog/zero-day-xss-flaw-found-in-roundcube-webmail-software</loc>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatmate.com/blog/dark-web-monitoring-turning-passive-data-into-active-defense</loc>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatmate.com/blog/the-msps-checklist-for-m365-security-baselines</loc>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatmate.com/blog/external-vs-internal-pentesting-why-you-need-both</loc>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatmate.com/blog/building-trust-through-transparency-the-power-of-client-reports</loc>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatmate.com/blog/common-misconfigurations-that-lead-to-data-breaches</loc>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatmate.com/blog/scaling-security-operations-without-adding-headcount</loc>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatmate.com/blog/why-agentless-scanning-is-a-game-changer-for-msp-prospecting</loc>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatmate.com/blog/identifying-stale-accounts-the-low-hanging-fruit-of-cloud-security</loc>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatmate.com/blog/the-hidden-risks-in-your-clients-iot-and-unmanaged-devices</loc>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatmate.com/blog/cyber-insurance-and-the-growing-requirement-for-pentesting</loc>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatmate.com/blog/active-directory-security-closing-the-door-on-lateral-movement</loc>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatmate.com/blog/why-differentiate-your-security-services-in-a-crowded-market</loc>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatmate.com/blog/the-impact-of-nis2-directive-on-managed-service-providers</loc>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatmate.com/blog/vulnerability-assessment-vs-penetration-testing-clearing-the-confusion</loc>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatmate.com/blog/protecting-remote-workers-security-beyond-the-office-perimeter</loc>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatmate.com/blog/new-ransomware-attack-mimic-exploits-ms-sql</loc>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatmate.com/blog/the-evolution-of-ransomware-how-smbs-are-being-targeted</loc>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatmate.com/blog/security-as-a-sales-tool-winning-new-clients-with-data</loc>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatmate.com/blog/essential-security-controls-for-every-small-business</loc>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatmate.com/blog/the-importance-of-regular-security-audits</loc>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatmate.com/blog/introduction-to-attack-surface-management</loc>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatmate.com/blog/securing-microsoft-365-a-beginners-guide</loc>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatmate.com/blog/why-we-built-threatmate-a-note-from-the-founders</loc>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatmate.com/blog/common-vulnerabilities-and-how-to-fix-them</loc>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatmate.com/blog/welcome-to-the-threatmate-blog</loc>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://threatmate.com/press/kraken-agentic-pentesting-kaseya-connect-2026</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://threatmate.com/podcasts/ai-hacker</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://threatmate.com/podcasts/future-pentesting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://threatmate.com/podcasts/proactive-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://threatmate.com/podcasts/pentesting-matters</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://threatmate.com/podcasts/left-of-boom</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
</urlset>
