<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://cypho.io/</loc>
<lastmod>2026-02-27T00:00:00.000Z</lastmod>
</url>
<url>
<loc>https://cypho.io/customers/contact-sales</loc>
<lastmod>2026-02-27T00:00:00.000Z</lastmod>
</url>
<url>
<loc>https://cypho.io/blogs</loc>
<lastmod>2026-02-27T00:00:00.000Z</lastmod>
</url>
<url>
<loc>https://cypho.io/customers</loc>
<lastmod>2026-02-27T00:00:00.000Z</lastmod>
</url>
<url>
<loc>https://cypho.io/who-we-assist</loc>
<lastmod>2026-02-27T00:00:00.000Z</lastmod>
</url>
<url>
<loc>https://cypho.io/features/attack-surface-management</loc>
<lastmod>2026-02-27T00:00:00.000Z</lastmod>
</url>
<url>
<loc>https://cypho.io/features/digital-brand-protection</loc>
<lastmod>2026-02-27T00:00:00.000Z</lastmod>
</url>
<url>
<loc>https://cypho.io/features/threat-intelligence</loc>
<lastmod>2026-02-27T00:00:00.000Z</lastmod>
</url>
<url>
<loc>https://cypho.io/solutions/solutions-by-industries/ecommerce</loc>
<lastmod>2026-02-27T00:00:00.000Z</lastmod>
</url>
<url>
<loc>https://cypho.io/solutions/solutions-by-industries/financial-services</loc>
<lastmod>2026-02-27T00:00:00.000Z</lastmod>
</url>
<url>
<loc>https://cypho.io/solutions/solutions-by-industries/govenment</loc>
<lastmod>2026-02-27T00:00:00.000Z</lastmod>
</url>
<url>
<loc>https://cypho.io/solutions/solutions-by-industries/healthcare</loc>
<lastmod>2026-02-27T00:00:00.000Z</lastmod>
</url>
<url>
<loc>https://cypho.io/solutions/solutions-by-industries/oil-and-gas</loc>
<lastmod>2026-02-27T00:00:00.000Z</lastmod>
</url>
<url>
<loc>https://cypho.io/solutions/solutions-by-industries/telecom</loc>
<lastmod>2026-02-27T00:00:00.000Z</lastmod>
</url>
<url>
<loc>https://cypho.io/solutions/use-cases/attack-surface-discovery-monitoring</loc>
<lastmod>2026-02-27T00:00:00.000Z</lastmod>
</url>
<url>
<loc>https://cypho.io/solutions/use-cases/brand-protection-against</loc>
<lastmod>2026-02-27T00:00:00.000Z</lastmod>
</url>
<url>
<loc>https://cypho.io/solutions/use-cases/data-leak-dark-web-monitoring</loc>
<lastmod>2026-02-27T00:00:00.000Z</lastmod>
</url>
<url>
<loc>https://cypho.io/solutions/use-cases/threat-actor-and-campaign-tracking</loc>
<lastmod>2026-02-27T00:00:00.000Z</lastmod>
</url>
<url>
<loc>https://cypho.io/solutions/use-cases/threat-detection-and-response-acceleration</loc>
<lastmod>2026-02-27T00:00:00.000Z</lastmod>
</url>
<url>
<loc>https://cypho.io/solutions/use-cases/vulnerability-and-risk-prioritization</loc>
<lastmod>2026-02-27T00:00:00.000Z</lastmod>
</url>
<url>
<loc>https://cypho.io/solutions/solutions-by-company-size/growing-businesses</loc>
<lastmod>2026-02-27T00:00:00.000Z</lastmod>
</url>
<url>
<loc>https://cypho.io/solutions/solutions-by-company-size/mssp</loc>
<lastmod>2026-02-27T00:00:00.000Z</lastmod>
</url>
<url>
<loc>https://cypho.io/solutions/solutions-by-company-size/startups</loc>
<lastmod>2026-02-27T00:00:00.000Z</lastmod>
</url>
<url>
<loc>https://cypho.io/blogs/artificial-intelligence-in-cybersecurity</loc>
<lastmod>2026-03-03T00:00:00.000Z</lastmod>
</url>
<url>
<loc>https://cypho.io/blogs/apt29-cozy-bear</loc>
<lastmod>2026-02-27T00:00:00.000Z</lastmod>
</url>
<url>
<loc>https://cypho.io/blogs/osint-and-internet-scanning-platforms-matter-a-practical-look-at-popular-tools</loc>
<lastmod>2025-06-15T00:00:00.000Z</lastmod>
</url>
<url>
<loc>https://cypho.io/blogs/data-leaks-in-the-modern-world-understanding-the-threat-and-learning-from-recent-global-incidents</loc>
<lastmod>2025-06-10T00:00:00.000Z</lastmod>
</url>
<url>
<loc>https://cypho.io/blogs/silent-threats-in-your-browser-how-chrome-extensions-can-compromise-you</loc>
<lastmod>2025-06-05T00:00:00.000Z</lastmod>
</url>
<url>
<loc>https://cypho.io/blogs/cve-2025-12480-critical-improper-access-control-in-triofox</loc>
<lastmod>2025-05-28T00:00:00.000Z</lastmod>
</url>
<url>
<loc>https://cypho.io/blogs/codefinger-ransomware-the-operation-targeting-critical-infrastructure-worldwide</loc>
<lastmod>2025-05-20T00:00:00.000Z</lastmod>
</url>
<url>
<loc>https://cypho.io/blogs/scattered-spider</loc>
<lastmod>2025-05-15T00:00:00.000Z</lastmod>
</url>
<url>
<loc>https://cypho.io/blogs/stealer-logs-in-2025-Anatomy-of-a-silent-data-heist</loc>
<lastmod>2025-05-10T00:00:00.000Z</lastmod>
</url>
<url>
<loc>https://cypho.io/blogs/cve-2025-24091-ios-and-ipados-vulnerability-allows-app-to-impersonate-system-notifications</loc>
<lastmod>2025-05-05T00:00:00.000Z</lastmod>
</url>
<url>
<loc>https://cypho.io/blogs/cve-2025-55315-critical-http-request-smuggling-in-aspnet-core</loc>
<lastmod>2025-04-28T00:00:00.000Z</lastmod>
</url>
<url>
<loc>https://cypho.io/blogs/neptune-loader-exposing-hidden-realms-malware-command-control-vulnerability-undercover-effected-machines</loc>
<lastmod>2025-04-20T00:00:00.000Z</lastmod>
</url>
</urlset>
