<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://threatray.com</loc>
    </url>
    <url>
        <loc>https://threatray.com/about</loc>
    </url>
    <url>
        <loc>https://threatray.com/blog</loc>
    </url>
    <url>
        <loc>https://threatray.com/privacy-policy</loc>
    </url>
    <url>
        <loc>https://threatray.com/imprint</loc>
    </url>
    <url>
        <loc>https://threatray.com/solutions/analyst-platform</loc>
    </url>
    <url>
        <loc>https://threatray.com/solutions/endpoint</loc>
    </url>
    <url>
        <loc>https://threatray.com/docs/overview</loc>
    </url>
    <url>
        <loc>https://threatray.com/docs/videos</loc>
    </url>
    <url>
        <loc>https://threatray.com/docs/guides</loc>
    </url>
    <url>
        <loc>https://threatray.com/contact-us</loc>
    </url>
    <url>
        <loc>https://threatray.com/book-a-demo</loc>
    </url>
    <url>
        <loc>https://threatray.com/book-a-demo-success</loc>
    </url>
    <url>
        <loc>https://threatray.com/contact-us-success</loc>
    </url>
    <url>
        <loc>https://threatray.com/apply-now</loc>
    </url>
    <url>
        <loc>https://threatray.com/community-edition</loc>
    </url>
    <url>
        <loc>https://threatray.com/community-edition-success</loc>
    </url>
    <url>
        <loc>https://threatray.com/terms-community-edition</loc>
    </url>
    <url>
        <loc>https://threatray.com/blog/a-net-multi-stage-malware-delivery-system</loc>
    </url>
    <url>
        <loc>https://threatray.com/blog/a-new-icedid-gziploader-variant</loc>
    </url>
    <url>
        <loc>https://threatray.com/blog/antti-tikkanen-joins-threatray-as-an-advisor</loc>
    </url>
    <url>
        <loc>https://threatray.com/blog/botconf-2022-qakbot-malware-family-evolution</loc>
    </url>
    <url>
        <loc>https://threatray.com/blog/cyber-security-analytics-company-threatray-raises-2-3-million-chf-to-expand-its-team</loc>
    </url>
    <url>
        <loc>https://threatray.com/blog/establishing-the-tigerrat-and-tigerdownloader-malware-families</loc>
    </url>
    <url>
        <loc>https://threatray.com/blog/freddy-dezeure-joins-threatray-as-an-advisor</loc>
    </url>
    <url>
        <loc>https://threatray.com/blog/hacknowledge-powers-new-capabilities-for-its-clients-with-threatray</loc>
    </url>
    <url>
        <loc>https://threatray.com/blog/infoguard-uses-threatray-to-defend-against-malware-attacks</loc>
    </url>
    <url>
        <loc>https://threatray.com/blog/intel-471-and-threatray-announce-joint-research-collaboration</loc>
    </url>
    <url>
        <loc>https://threatray.com/blog/introducing-john-fokker-as-our-esteemed-advisor</loc>
    </url>
    <url>
        <loc>https://threatray.com/blog/introducing-mathias-fuchs-as-our-esteemed-advisor</loc>
    </url>
    <url>
        <loc>https://threatray.com/blog/join-us-at-hack-lu-17th-edition-in-luxembourg-16-19th-october</loc>
    </url>
    <url>
        <loc>https://threatray.com/blog/join-us-at-virus-bulletin-conference-in-london-4-6-october</loc>
    </url>
    <url>
        <loc>https://threatray.com/blog/join-us-botconf-2023-on-the-11th-of-april-in-strasbourg</loc>
    </url>
    <url>
        <loc>https://threatray.com/blog/leveraging-ai-and-code-intelligence-for-rapid-identification-of-trojanized-dlls</loc>
    </url>
    <url>
        <loc>https://threatray.com/blog/linking-and-tracking-uac-0056-tooling-through-code-reuse-analysis</loc>
    </url>
    <url>
        <loc>https://threatray.com/blog/new-endpoint-memory-scanner-used-by-cern</loc>
    </url>
    <url>
        <loc>https://threatray.com/blog/simon-reiniche-joins-threatray-as-chief-revenue-officer</loc>
    </url>
    <url>
        <loc>https://threatray.com/blog/threat-firstcti22-in-berlin</loc>
    </url>
    <url>
        <loc>https://threatray.com/blog/threat-updates---aidlocker-frag---new-variants-of-hellcat-morpheus-ransomware</loc>
    </url>
    <url>
        <loc>https://threatray.com/blog/threat-updates---donot-downloader</loc>
    </url>
    <url>
        <loc>https://threatray.com/blog/threat-updates---nnice-ransomware-reclassified</loc>
    </url>
    <url>
        <loc>https://threatray.com/blog/threat-updates-boramae---a-new-variant-of-beast-ransomware</loc>
    </url>
    <url>
        <loc>https://threatray.com/blog/threatray-and-nextron-systems-partner-to-take-yara-rule-development-and-malware-classification-to-a-new-level</loc>
    </url>
    <url>
        <loc>https://threatray.com/blog/threatray-at-bsides-2022-binary-code-as-a-searchable-ioc</loc>
    </url>
    <url>
        <loc>https://threatray.com/blog/threatray-release-v2-0</loc>
    </url>
    <url>
        <loc>https://threatray.com/blog/threatray-release-v2-1</loc>
    </url>
    <url>
        <loc>https://threatray.com/blog/threatray-release-v2-2</loc>
    </url>
    <url>
        <loc>https://threatray.com/blog/threatray-release-v2024-07</loc>
    </url>
    <url>
        <loc>https://threatray.com/blog/threatray-release-v2024-10</loc>
    </url>
    <url>
        <loc>https://threatray.com/blog/trellix-discord-i-want-to-play-a-game</loc>
    </url>
    <url>
        <loc>https://threatray.com/blog/uniting-for-discovery-teamt5-and-threatray-announce-joint-research-collaboration-to-unlock-new-frontiers</loc>
    </url>
    <url>
        <loc>https://threatray.com/case-studies/la-mobiliere</loc>
    </url>
</urlset>