<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://securelic.com/</loc>
<lastmod>2026-04-15T13:58:24.200Z</lastmod>
<changefreq>weekly</changefreq>
<priority>1</priority>
</url>
<url>
<loc>https://securelic.com/company</loc>
<lastmod>2026-04-15T13:58:24.200Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://securelic.com/scanners</loc>
<lastmod>2026-04-15T13:58:24.200Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://securelic.com/pricing</loc>
<lastmod>2026-04-15T13:58:24.200Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://securelic.com/blog</loc>
<lastmod>2026-04-15T13:58:24.200Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://securelic.com/contact-us</loc>
<lastmod>2026-04-15T13:58:24.200Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://securelic.com/privacy-policy</loc>
<lastmod>2026-04-15T13:58:24.200Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.3</priority>
</url>
<url>
<loc>https://securelic.com/terms-of-use</loc>
<lastmod>2026-04-15T13:58:24.200Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.3</priority>
</url>
<url>
<loc>https://securelic.com/refund-policy</loc>
<lastmod>2026-04-15T13:58:24.200Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.3</priority>
</url>
<url>
<loc>https://securelic.com/authorization-legal-responsibility-statement</loc>
<lastmod>2026-04-15T13:58:24.200Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.3</priority>
</url>
<url>
<loc>https://securelic.com/rss.xml</loc>
<lastmod>2026-04-15T13:58:24.200Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.2</priority>
</url>
<url>
<loc>https://securelic.com/blog/axios-npm-supply-chain-attack-a-deep-dive-into-the-sapphire-sleet-rat-campaign/61d6ef3d534004485de707428fbca11d</loc>
<lastmod>2026-04-07T17:04:11.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://securelic.com/blog/the-teampcp-supply-chain-attack-when-security-tools-become-weapons/72a3da7bcbf2f4ac46884e28b9115340</loc>
<lastmod>2026-04-02T19:17:43.566Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://securelic.com/blog/the-art-of-web-recon-mastering-whatweb-for-fingerprinting-and-vulnerability-detection/605bd68ef2aa76764d0a123ab661b02c</loc>
<lastmod>2026-04-02T19:17:43.822Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://securelic.com/blog/mastering-server-security-with-the-nikto-web-server-scanner/7276341c6fad76f99bbfadf9fa1c7f90</loc>
<lastmod>2026-04-02T19:31:41.010Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://securelic.com/blog/unleashing-the-wapiti-web-vulnerability-scanner-deep-dive-securelic-integration/f97bb5416a6dfbdb8b4ed03e0c66c2d5</loc>
<lastmod>2026-04-02T19:17:43.745Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://securelic.com/blog/openvas-unveiled-the-backbone-of-comprehensive-network-security-assessments/aa1fcd7f3b99b42600be39fcc6c527e2</loc>
<lastmod>2026-04-02T19:30:33.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://securelic.com/blog/proactive-defense-uncovering-critical-flaws-with-owasp-zap-active-scanning/2fad1d743cdf7ba5e2bcdff04ef92275</loc>
<lastmod>2026-04-02T19:31:41.087Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://securelic.com/blog/the-ultimate-guide-to-owasp-zap-passive-scanning-securing-your-applications-silently/36a468730d2e259a7e6c76f70a62b5aa</loc>
<lastmod>2026-04-02T19:31:40.780Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://securelic.com/blog/30-security-rules-for-ai-vibe-coding/99040bb0ad0d704557f56b21535dbfb5</loc>
<lastmod>2026-04-02T19:30:30.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://securelic.com/blog/the-ultimate-guide-to-owasp-top-10-agentic-ai-security-2026-end-to-end-protection-with-securelic-features/1de52200e8a9f98a46226d1ec84a4fae</loc>
<lastmod>2026-04-02T19:31:40.854Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://securelic.com/blog/the-ai-era-of-cyber-threats-key-takeaways-from-the-crowdstrike-2026-global-threat-report/4b5782590cda9f609b1a6c2a84270b54</loc>
<lastmod>2026-04-02T19:30:27.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://securelic.com/blog/the-architecture-of-an-open-source-powered-online-vulnerability-scanner/addf678cd3b5ea4d7089024d4b5fb33d</loc>
<lastmod>2026-04-02T19:31:40.630Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://securelic.com/blog/beyond-vulnerability-scanning-why-continuous-attack-surface-management-asm-is-non-negotiable/bccff599ae162a7c3b9687972d38c0d7</loc>
<lastmod>2026-04-02T19:30:25.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://securelic.com/blog/the-art-of-reconnaissance-in-cybersecurity-how-nmap-securelic-power-attack-surface-visibility/5ccabc291a6d4279229e4c3eb4f7cc2b</loc>
<lastmod>2026-04-02T19:31:40.931Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://securelic.com/blog/openclaw-clawbleed-cve-2026-25253-the-token-leak-behind-the-one-click-rce-nightmare/f62ff2a5ee913b48d4d2b0a5333a86e6</loc>
<lastmod>2026-04-02T19:29:39.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://securelic.com/blog/sap-security-patch-day-january-2026/abd7f6290ac15fcd15589b094e7b2d15</loc>
<lastmod>2026-04-02T19:30:21.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://securelic.com/blog/notepad-privilege-escalation-vulnerability-analysis-of-cve-2025-49144/e2b771c2b4295ab44e3116751e9880cd</loc>
<lastmod>2026-04-02T19:31:41.162Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://securelic.com/blog/beyond-the-perimeter-30-essential-osint-threat-intel-platforms-for-modern-secops/a836a396fb1887f78faa0d0cfbc89d94</loc>
<lastmod>2026-03-23T04:29:51.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://securelic.com/blog/the-agentic-ai-attack-surface-8-new-threats-to-your-api-security/cfacbe9965fc95fc4b4a8842a9eef5df</loc>
<lastmod>2026-04-02T19:30:17.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://securelic.com/blog/mongobleed-cve-2025-14847-critical-mongodb-data-leak-fix-securelic/cb8021cbf720c36fa6e87f177f676dcb</loc>
<lastmod>2026-04-02T19:31:40.705Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://securelic.com/blog/react2shell-cve-2025-55182-critical-rce-analysis-fixes-securelic/b26c7cc6d1deff9be08658c0ee75bc75</loc>
<lastmod>2026-04-02T19:30:12.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
</urlset>
