<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://ransom-isac.org</loc>
<lastmod>2026-04-05T10:20:56.847Z</lastmod>
<changefreq>weekly</changefreq>
<priority>1</priority>
</url>
<url>
<loc>https://ransom-isac.org/blog</loc>
<lastmod>2026-04-05T10:20:56.847Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ransom-isac.org/partners</loc>
<lastmod>2026-04-05T10:20:56.847Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ransom-isac.org/lockstar-members</loc>
<lastmod>2026-04-05T10:20:56.847Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://ransom-isac.org/lockstar-members/guidelines</loc>
<lastmod>2026-04-05T10:20:56.847Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://ransom-isac.org/lockstar-members/application</loc>
<lastmod>2026-04-05T10:20:56.847Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://ransom-isac.org/blog/supply-chain-confidence</loc>
<lastmod>2026-04-03T00:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ransom-isac.org/blog/analysing-and-detecting-byovd</loc>
<lastmod>2026-04-03T00:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ransom-isac.org/blog/contagious-interview-vscode-to-rat</loc>
<lastmod>2026-03-16T00:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ransom-isac.org/blog/ven0m-ransomware-dfir-analysis</loc>
<lastmod>2026-02-26T00:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ransom-isac.org/blog/ransomware-in-healthcare-three-years-of-insight</loc>
<lastmod>2026-02-19T00:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ransom-isac.org/blog/ransomware-leak-collection-analysis</loc>
<lastmod>2026-02-06T00:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ransom-isac.org/blog/safely-tracking-ransomware-affiliates</loc>
<lastmod>2025-12-29T00:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ransom-isac.org/blog/cross-chain-txdatahiding-crypto-heist-part-4</loc>
<lastmod>2025-12-08T00:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ransom-isac.org/blog/cross-chain-txdatahiding-crypto-heist-part-2</loc>
<lastmod>2025-10-27T00:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ransom-isac.org/blog/cross-chain-txdatahiding-crypto-heist</loc>
<lastmod>2025-10-20T00:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.8</priority>
</url>
</urlset>
