<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 22, 2026 at 11:39 pm by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://slcyber.io/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Searchlight Cyber</title>
		<link><![CDATA[https://slcyber.io]]></link>
		<description><![CDATA[Searchlight Cyber]]></description>
		<lastBuildDate><![CDATA[Wed, 22 Apr 2026 12:49:06 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://slcyber.io/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://slcyber.io/enterprise-and-mssps/]]></guid>
			<link><![CDATA[https://slcyber.io/enterprise-and-mssps/]]></link>
			<title>Enterprise and MSSPs</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 12:49:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://slcyber.io/whitepapers-reports/ransomware-spotlight-vice-societys-dark-web-footprint/]]></guid>
			<link><![CDATA[https://slcyber.io/whitepapers-reports/ransomware-spotlight-vice-societys-dark-web-footprint/]]></link>
			<title>Ransomware Spotlight: Vice Society&#8217;s Dark Web Footprint</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 09:47:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://slcyber.io/critical-national-infrastructure-in-the-firing-line/]]></guid>
			<link><![CDATA[https://slcyber.io/critical-national-infrastructure-in-the-firing-line/]]></link>
			<title>Critical National Infrastructure in the Firing Line</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 09:46:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://slcyber.io/blog/full-unconditional-pardon-given-to-silk-road-founder/]]></guid>
			<link><![CDATA[https://slcyber.io/blog/full-unconditional-pardon-given-to-silk-road-founder/]]></link>
			<title>Full Unconditional Pardon Given to Silk Road Founder</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 09:46:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://slcyber.io/nato-tackles-military-documents-for-sale-on-the-dark-web/]]></guid>
			<link><![CDATA[https://slcyber.io/nato-tackles-military-documents-for-sale-on-the-dark-web/]]></link>
			<title>Nato Tackles Military Documents For Sale on the Dark Web</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 09:46:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://slcyber.io/dark-web-intelligence-against-ransomware/]]></guid>
			<link><![CDATA[https://slcyber.io/dark-web-intelligence-against-ransomware/]]></link>
			<title>Using Dark Web Intelligence Against Ransomware Groups</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 09:45:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://slcyber.io/blog/bidencash-marketplace-seized-by-u-s-law-enforcement/]]></guid>
			<link><![CDATA[https://slcyber.io/blog/bidencash-marketplace-seized-by-u-s-law-enforcement/]]></link>
			<title>BidenCash Marketplace Seized by U.S. Law Enforcement</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 09:44:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://slcyber.io/blog/researchers-shed-light-on-changes-in-revived-babuk-2-0/]]></guid>
			<link><![CDATA[https://slcyber.io/blog/researchers-shed-light-on-changes-in-revived-babuk-2-0/]]></link>
			<title>Researchers Shed Light on Changes in Revived Babuk 2.0</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 09:43:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://slcyber.io/mssp-research-are-you-one-of-the-50-not-using-dark-web-intelligence-yet/]]></guid>
			<link><![CDATA[https://slcyber.io/mssp-research-are-you-one-of-the-50-not-using-dark-web-intelligence-yet/]]></link>
			<title>MSSP Research: Are You One of the 50% Not Using Dark Web Intelligence Yet?</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 09:43:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://slcyber.io/five-things-to-look-for-in-dark-web-protection-tools/]]></guid>
			<link><![CDATA[https://slcyber.io/five-things-to-look-for-in-dark-web-protection-tools/]]></link>
			<title>Five Things to Look for in Dark Web Protection Tools</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 09:42:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://slcyber.io/blog/scattered-spider-shifts-focus-to-insurance-industry/]]></guid>
			<link><![CDATA[https://slcyber.io/blog/scattered-spider-shifts-focus-to-insurance-industry/]]></link>
			<title>Scattered Spider Shifts Focus to Insurance Industry</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 09:41:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://slcyber.io/attacks-against-atms-intelligence-from-the-dark-web/]]></guid>
			<link><![CDATA[https://slcyber.io/attacks-against-atms-intelligence-from-the-dark-web/]]></link>
			<title>Attacks Against ATMs: Intelligence from the Dark Web</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 09:41:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://slcyber.io/pdf-download-assetnote-continuous-asset-discovery/]]></guid>
			<link><![CDATA[https://slcyber.io/pdf-download-assetnote-continuous-asset-discovery/]]></link>
			<title>PDF Download Page (Protect your extended attack surface)</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 09:40:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://slcyber.io/blog/dutch-police-dismantle-bulletproof-hosting-provider/]]></guid>
			<link><![CDATA[https://slcyber.io/blog/dutch-police-dismantle-bulletproof-hosting-provider/]]></link>
			<title>Dutch Police Dismantle “Bulletproof” Hosting Provider</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 09:39:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://slcyber.io/3-things-i-learned-from-ransomware-trends-on-the-dark-web-webinar/]]></guid>
			<link><![CDATA[https://slcyber.io/3-things-i-learned-from-ransomware-trends-on-the-dark-web-webinar/]]></link>
			<title>Three Key Takeaways From Our Webinar: Ransomware in 2023</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 09:39:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://slcyber.io/blog/blacklock-ransomware-exposed-and-dragonforce-makes-moves/]]></guid>
			<link><![CDATA[https://slcyber.io/blog/blacklock-ransomware-exposed-and-dragonforce-makes-moves/]]></link>
			<title>BlackLock Ransomware Exposed and DragonForce Makes Moves</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 09:38:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://slcyber.io/webinars/spotting-insider-threats-on-the-dark-web/]]></guid>
			<link><![CDATA[https://slcyber.io/webinars/spotting-insider-threats-on-the-dark-web/]]></link>
			<title>[On-demand] Spotting Insider Threats on the Dark Web</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 09:36:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://slcyber.io/videos/how-an-asm-program-paid-for-itself/]]></guid>
			<link><![CDATA[https://slcyber.io/videos/how-an-asm-program-paid-for-itself/]]></link>
			<title>How an ASM program paid for itself</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 09:26:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://slcyber.io/press/searchlight-cyber-uncovers-high-severity-remote-code-execution-vulnerability-in-popular-survey-software/]]></guid>
			<link><![CDATA[https://slcyber.io/press/searchlight-cyber-uncovers-high-severity-remote-code-execution-vulnerability-in-popular-survey-software/]]></link>
			<title>Searchlight Cyber Uncovers High Severity Remote Code Execution Vulnerability in Popular Survey Software</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 09:25:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://slcyber.io/press/searchlight-cyber-selected-as-2024-sc-awards-finalist/]]></guid>
			<link><![CDATA[https://slcyber.io/press/searchlight-cyber-selected-as-2024-sc-awards-finalist/]]></link>
			<title>Searchlight Cyber selected as 2024 SC Awards Finalist</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 09:24:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://slcyber.io/press/study-finds-dark-web-exposure-increases-the-risk-of-a-cyberattack/]]></guid>
			<link><![CDATA[https://slcyber.io/press/study-finds-dark-web-exposure-increases-the-risk-of-a-cyberattack/]]></link>
			<title>Study Finds Dark Web Exposure Increases the Risk of a Cyberattack</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 09:22:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://slcyber.io/pdf-download-darkiq-for-law-enforcement/]]></guid>
			<link><![CDATA[https://slcyber.io/pdf-download-darkiq-for-law-enforcement/]]></link>
			<title>PDF Download Page (DarkIQ for Law Enforcement)</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 09:20:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://slcyber.io/pdf-download-darkiq-for-enterprise/]]></guid>
			<link><![CDATA[https://slcyber.io/pdf-download-darkiq-for-enterprise/]]></link>
			<title>PDF Download Page (DarkIQ for Enterprise)</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 09:20:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://slcyber.io/pdf-download-assetnote-for-government/]]></guid>
			<link><![CDATA[https://slcyber.io/pdf-download-assetnote-for-government/]]></link>
			<title>PDF Download Page (Assetnote for Government)</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 09:19:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://slcyber.io/blog/]]></guid>
			<link><![CDATA[https://slcyber.io/blog/]]></link>
			<title>Blog</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 08:46:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://slcyber.io/thank-you/]]></guid>
			<link><![CDATA[https://slcyber.io/thank-you/]]></link>
			<title>Thank You</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 09:09:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://slcyber.io/pdf-download-darkiq-for-mssps/]]></guid>
			<link><![CDATA[https://slcyber.io/pdf-download-darkiq-for-mssps/]]></link>
			<title>PDF Download Page (DarkIQ for MSSPs)</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 09:08:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://slcyber.io/pdf-download-assetnote-for-law-enforcement/]]></guid>
			<link><![CDATA[https://slcyber.io/pdf-download-assetnote-for-law-enforcement/]]></link>
			<title>PDF Download Page (Assetnote for Law Enforcement)</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 09:07:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://slcyber.io/pdf-download-assetnote-for-enterprise/]]></guid>
			<link><![CDATA[https://slcyber.io/pdf-download-assetnote-for-enterprise/]]></link>
			<title>PDF Download Page (Assetnote for Enterprise)</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 09:07:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://slcyber.io/pdf-download-assetnote-for-mssps/]]></guid>
			<link><![CDATA[https://slcyber.io/pdf-download-assetnote-for-mssps/]]></link>
			<title>PDF Download Page (Assetnote for MSSPs)</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 09:06:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://slcyber.io/pdf-download-darkiq-for-government/]]></guid>
			<link><![CDATA[https://slcyber.io/pdf-download-darkiq-for-government/]]></link>
			<title>PDF Download Page (DarkIQ for Government)</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 09:03:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://slcyber.io/blog/what-is-cti-the-essential-guide-to-cyber-threat-intelligence-in-2026/]]></guid>
			<link><![CDATA[https://slcyber.io/blog/what-is-cti-the-essential-guide-to-cyber-threat-intelligence-in-2026/]]></link>
			<title>What Is CTI? The Essential Guide to Cyber Threat Intelligence in 2026</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 08:48:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://slcyber.io/videos/it-only-takes-one-asset-asm-exposure/]]></guid>
			<link><![CDATA[https://slcyber.io/videos/it-only-takes-one-asset-asm-exposure/]]></link>
			<title>It only takes one asset &#8211; ASM Security Research</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 08:37:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://slcyber.io/blog/april-21st-this-weeks-top-cybersecurity-and-dark-web-stories/]]></guid>
			<link><![CDATA[https://slcyber.io/blog/april-21st-this-weeks-top-cybersecurity-and-dark-web-stories/]]></link>
			<title>April 21st – This Week’s Top Cybersecurity and Dark Web Stories</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 08:18:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://slcyber.io/blog/what-is-preemptive-threat-exposure-management-ptem/]]></guid>
			<link><![CDATA[https://slcyber.io/blog/what-is-preemptive-threat-exposure-management-ptem/]]></link>
			<title>What is Preemptive Threat Exposure Management (PTEM)?</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 13:56:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://slcyber.io/blog/the-intelligence-hidden-in-ransomware-data/]]></guid>
			<link><![CDATA[https://slcyber.io/blog/the-intelligence-hidden-in-ransomware-data/]]></link>
			<title>The Intelligence Hidden in Ransomware Data</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 13:57:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://slcyber.io/blog/vulnerability-management-how-to-prioritize-real-threats-over-noise/]]></guid>
			<link><![CDATA[https://slcyber.io/blog/vulnerability-management-how-to-prioritize-real-threats-over-noise/]]></link>
			<title>Vulnerability Management: How to Prioritize Real Threats Over Noise</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 14:13:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://slcyber.io/blog/explore-the-data-breach-dashboard-in-cerberus/]]></guid>
			<link><![CDATA[https://slcyber.io/blog/explore-the-data-breach-dashboard-in-cerberus/]]></link>
			<title>Explore the Data Breach Dashboard in Cerberus</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 12:16:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://slcyber.io/blog/april-15th-this-weeks-top-cybersecurity-and-dark-web-stories/]]></guid>
			<link><![CDATA[https://slcyber.io/blog/april-15th-this-weeks-top-cybersecurity-and-dark-web-stories/]]></link>
			<title>April 14th – This Week’s Top Cybersecurity and Dark Web Stories</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 07:32:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://slcyber.io/blog/faster-speed-to-triage-with-improved-detail-view-in-darkiq/]]></guid>
			<link><![CDATA[https://slcyber.io/blog/faster-speed-to-triage-with-improved-detail-view-in-darkiq/]]></link>
			<title>Faster speed to triage with improved detail view in DarkIQ</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 09:45:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://slcyber.io/leadership-team/]]></guid>
			<link><![CDATA[https://slcyber.io/leadership-team/]]></link>
			<title>Leadership Team</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 09:44:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://slcyber.io/blog/what-are-the-four-ways-ctem-fails-without-asm/]]></guid>
			<link><![CDATA[https://slcyber.io/blog/what-are-the-four-ways-ctem-fails-without-asm/]]></link>
			<title>What Are the Four Ways CTEM Fails Without ASM?</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 14:21:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://slcyber.io/research-center/magento-polyshell-unauthenticated-file-upload-to-rce-in-magento-apsb25-94/]]></guid>
			<link><![CDATA[https://slcyber.io/research-center/magento-polyshell-unauthenticated-file-upload-to-rce-in-magento-apsb25-94/]]></link>
			<title>Magento PolyShell &#8211; Unauthenticated File Upload to RCE in Magento (APSB25-94)</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 08:23:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://slcyber.io/]]></guid>
			<link><![CDATA[https://slcyber.io/]]></link>
			<title>Home</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 09:07:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://slcyber.io/what-i-learned-about-the-future-of-mssps-on-our-latest-webinar/]]></guid>
			<link><![CDATA[https://slcyber.io/what-i-learned-about-the-future-of-mssps-on-our-latest-webinar/]]></link>
			<title>What I Learned About the Future of MSSPs on Our Latest Webinar</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 08:39:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://slcyber.io/dark-web-threats-to-the-energy-industry-five-key-takeaways-from-our-latest-webinar/]]></guid>
			<link><![CDATA[https://slcyber.io/dark-web-threats-to-the-energy-industry-five-key-takeaways-from-our-latest-webinar/]]></link>
			<title>Dark Web Threats to the Energy Industry: Five Key Takeaways From Our Latest Webinar</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 08:39:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://slcyber.io/how-law-enforcement-can-combat-crime-on-the-dark-web/]]></guid>
			<link><![CDATA[https://slcyber.io/how-law-enforcement-can-combat-crime-on-the-dark-web/]]></link>
			<title>How Law Enforcement Can Combat Crime on the Dark Web</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 08:38:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://slcyber.io/dark-web-cheat-sheet-for-the-finance-sector/]]></guid>
			<link><![CDATA[https://slcyber.io/dark-web-cheat-sheet-for-the-finance-sector/]]></link>
			<title>Dark Web Cheat Sheet for the Finance Sector</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 08:38:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://slcyber.io/the-finance-sectors-top-3-dark-web-threats/]]></guid>
			<link><![CDATA[https://slcyber.io/the-finance-sectors-top-3-dark-web-threats/]]></link>
			<title>The finance sector’s top 3 dark web threats: Webinar recap</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 08:38:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://slcyber.io/the-ultimate-dark-web-cheat-sheet-for-business/]]></guid>
			<link><![CDATA[https://slcyber.io/the-ultimate-dark-web-cheat-sheet-for-business/]]></link>
			<title>The Ultimate Dark Web Cheat Sheet for Business</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 08:37:55 +0000]]></pubDate>
		</item>
				</channel>
</rss>
