<?xml version='1.0' encoding='UTF-8'?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1"><url><loc>https://rivanorth.com/blog/vulnerability-report-august-2024</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/6be63e7b-1061-47e8-b5e2-b10a874c02ae.png</image:loc><image:caption>6be63e7b106147e8b5e2b10a874c02ae</image:caption><image:title>6be63e7b106147e8b5e2b10a874c02ae</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20advisory%20-%20%20Vulnerability%20Report%20-%202025%20-%20March.png</image:loc><image:caption>BlogadvisoryVulnerabilityReport2025March</image:caption><image:title>BlogadvisoryVulnerabilityReport2025March</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/323f2c71-23ed-4716-96e2-5218c744de19.png</image:loc><image:caption>323f2c7123ed471696e25218c744de19</image:caption><image:title>323f2c7123ed471696e25218c744de19</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/b1bbed96-0bb1-4e2c-8e89-b207d2b77768.png</image:loc><image:caption>b1bbed960bb14e2c8e89b207d2b77768</image:caption><image:title>b1bbed960bb14e2c8e89b207d2b77768</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/blog/erc-4626-vulnerabilities-and-how-to-avoid-them-in-your-project</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Research%20-%20ERC4626.png</image:loc><image:caption>ResearchERC4626</image:caption><image:title>ResearchERC4626</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Research%20-%20ERC721.png</image:loc><image:caption>ResearchERC721</image:caption><image:title>ResearchERC721</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/65f692db-1760-4d62-8293-ded167eea172.png</image:loc><image:caption>65f692db17604d628293ded167eea172</image:caption><image:title>65f692db17604d628293ded167eea172</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><lastmod>2025-01-09</lastmod></url><url><loc>https://rivanorth.com/blog/radar-australian-real-estate-cyberattack-2025</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20chart.png</image:loc><image:caption>Blogchart</image:caption><image:title>Blogchart</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20radar.png</image:loc><image:caption>BlogDarkWebradar</image:caption><image:title>BlogDarkWebradar</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20advisory%20-%20%20ISO%2027001.png</image:loc><image:caption>BlogadvisoryISO27001</image:caption><image:title>BlogadvisoryISO27001</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/2025-11-20%20Listing%20disappeared%20-%20edited%202.png</image:loc><image:caption>20251120Listingdisappearededited2</image:caption><image:title>20251120Listingdisappearededited2</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Telstra%20Hack%20Fake%20News.png</image:loc><image:caption>TelstraHackFakeNews</image:caption><image:title>TelstraHackFakeNews</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/radar.png</image:loc><image:caption>radar</image:caption><image:title>radar</image:title></image:image><lastmod>2025-11-20</lastmod></url><url><loc>https://rivanorth.com/guides/socradar-alternative</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Comparison%20-%20SOCRadar%20(2).png</image:loc><image:caption>ComparisonSOCRadar2</image:caption><image:title>ComparisonSOCRadar2</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/X%20icon.svg</image:loc><image:caption>Xicon</image:caption><image:title>Xicon</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Tick%20icon.svg</image:loc><image:caption>Tickicon</image:caption><image:title>Tickicon</image:title></image:image><lastmod>2026-02-26</lastmod></url><url><loc>https://rivanorth.com/blog/hack-explained-ticketek</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/46e25fe0-e08d-4dd9-bd67-7ea93d4c7640.png</image:loc><image:caption>46e25fe0e08d4dd9bd677ea93d4c7640</image:caption><image:title>46e25fe0e08d4dd9bd677ea93d4c7640</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/259753a4-b4ab-4b43-b6bb-1eb8a524dbd6.png</image:loc><image:caption>259753a4b4ab4b43b6bb1eb8a524dbd6</image:caption><image:title>259753a4b4ab4b43b6bb1eb8a524dbd6</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/afaa405b-2370-4cbd-a3a9-f450eab93332.png</image:loc><image:caption>afaa405b23704cbda3a9f450eab93332</image:caption><image:title>afaa405b23704cbda3a9f450eab93332</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/aaf2af2f-8768-479a-b4d6-e38ba59da1cd.png</image:loc><image:caption>aaf2af2f8768479ab4d6e38ba59da1cd</image:caption><image:title>aaf2af2f8768479ab4d6e38ba59da1cd</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/blog/hack-explained-curio</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/d99c6252-ce73-4bea-b932-49e101d25ed8.png</image:loc><image:caption>d99c6252ce734beab93249e101d25ed8</image:caption><image:title>d99c6252ce734beab93249e101d25ed8</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/e623abcf-d50e-4917-96b6-f561e6ab128a.png</image:loc><image:caption>e623abcfd50e491796b6f561e6ab128a</image:caption><image:title>e623abcfd50e491796b6f561e6ab128a</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/ff228455-0db5-47fe-ae65-763f88132209.png</image:loc><image:caption>ff2284550db547feae65763f88132209</image:caption><image:title>ff2284550db547feae65763f88132209</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Hack%20Explained%20-%20sss.png</image:loc><image:caption>HackExplainedsss</image:caption><image:title>HackExplainedsss</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/blog/security-roundup-february-2024-edition</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/b78052bd-be9d-40c8-b776-3f70bbffffc8.png</image:loc><image:caption>b78052bdbe9d40c8b7763f70bbffffc8</image:caption><image:title>b78052bdbe9d40c8b7763f70bbffffc8</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/5e87e3a9-345e-493d-a7b1-c333bc347e65.png</image:loc><image:caption>5e87e3a9345e493da7b1c333bc347e65</image:caption><image:title>5e87e3a9345e493da7b1c333bc347e65</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/fd10479c-a80e-41d8-8278-c2edb127b650.png</image:loc><image:caption>fd10479ca80e41d88278c2edb127b650</image:caption><image:title>fd10479ca80e41d88278c2edb127b650</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/65f692db-1760-4d62-8293-ded167eea172.png</image:loc><image:caption>65f692db17604d628293ded167eea172</image:caption><image:title>65f692db17604d628293ded167eea172</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/blog/hack-explained-hedgey-finance</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/191a690a-838b-4867-926d-4177691cea0e.png</image:loc><image:caption>191a690a838b4867926d4177691cea0e</image:caption><image:title>191a690a838b4867926d4177691cea0e</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Hack%20Explained%20-%20%20woofi.png</image:loc><image:caption>HackExplainedwoofi</image:caption><image:title>HackExplainedwoofi</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Hack%20Explained%20-%20KyberSwap.png</image:loc><image:caption>HackExplainedKyberSwap</image:caption><image:title>HackExplainedKyberSwap</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Hack%20Explained%20-%20Sonne%20.png</image:loc><image:caption>HackExplainedSonne</image:caption><image:title>HackExplainedSonne</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/blog/hack-explained-bittensor</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/0f826aa5-4718-4aaf-88af-c464ab7a700b.png</image:loc><image:caption>0f826aa547184aaf88afc464ab7a700b</image:caption><image:title>0f826aa547184aaf88afc464ab7a700b</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/1e05b8e0-8946-47fd-a71a-675fed03ee8b.png</image:loc><image:caption>1e05b8e0894647fda71a675fed03ee8b</image:caption><image:title>1e05b8e0894647fda71a675fed03ee8b</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/98cd491c-85ed-4385-9095-7d2447a53376.png</image:loc><image:caption>98cd491c85ed438590957d2447a53376</image:caption><image:title>98cd491c85ed438590957d2447a53376</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/072a4689-849b-44d0-aaab-7d30d2f84c9e.png</image:loc><image:caption>072a4689849b44d0aaab7d30d2f84c9e</image:caption><image:title>072a4689849b44d0aaab7d30d2f84c9e</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/blog/hack-explained-levana-protocol</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/1e05b8e0-8946-47fd-a71a-675fed03ee8b.png</image:loc><image:caption>1e05b8e0894647fda71a675fed03ee8b</image:caption><image:title>1e05b8e0894647fda71a675fed03ee8b</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/072a4689-849b-44d0-aaab-7d30d2f84c9e.png</image:loc><image:caption>072a4689849b44d0aaab7d30d2f84c9e</image:caption><image:title>072a4689849b44d0aaab7d30d2f84c9e</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Hack%20Explained%20-%20UwuLend%20.png</image:loc><image:caption>HackExplainedUwuLend</image:caption><image:title>HackExplainedUwuLend</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/ff228455-0db5-47fe-ae65-763f88132209.png</image:loc><image:caption>ff2284550db547feae65763f88132209</image:caption><image:title>ff2284550db547feae65763f88132209</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/contact</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><lastmod>2025-10-15</lastmod></url><url><loc>https://rivanorth.com/blog/hack-explained-tapioca-dao</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/65f692db-1760-4d62-8293-ded167eea172.png</image:loc><image:caption>65f692db17604d628293ded167eea172</image:caption><image:title>65f692db17604d628293ded167eea172</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/b37e4bc9-173c-407e-90a9-4bb30b300bef.png</image:loc><image:caption>b37e4bc9173c407e90a94bb30b300bef</image:caption><image:title>b37e4bc9173c407e90a94bb30b300bef</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/1e05b8e0-8946-47fd-a71a-675fed03ee8b.png</image:loc><image:caption>1e05b8e0894647fda71a675fed03ee8b</image:caption><image:title>1e05b8e0894647fda71a675fed03ee8b</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Hack%20Explained%20-%20Gamma.png</image:loc><image:caption>HackExplainedGamma</image:caption><image:title>HackExplainedGamma</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/blog/security-roundup-june-2024-edition</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/8bb0af35-8f81-44ca-b1be-a0efd3588e1b.png</image:loc><image:caption>8bb0af358f8144cab1bea0efd3588e1b</image:caption><image:title>8bb0af358f8144cab1bea0efd3588e1b</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/07405779-c398-4c8a-bd7a-ae5f6690def6.png</image:loc><image:caption>07405779c3984c8abd7aae5f6690def6</image:caption><image:title>07405779c3984c8abd7aae5f6690def6</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/3d917eb8-544e-4417-ac45-290325730e36.png</image:loc><image:caption>3d917eb8544e4417ac45290325730e36</image:caption><image:title>3d917eb8544e4417ac45290325730e36</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/3ba0f4b3-2776-4a92-9b5c-014f4ea6e371.png</image:loc><image:caption>3ba0f4b327764a929b5c014f4ea6e371</image:caption><image:title>3ba0f4b327764a929b5c014f4ea6e371</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/blog/hack-explained-polter-finance</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/98cd491c-85ed-4385-9095-7d2447a53376.png</image:loc><image:caption>98cd491c85ed438590957d2447a53376</image:caption><image:title>98cd491c85ed438590957d2447a53376</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Hack%20Explained%20-%20%20woofi.png</image:loc><image:caption>HackExplainedwoofi</image:caption><image:title>HackExplainedwoofi</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/1e05b8e0-8946-47fd-a71a-675fed03ee8b.png</image:loc><image:caption>1e05b8e0894647fda71a675fed03ee8b</image:caption><image:title>1e05b8e0894647fda71a675fed03ee8b</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/0f826aa5-4718-4aaf-88af-c464ab7a700b.png</image:loc><image:caption>0f826aa547184aaf88afc464ab7a700b</image:caption><image:title>0f826aa547184aaf88afc464ab7a700b</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/blog/sarcoma-ransomware-group-from-zero-day-exploits-to-double-extortion</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20Sarcoma%20Ransomware%20Group.png</image:loc><image:caption>BlogDarkWebSarcomaRansomwareGroup</image:caption><image:title>BlogDarkWebSarcomaRansomwareGroup</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Telstra%20Hack%20Fake%20News.png</image:loc><image:caption>TelstraHackFakeNews</image:caption><image:title>TelstraHackFakeNews</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20radar.png</image:loc><image:caption>BlogDarkWebradar</image:caption><image:title>BlogDarkWebradar</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20advisory%20-%20%20ISO%2027001.png</image:loc><image:caption>BlogadvisoryISO27001</image:caption><image:title>BlogadvisoryISO27001</image:title></image:image><lastmod>2025-04-08</lastmod></url><url><loc>https://rivanorth.com/blog/hack-explained-bedrock</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/55a169f9-3649-4e4d-a004-e6e6c7bf94b2.png</image:loc><image:caption>55a169f936494e4da004e6e6c7bf94b2</image:caption><image:title>55a169f936494e4da004e6e6c7bf94b2</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/68adc6d9-a2d8-4d72-9eae-2700faae5456.png</image:loc><image:caption>68adc6d9a2d84d729eae2700faae5456</image:caption><image:title>68adc6d9a2d84d729eae2700faae5456</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Hack%20Explained%20-%20UwuLend%20.png</image:loc><image:caption>HackExplainedUwuLend</image:caption><image:title>HackExplainedUwuLend</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/ff228455-0db5-47fe-ae65-763f88132209.png</image:loc><image:caption>ff2284550db547feae65763f88132209</image:caption><image:title>ff2284550db547feae65763f88132209</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/guides/what-to-do-if-business-data-is-on-the-dark-web</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><lastmod>2026-02-27</lastmod></url><url><loc>https://rivanorth.com/blog/top-3-multi-chain-security-issues</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/e8878983-7f44-46d9-8461-743a8f555245.png</image:loc><image:caption>e88789837f4446d98461743a8f555245</image:caption><image:title>e88789837f4446d98461743a8f555245</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20radar.png</image:loc><image:caption>BlogDarkWebradar</image:caption><image:title>BlogDarkWebradar</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/ff228455-0db5-47fe-ae65-763f88132209.png</image:loc><image:caption>ff2284550db547feae65763f88132209</image:caption><image:title>ff2284550db547feae65763f88132209</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/blog/sql-injection-django-orm</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20advisory%20-%20%20ISO%2027001.png</image:loc><image:caption>BlogadvisoryISO27001</image:caption><image:title>BlogadvisoryISO27001</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20radar.png</image:loc><image:caption>BlogDarkWebradar</image:caption><image:title>BlogDarkWebradar</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Telstra%20Hack%20Fake%20News.png</image:loc><image:caption>TelstraHackFakeNews</image:caption><image:title>TelstraHackFakeNews</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20advisory%20-%20%20django.png</image:loc><image:caption>Blogadvisorydjango</image:caption><image:title>Blogadvisorydjango</image:title></image:image><lastmod>2025-07-05</lastmod></url><url><loc>https://rivanorth.com/blog/security-roundup-december-2024-edition</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/07405779-c398-4c8a-bd7a-ae5f6690def6.png</image:loc><image:caption>07405779c3984c8abd7aae5f6690def6</image:caption><image:title>07405779c3984c8abd7aae5f6690def6</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/8bb0af35-8f81-44ca-b1be-a0efd3588e1b.png</image:loc><image:caption>8bb0af358f8144cab1bea0efd3588e1b</image:caption><image:title>8bb0af358f8144cab1bea0efd3588e1b</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/3d917eb8-544e-4417-ac45-290325730e36.png</image:loc><image:caption>3d917eb8544e4417ac45290325730e36</image:caption><image:title>3d917eb8544e4417ac45290325730e36</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/3ba0f4b3-2776-4a92-9b5c-014f4ea6e371.png</image:loc><image:caption>3ba0f4b327764a929b5c014f4ea6e371</image:caption><image:title>3ba0f4b327764a929b5c014f4ea6e371</image:title></image:image><lastmod>2025-01-09</lastmod></url><url><loc>https://rivanorth.com/blog/what-are-data-breaches</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20Dark%20Web%20Lifecycle.png</image:loc><image:caption>BlogDarkWebDarkWebLifecycle</image:caption><image:title>BlogDarkWebDarkWebLifecycle</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20How%20to%20Identify%20if%20Your%20Business%20Data%20Is%20on%20the%20Dark%20Web.png</image:loc><image:caption>BlogDarkWebHowtoIdentifyifYourBusinessDataIsontheDarkWeb</image:caption><image:title>BlogDarkWebHowtoIdentifyifYourBusinessDataIsontheDarkWeb</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20What%20Are%20Data%20Breaches.png</image:loc><image:caption>BlogDarkWebWhatAreDataBreaches</image:caption><image:title>BlogDarkWebWhatAreDataBreaches</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20What%20is%20dark%20web%20monitoring.png</image:loc><image:caption>BlogDarkWebWhatisdarkwebmonitoring</image:caption><image:title>BlogDarkWebWhatisdarkwebmonitoring</image:title></image:image><lastmod>2025-03-11</lastmod></url><url><loc>https://rivanorth.com/blog/hack-explained-knowbe4</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Hack%20Explained%20-%20KnowBe4%20.png</image:loc><image:caption>HackExplainedKnowBe4</image:caption><image:title>HackExplainedKnowBe4</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/706b4393-67d1-4028-b8f6-f1037d417464.png</image:loc><image:caption>706b439367d14028b8f6f1037d417464</image:caption><image:title>706b439367d14028b8f6f1037d417464</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20advisory%20-%20%20Vulnerability%20Report%20-%202025%20-%20February.png</image:loc><image:caption>BlogadvisoryVulnerabilityReport2025February</image:caption><image:title>BlogadvisoryVulnerabilityReport2025February</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/38c12729-1be4-46ad-a60b-cd67bf6ef569.png</image:loc><image:caption>38c127291be446ada60bcd67bf6ef569</image:caption><image:title>38c127291be446ada60bcd67bf6ef569</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/blog/what-are-ransomware-attacks-how-to-protect-your-business</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20advisory%20-%20%20ISO%2027001.png</image:loc><image:caption>BlogadvisoryISO27001</image:caption><image:title>BlogadvisoryISO27001</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20advisory%20-%20%20what%20is%20ransomware.png</image:loc><image:caption>Blogadvisorywhatisransomware</image:caption><image:title>Blogadvisorywhatisransomware</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Telstra%20Hack%20Fake%20News.png</image:loc><image:caption>TelstraHackFakeNews</image:caption><image:title>TelstraHackFakeNews</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20radar.png</image:loc><image:caption>BlogDarkWebradar</image:caption><image:title>BlogDarkWebradar</image:title></image:image><lastmod>2025-05-18</lastmod></url><url><loc>https://rivanorth.com/blog/vulnerability-report-october-2024</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/9f344078-b6d0-440b-8e2b-e10a97e4c01e.png</image:loc><image:caption>9f344078b6d0440b8e2be10a97e4c01e</image:caption><image:title>9f344078b6d0440b8e2be10a97e4c01e</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20advisory%20-%20%20Vulnerability%20Report%20-%202025%20-%20may.png</image:loc><image:caption>BlogadvisoryVulnerabilityReport2025may</image:caption><image:title>BlogadvisoryVulnerabilityReport2025may</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/1e05b8e0-8946-47fd-a71a-675fed03ee8b.png</image:loc><image:caption>1e05b8e0894647fda71a675fed03ee8b</image:caption><image:title>1e05b8e0894647fda71a675fed03ee8b</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/60dae0cc-4c5e-42b9-b6fd-4386ca465f1d.png</image:loc><image:caption>60dae0cc4c5e42b9b6fd4386ca465f1d</image:caption><image:title>60dae0cc4c5e42b9b6fd4386ca465f1d</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><lastmod>2025-01-08</lastmod></url><url><loc>https://rivanorth.com/blog/vulnerability-report-february-2025</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Telstra%20Hack%20Fake%20News.png</image:loc><image:caption>TelstraHackFakeNews</image:caption><image:title>TelstraHackFakeNews</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20advisory%20-%20%20ISO%2027001.png</image:loc><image:caption>BlogadvisoryISO27001</image:caption><image:title>BlogadvisoryISO27001</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20advisory%20-%20%20Vulnerability%20Report%20-%202025%20-%20February.png</image:loc><image:caption>BlogadvisoryVulnerabilityReport2025February</image:caption><image:title>BlogadvisoryVulnerabilityReport2025February</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20radar.png</image:loc><image:caption>BlogDarkWebradar</image:caption><image:title>BlogDarkWebradar</image:title></image:image><lastmod>2025-03-03</lastmod></url><url><loc>https://rivanorth.com/blog/hack-explained-grand-base</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Hack%20Explained%20-%20Gamma.png</image:loc><image:caption>HackExplainedGamma</image:caption><image:title>HackExplainedGamma</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/b761da6d-831b-4d54-8dd9-9536fdb6ab65.png</image:loc><image:caption>b761da6d831b4d548dd99536fdb6ab65</image:caption><image:title>b761da6d831b4d548dd99536fdb6ab65</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/072a4689-849b-44d0-aaab-7d30d2f84c9e.png</image:loc><image:caption>072a4689849b44d0aaab7d30d2f84c9e</image:caption><image:title>072a4689849b44d0aaab7d30d2f84c9e</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/f0c7cfd0-03ee-48eb-bd59-7742ab034dfa.png</image:loc><image:caption>f0c7cfd003ee48ebbd597742ab034dfa</image:caption><image:title>f0c7cfd003ee48ebbd597742ab034dfa</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/blog/hack-explained-abracadabra</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/785a55d1-bfab-463c-a591-8712949db8c3.png</image:loc><image:caption>785a55d1bfab463ca5918712949db8c3</image:caption><image:title>785a55d1bfab463ca5918712949db8c3</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/fd10479c-a80e-41d8-8278-c2edb127b650.png</image:loc><image:caption>fd10479ca80e41d88278c2edb127b650</image:caption><image:title>fd10479ca80e41d88278c2edb127b650</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/819c9e21-2b4b-40a9-bf92-383be4f9048e.png</image:loc><image:caption>819c9e212b4b40a9bf92383be4f9048e</image:caption><image:title>819c9e212b4b40a9bf92383be4f9048e</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/b1bbed96-0bb1-4e2c-8e89-b207d2b77768.png</image:loc><image:caption>b1bbed960bb14e2c8e89b207d2b77768</image:caption><image:title>b1bbed960bb14e2c8e89b207d2b77768</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/blog/white-box-penetration-test-uptick-case-study</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/4a4d24ef-fe15-4842-abd0-d4d177288c00.png</image:loc><image:caption>4a4d24effe154842abd0d4d177288c00</image:caption><image:title>4a4d24effe154842abd0d4d177288c00</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/77e5c554-473f-489a-aa32-d0d900956b5e.png</image:loc><image:caption>77e5c554473f489aaa32d0d900956b5e</image:caption><image:title>77e5c554473f489aaa32d0d900956b5e</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/3ba0f4b3-2776-4a92-9b5c-014f4ea6e371.png</image:loc><image:caption>3ba0f4b327764a929b5c014f4ea6e371</image:caption><image:title>3ba0f4b327764a929b5c014f4ea6e371</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Research%20-%20proxies.png</image:loc><image:caption>Researchproxies</image:caption><image:title>Researchproxies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><lastmod>2025-03-04</lastmod></url><url><loc>https://rivanorth.com/blog/understanding-the-lifecycle-of-stolen-data-on-the-dark-web</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20advisory%20-%20%20ISO%2027001.png</image:loc><image:caption>BlogadvisoryISO27001</image:caption><image:title>BlogadvisoryISO27001</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20Dark%20Web%20Lifecycle.png</image:loc><image:caption>BlogDarkWebDarkWebLifecycle</image:caption><image:title>BlogDarkWebDarkWebLifecycle</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Telstra%20Hack%20Fake%20News.png</image:loc><image:caption>TelstraHackFakeNews</image:caption><image:title>TelstraHackFakeNews</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20radar.png</image:loc><image:caption>BlogDarkWebradar</image:caption><image:title>BlogDarkWebradar</image:title></image:image><lastmod>2025-04-14</lastmod></url><url><loc>https://rivanorth.com/blog/hack-explained-wazirx</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/04a68fe4-8c8d-4b2c-ae8f-8daa2b9ea368.png</image:loc><image:caption>04a68fe48c8d4b2cae8f8daa2b9ea368</image:caption><image:title>04a68fe48c8d4b2cae8f8daa2b9ea368</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/d18437f8-f3f2-4858-b345-eebf55362827.png</image:loc><image:caption>d18437f8f3f24858b345eebf55362827</image:caption><image:title>d18437f8f3f24858b345eebf55362827</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/cb9cfecf-e261-4d29-b857-bd889c3fa3d6.png</image:loc><image:caption>cb9cfecfe2614d29b857bd889c3fa3d6</image:caption><image:title>cb9cfecfe2614d29b857bd889c3fa3d6</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/blog/how-to-protect-your-business-from-data-breaches-in-2025</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20Dark%20Web%20Lifecycle.png</image:loc><image:caption>BlogDarkWebDarkWebLifecycle</image:caption><image:title>BlogDarkWebDarkWebLifecycle</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20data%20breach%20protection.png</image:loc><image:caption>BlogDarkWebdatabreachprotection</image:caption><image:title>BlogDarkWebdatabreachprotection</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20Top%205%20Reasons%20Businesses%20Need%20to%20Monitor%20the%20Dark%20Web.png</image:loc><image:caption>BlogDarkWebTop5ReasonsBusinessesNeedtoMonitortheDarkWeb</image:caption><image:title>BlogDarkWebTop5ReasonsBusinessesNeedtoMonitortheDarkWeb</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20What%20is%20dark%20web%20monitoring.png</image:loc><image:caption>BlogDarkWebWhatisdarkwebmonitoring</image:caption><image:title>BlogDarkWebWhatisdarkwebmonitoring</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><lastmod>2025-04-20</lastmod></url><url><loc>https://rivanorth.com/blog/oz-contracts-5</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Web3%20-%20ByBit.png</image:loc><image:caption>BlogWeb3ByBit</image:caption><image:title>BlogWeb3ByBit</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/191a690a-838b-4867-926d-4177691cea0e.png</image:loc><image:caption>191a690a838b4867926d4177691cea0e</image:caption><image:title>191a690a838b4867926d4177691cea0e</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/b78052bd-be9d-40c8-b776-3f70bbffffc8.png</image:loc><image:caption>b78052bdbe9d40c8b7763f70bbffffc8</image:caption><image:title>b78052bdbe9d40c8b7763f70bbffffc8</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/d84f1025-380a-461d-b7e6-515bd738d591.png</image:loc><image:caption>d84f1025380a461db7e6515bd738d591</image:caption><image:title>d84f1025380a461db7e6515bd738d591</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/blog/the-role-of-threat-intelligence-in-preventing-cyber-attacks</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20the%20role%20of%20threat%20intelligence%20in%20preventing%20cyber%20attacks.png</image:loc><image:caption>BlogDarkWebtheroleofthreatintelligenceinpreventingcyberattacks</image:caption><image:title>BlogDarkWebtheroleofthreatintelligenceinpreventingcyberattacks</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20Dark%20Web%20Lifecycle.png</image:loc><image:caption>BlogDarkWebDarkWebLifecycle</image:caption><image:title>BlogDarkWebDarkWebLifecycle</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20How%20to%20Identify%20if%20Your%20Business%20Data%20Is%20on%20the%20Dark%20Web.png</image:loc><image:caption>BlogDarkWebHowtoIdentifyifYourBusinessDataIsontheDarkWeb</image:caption><image:title>BlogDarkWebHowtoIdentifyifYourBusinessDataIsontheDarkWeb</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20What%20Are%20Data%20Breaches.png</image:loc><image:caption>BlogDarkWebWhatAreDataBreaches</image:caption><image:title>BlogDarkWebWhatAreDataBreaches</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><lastmod>2025-02-04</lastmod></url><url><loc>https://rivanorth.com/blog/what-is-safepay-ransomware</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20radar.png</image:loc><image:caption>BlogDarkWebradar</image:caption><image:title>BlogDarkWebradar</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Telstra%20Hack%20Fake%20News.png</image:loc><image:caption>TelstraHackFakeNews</image:caption><image:title>TelstraHackFakeNews</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20advisory%20-%20%20safepay.png</image:loc><image:caption>Blogadvisorysafepay</image:caption><image:title>Blogadvisorysafepay</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20advisory%20-%20%20ISO%2027001.png</image:loc><image:caption>BlogadvisoryISO27001</image:caption><image:title>BlogadvisoryISO27001</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><lastmod>2025-04-28</lastmod></url><url><loc>https://rivanorth.com/blog/how-to-safely-implement-nfts</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Research%20-%20ERC721.png</image:loc><image:caption>ResearchERC721</image:caption><image:title>ResearchERC721</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Research%20-%20ERC4626.png</image:loc><image:caption>ResearchERC4626</image:caption><image:title>ResearchERC4626</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/07405779-c398-4c8a-bd7a-ae5f6690def6.png</image:loc><image:caption>07405779c3984c8abd7aae5f6690def6</image:caption><image:title>07405779c3984c8abd7aae5f6690def6</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/careers</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><lastmod>2025-06-21</lastmod></url><url><loc>https://rivanorth.com/blog/hack-explained-bybit</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Web3%20-%20ByBit.png</image:loc><image:caption>BlogWeb3ByBit</image:caption><image:title>BlogWeb3ByBit</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Telstra%20Hack%20Fake%20News.png</image:loc><image:caption>TelstraHackFakeNews</image:caption><image:title>TelstraHackFakeNews</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20radar.png</image:loc><image:caption>BlogDarkWebradar</image:caption><image:title>BlogDarkWebradar</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20advisory%20-%20%20ISO%2027001.png</image:loc><image:caption>BlogadvisoryISO27001</image:caption><image:title>BlogadvisoryISO27001</image:title></image:image><lastmod>2025-03-24</lastmod></url><url><loc>https://rivanorth.com/blog/vulnerability-report-january-2025</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20advisory%20-%20%20Vulnerability%20Report%20-%202025%20-%20January.png</image:loc><image:caption>BlogadvisoryVulnerabilityReport2025January</image:caption><image:title>BlogadvisoryVulnerabilityReport2025January</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20advisory%20-%20%20password%20security%202025%20(1).png</image:loc><image:caption>Blogadvisorypasswordsecurity20251</image:caption><image:title>Blogadvisorypasswordsecurity20251</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20advisory%20-%20%20credential%20stuffing.png</image:loc><image:caption>Blogadvisorycredentialstuffing</image:caption><image:title>Blogadvisorycredentialstuffing</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20advisory%20-%20%20Vulnerability%20Report%20-%202025%20-%20February.png</image:loc><image:caption>BlogadvisoryVulnerabilityReport2025February</image:caption><image:title>BlogadvisoryVulnerabilityReport2025February</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><lastmod>2025-02-05</lastmod></url><url><loc>https://rivanorth.com/blog/what-is-credential-stuffing</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Telstra%20Hack%20Fake%20News.png</image:loc><image:caption>TelstraHackFakeNews</image:caption><image:title>TelstraHackFakeNews</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20advisory%20-%20%20credential%20stuffing.png</image:loc><image:caption>Blogadvisorycredentialstuffing</image:caption><image:title>Blogadvisorycredentialstuffing</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20advisory%20-%20%20ISO%2027001.png</image:loc><image:caption>BlogadvisoryISO27001</image:caption><image:title>BlogadvisoryISO27001</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20radar.png</image:loc><image:caption>BlogDarkWebradar</image:caption><image:title>BlogDarkWebradar</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><lastmod>2025-05-26</lastmod></url><url><loc>https://rivanorth.com/blog/what-are-malware-kits</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Telstra%20Hack%20Fake%20News.png</image:loc><image:caption>TelstraHackFakeNews</image:caption><image:title>TelstraHackFakeNews</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20advisory%20-%20%20ISO%2027001.png</image:loc><image:caption>BlogadvisoryISO27001</image:caption><image:title>BlogadvisoryISO27001</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20Malware%20Kits.png</image:loc><image:caption>BlogDarkWebMalwareKits</image:caption><image:title>BlogDarkWebMalwareKits</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20radar.png</image:loc><image:caption>BlogDarkWebradar</image:caption><image:title>BlogDarkWebradar</image:title></image:image><lastmod>2025-08-18</lastmod></url><url><loc>https://rivanorth.com/blog/jandamuda</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Telstra%20Hack%20Fake%20News.png</image:loc><image:caption>TelstraHackFakeNews</image:caption><image:title>TelstraHackFakeNews</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20radar.png</image:loc><image:caption>BlogDarkWebradar</image:caption><image:title>BlogDarkWebradar</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20Jandamuda.png</image:loc><image:caption>BlogDarkWebJandamuda</image:caption><image:title>BlogDarkWebJandamuda</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/jandamuda%201-webp.webp</image:loc><image:caption>jandamuda1webp</image:caption><image:title>jandamuda1webp</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20advisory%20-%20%20ISO%2027001.png</image:loc><image:caption>BlogadvisoryISO27001</image:caption><image:title>BlogadvisoryISO27001</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/jandamuda%202-webp.webp</image:loc><image:caption>jandamuda2webp</image:caption><image:title>jandamuda2webp</image:title></image:image><lastmod>2025-05-23</lastmod></url><url><loc>https://rivanorth.com/blog/ftp-access-for-sale-on-dark-web</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20FTP.png</image:loc><image:caption>BlogDarkWebFTP</image:caption><image:title>BlogDarkWebFTP</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20aquatic%20panda.png</image:loc><image:caption>BlogDarkWebaquaticpanda</image:caption><image:title>BlogDarkWebaquaticpanda</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20advisory%20-%20%20password%20security%202025%20(1).png</image:loc><image:caption>Blogadvisorypasswordsecurity20251</image:caption><image:title>Blogadvisorypasswordsecurity20251</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20How%20to%20Identify%20if%20Your%20Business%20Data%20Is%20on%20the%20Dark%20Web.png</image:loc><image:caption>BlogDarkWebHowtoIdentifyifYourBusinessDataIsontheDarkWeb</image:caption><image:title>BlogDarkWebHowtoIdentifyifYourBusinessDataIsontheDarkWeb</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/ftp%20access%20large.png</image:loc><image:caption>ftpaccesslarge</image:caption><image:title>ftpaccesslarge</image:title></image:image><lastmod>2025-11-26</lastmod></url><url><loc>https://rivanorth.com/blog/vulnerability-report-december-2024</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/07405779-c398-4c8a-bd7a-ae5f6690def6.png</image:loc><image:caption>07405779c3984c8abd7aae5f6690def6</image:caption><image:title>07405779c3984c8abd7aae5f6690def6</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Research%20-%20x%20hardening.png</image:loc><image:caption>Researchxhardening</image:caption><image:title>Researchxhardening</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/0a01f2a1-e884-4931-9c6b-59b60e4aff7f.png</image:loc><image:caption>0a01f2a1e88449319c6b59b60e4aff7f</image:caption><image:title>0a01f2a1e88449319c6b59b60e4aff7f</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/8bb0af35-8f81-44ca-b1be-a0efd3588e1b.png</image:loc><image:caption>8bb0af358f8144cab1bea0efd3588e1b</image:caption><image:title>8bb0af358f8144cab1bea0efd3588e1b</image:title></image:image><lastmod>2025-01-09</lastmod></url><url><loc>https://rivanorth.com/blog/blockchain-security-roundup-november-2023</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/4a4d24ef-fe15-4842-abd0-d4d177288c00.png</image:loc><image:caption>4a4d24effe154842abd0d4d177288c00</image:caption><image:title>4a4d24effe154842abd0d4d177288c00</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Roundup%20-%20November%20.png</image:loc><image:caption>RoundupNovember</image:caption><image:title>RoundupNovember</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/3ba0f4b3-2776-4a92-9b5c-014f4ea6e371.png</image:loc><image:caption>3ba0f4b327764a929b5c014f4ea6e371</image:caption><image:title>3ba0f4b327764a929b5c014f4ea6e371</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/6be63e7b-1061-47e8-b5e2-b10a874c02ae.png</image:loc><image:caption>6be63e7b106147e8b5e2b10a874c02ae</image:caption><image:title>6be63e7b106147e8b5e2b10a874c02ae</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/a6ec4515-2bce-47fd-8746-2a28ee3ac01b.png</image:loc><image:caption>a6ec45152bce47fd87462a28ee3ac01b</image:caption><image:title>a6ec45152bce47fd87462a28ee3ac01b</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/blog/hack-explained-bingx</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Roundup%20-%20July%20%20(2).png</image:loc><image:caption>RoundupJuly2</image:caption><image:title>RoundupJuly2</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/8977ac2e-171b-4d3a-9132-eb472b4dbbeb.jpeg</image:loc><image:caption>8977ac2e171b4d3a9132eb472b4dbbeb</image:caption><image:title>8977ac2e171b4d3a9132eb472b4dbbeb</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Year%20in%20review.png</image:loc><image:caption>Yearinreview</image:caption><image:title>Yearinreview</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/cb9cfecf-e261-4d29-b857-bd889c3fa3d6.png</image:loc><image:caption>cb9cfecfe2614d29b857bd889c3fa3d6</image:caption><image:title>cb9cfecfe2614d29b857bd889c3fa3d6</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/guides/how-to-check-if-your-data-is-on-the-dark-web</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><lastmod>2026-02-27</lastmod></url><url><loc>https://rivanorth.com/blog/hack-explained-dmm-bitcoin</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/afaa405b-2370-4cbd-a3a9-f450eab93332.png</image:loc><image:caption>afaa405b23704cbda3a9f450eab93332</image:caption><image:title>afaa405b23704cbda3a9f450eab93332</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/0f826aa5-4718-4aaf-88af-c464ab7a700b.png</image:loc><image:caption>0f826aa547184aaf88afc464ab7a700b</image:caption><image:title>0f826aa547184aaf88afc464ab7a700b</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/e9668847-66f6-4519-80f9-c268779b2e9f.png</image:loc><image:caption>e966884766f6451980f9c268779b2e9f</image:caption><image:title>e966884766f6451980f9c268779b2e9f</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/b37e4bc9-173c-407e-90a9-4bb30b300bef.png</image:loc><image:caption>b37e4bc9173c407e90a94bb30b300bef</image:caption><image:title>b37e4bc9173c407e90a94bb30b300bef</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/blog/unibot-hack</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/8a5fb5b9-31bd-40d9-bde6-c2a3ad293329.png</image:loc><image:caption>8a5fb5b931bd40d9bde6c2a3ad293329</image:caption><image:title>8a5fb5b931bd40d9bde6c2a3ad293329</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Hack%20Explained%20-%20%20woofi.png</image:loc><image:caption>HackExplainedwoofi</image:caption><image:title>HackExplainedwoofi</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/a71e99f6-f285-49f3-b34b-ce46d7f0f487.png</image:loc><image:caption>a71e99f6f28549f3b34bce46d7f0f487</image:caption><image:title>a71e99f6f28549f3b34bce46d7f0f487</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/d5001720-b073-41f1-876e-9827f88e32bb.png</image:loc><image:caption>d5001720b07341f1876e9827f88e32bb</image:caption><image:title>d5001720b07341f1876e9827f88e32bb</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/blog/telstra-breach-october-2025</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/image-png-1.png</image:loc><image:caption>imagepng1</image:caption><image:title>imagepng1</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20advisory%20-%20%20ISO%2027001.png</image:loc><image:caption>BlogadvisoryISO27001</image:caption><image:title>BlogadvisoryISO27001</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/image-png.png</image:loc><image:caption>imagepng</image:caption><image:title>imagepng</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Telstra%20Hack%20Fake%20News.png</image:loc><image:caption>TelstraHackFakeNews</image:caption><image:title>TelstraHackFakeNews</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20radar.png</image:loc><image:caption>BlogDarkWebradar</image:caption><image:title>BlogDarkWebradar</image:title></image:image><lastmod>2025-10-30</lastmod></url><url><loc>https://rivanorth.com/blog/vanhelsing-ransomware</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20VanHelsing.png</image:loc><image:caption>BlogDarkWebVanHelsing</image:caption><image:title>BlogDarkWebVanHelsing</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20advisory%20-%20%20ISO%2027001.png</image:loc><image:caption>BlogadvisoryISO27001</image:caption><image:title>BlogadvisoryISO27001</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Telstra%20Hack%20Fake%20News.png</image:loc><image:caption>TelstraHackFakeNews</image:caption><image:title>TelstraHackFakeNews</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20radar.png</image:loc><image:caption>BlogDarkWebradar</image:caption><image:title>BlogDarkWebradar</image:title></image:image><lastmod>2025-08-04</lastmod></url><url><loc>https://rivanorth.com/blog/hack-explained-gala-games</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20tor%20browser.png</image:loc><image:caption>BlogDarkWebtorbrowser</image:caption><image:title>BlogDarkWebtorbrowser</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20advisory%20-%20%20ISO%2027001.png</image:loc><image:caption>BlogadvisoryISO27001</image:caption><image:title>BlogadvisoryISO27001</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/6010198a-727d-428e-9d89-72e5b4b0b56e.png</image:loc><image:caption>6010198a727d428e9d8972e5b4b0b56e</image:caption><image:title>6010198a727d428e9d8972e5b4b0b56e</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Hack%20Explained%20-%20Gamma.png</image:loc><image:caption>HackExplainedGamma</image:caption><image:title>HackExplainedGamma</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/oko-terms-and-conditions</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><lastmod>2025-11-28</lastmod></url><url><loc>https://rivanorth.com/blog/hack-explained-astroport</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/8a5fb5b9-31bd-40d9-bde6-c2a3ad293329.png</image:loc><image:caption>8a5fb5b931bd40d9bde6c2a3ad293329</image:caption><image:title>8a5fb5b931bd40d9bde6c2a3ad293329</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/d18437f8-f3f2-4858-b345-eebf55362827.png</image:loc><image:caption>d18437f8f3f24858b345eebf55362827</image:caption><image:title>d18437f8f3f24858b345eebf55362827</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/04a68fe4-8c8d-4b2c-ae8f-8daa2b9ea368.png</image:loc><image:caption>04a68fe48c8d4b2cae8f8daa2b9ea368</image:caption><image:title>04a68fe48c8d4b2cae8f8daa2b9ea368</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Hack%20Explained%20-%20KyberSwap.png</image:loc><image:caption>HackExplainedKyberSwap</image:caption><image:title>HackExplainedKyberSwap</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/blog/global-ransomware-group</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20Global%20Ransomware%20Group.png</image:loc><image:caption>BlogDarkWebGlobalRansomwareGroup</image:caption><image:title>BlogDarkWebGlobalRansomwareGroup</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20FTP.png</image:loc><image:caption>BlogDarkWebFTP</image:caption><image:title>BlogDarkWebFTP</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20advisory%20-%20%20ISO%2027001.png</image:loc><image:caption>BlogadvisoryISO27001</image:caption><image:title>BlogadvisoryISO27001</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><lastmod>2025-12-19</lastmod></url><url><loc>https://rivanorth.com/blog/hack-explained-eigenlayer</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/d5001720-b073-41f1-876e-9827f88e32bb.png</image:loc><image:caption>d5001720b07341f1876e9827f88e32bb</image:caption><image:title>d5001720b07341f1876e9827f88e32bb</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/0f826aa5-4718-4aaf-88af-c464ab7a700b.png</image:loc><image:caption>0f826aa547184aaf88afc464ab7a700b</image:caption><image:title>0f826aa547184aaf88afc464ab7a700b</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Hack%20Explained%20-%20%20woofi.png</image:loc><image:caption>HackExplainedwoofi</image:caption><image:title>HackExplainedwoofi</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/a71e99f6-f285-49f3-b34b-ce46d7f0f487.png</image:loc><image:caption>a71e99f6f28549f3b34bce46d7f0f487</image:caption><image:title>a71e99f6f28549f3b34bce46d7f0f487</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/blog/security-roundup-november-2024-edition</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/3d917eb8-544e-4417-ac45-290325730e36.png</image:loc><image:caption>3d917eb8544e4417ac45290325730e36</image:caption><image:title>3d917eb8544e4417ac45290325730e36</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/3ba0f4b3-2776-4a92-9b5c-014f4ea6e371.png</image:loc><image:caption>3ba0f4b327764a929b5c014f4ea6e371</image:caption><image:title>3ba0f4b327764a929b5c014f4ea6e371</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/8bb0af35-8f81-44ca-b1be-a0efd3588e1b.png</image:loc><image:caption>8bb0af358f8144cab1bea0efd3588e1b</image:caption><image:title>8bb0af358f8144cab1bea0efd3588e1b</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/07405779-c398-4c8a-bd7a-ae5f6690def6.png</image:loc><image:caption>07405779c3984c8abd7aae5f6690def6</image:caption><image:title>07405779c3984c8abd7aae5f6690def6</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/privacy-policy</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><lastmod>2025-01-06</lastmod></url><url><loc>https://rivanorth.com/blog/poloniex-exchange-hack</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Web3%20-%20ByBit.png</image:loc><image:caption>BlogWeb3ByBit</image:caption><image:title>BlogWeb3ByBit</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/afaa405b-2370-4cbd-a3a9-f450eab93332.png</image:loc><image:caption>afaa405b23704cbda3a9f450eab93332</image:caption><image:title>afaa405b23704cbda3a9f450eab93332</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/b37e4bc9-173c-407e-90a9-4bb30b300bef.png</image:loc><image:caption>b37e4bc9173c407e90a94bb30b300bef</image:caption><image:title>b37e4bc9173c407e90a94bb30b300bef</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/98748221-3866-479f-96aa-35059f57cc32.png</image:loc><image:caption>987482213866479f96aa35059f57cc32</image:caption><image:title>987482213866479f96aa35059f57cc32</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/blog/case-study-betts</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Telstra%20Hack%20Fake%20News.png</image:loc><image:caption>TelstraHackFakeNews</image:caption><image:title>TelstraHackFakeNews</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20radar.png</image:loc><image:caption>BlogDarkWebradar</image:caption><image:title>BlogDarkWebradar</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20advisory%20-%20%20ISO%2027001.png</image:loc><image:caption>BlogadvisoryISO27001</image:caption><image:title>BlogadvisoryISO27001</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20case%20study%20-%20betts.png</image:loc><image:caption>Blogcasestudybetts</image:caption><image:title>Blogcasestudybetts</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><lastmod>2025-03-17</lastmod></url><url><loc>https://rivanorth.com/about</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Rivanorth%20Website/Alex.png</image:loc><image:caption>Alex</image:caption><image:title>Alex</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><lastmod>2025-10-14</lastmod></url><url><loc>https://rivanorth.com/blog/how-to-identify-if-your-business-data-is-on-the-dark-web</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20How%20to%20Identify%20if%20Your%20Business%20Data%20Is%20on%20the%20Dark%20Web.png</image:loc><image:caption>BlogDarkWebHowtoIdentifyifYourBusinessDataIsontheDarkWeb</image:caption><image:title>BlogDarkWebHowtoIdentifyifYourBusinessDataIsontheDarkWeb</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Telstra%20Hack%20Fake%20News.png</image:loc><image:caption>TelstraHackFakeNews</image:caption><image:title>TelstraHackFakeNews</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20advisory%20-%20%20ISO%2027001.png</image:loc><image:caption>BlogadvisoryISO27001</image:caption><image:title>BlogadvisoryISO27001</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20radar.png</image:loc><image:caption>BlogDarkWebradar</image:caption><image:title>BlogDarkWebradar</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><lastmod>2025-06-30</lastmod></url><url><loc>https://rivanorth.com/blog/hack-explained-socket</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/a71e99f6-f285-49f3-b34b-ce46d7f0f487.png</image:loc><image:caption>a71e99f6f28549f3b34bce46d7f0f487</image:caption><image:title>a71e99f6f28549f3b34bce46d7f0f487</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/5e87e3a9-345e-493d-a7b1-c333bc347e65.png</image:loc><image:caption>5e87e3a9345e493da7b1c333bc347e65</image:caption><image:title>5e87e3a9345e493da7b1c333bc347e65</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Hack%20Explained%20-%20Gamma.png</image:loc><image:caption>HackExplainedGamma</image:caption><image:title>HackExplainedGamma</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/e9668847-66f6-4519-80f9-c268779b2e9f.png</image:loc><image:caption>e966884766f6451980f9c268779b2e9f</image:caption><image:title>e966884766f6451980f9c268779b2e9f</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/guides/why-monitor-the-dark-web</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Rivanorth%20Website/Insider.png</image:loc><image:caption>Insider</image:caption><image:title>Insider</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Rivanorth%20Website/Malware.png</image:loc><image:caption>Malware</image:caption><image:title>Malware</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Rivanorth%20Website/Phishing.png</image:loc><image:caption>Phishing</image:caption><image:title>Phishing</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Rivanorth%20Website/Account%20takeover.png</image:loc><image:caption>Accounttakeover</image:caption><image:title>Accounttakeover</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><lastmod>2026-02-27</lastmod></url><url><loc>https://rivanorth.com/blog/hack-explained-loopring</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/4372c4f8-84e8-47e1-99e9-9eea4fd688bb.png</image:loc><image:caption>4372c4f884e847e199e99eea4fd688bb</image:caption><image:title>4372c4f884e847e199e99eea4fd688bb</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/3d917eb8-544e-4417-ac45-290325730e36.png</image:loc><image:caption>3d917eb8544e4417ac45290325730e36</image:caption><image:title>3d917eb8544e4417ac45290325730e36</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/07405779-c398-4c8a-bd7a-ae5f6690def6.png</image:loc><image:caption>07405779c3984c8abd7aae5f6690def6</image:caption><image:title>07405779c3984c8abd7aae5f6690def6</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/df8aee59-0c0e-4b46-b35c-1a18472f5f73.png</image:loc><image:caption>df8aee590c0e4b46b35c1a18472f5f73</image:caption><image:title>df8aee590c0e4b46b35c1a18472f5f73</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/blog/stars-arena-hack</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/46f1026c-d16a-49b3-9211-6e447311b223.png</image:loc><image:caption>46f1026cd16a49b392116e447311b223</image:caption><image:title>46f1026cd16a49b392116e447311b223</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/aaf2af2f-8768-479a-b4d6-e38ba59da1cd.png</image:loc><image:caption>aaf2af2f8768479ab4d6e38ba59da1cd</image:caption><image:title>aaf2af2f8768479ab4d6e38ba59da1cd</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/a71e99f6-f285-49f3-b34b-ce46d7f0f487.png</image:loc><image:caption>a71e99f6f28549f3b34bce46d7f0f487</image:caption><image:title>a71e99f6f28549f3b34bce46d7f0f487</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Research%20-%20proxies.png</image:loc><image:caption>Researchproxies</image:caption><image:title>Researchproxies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/blog/crowdstrike-causes-historic-it-outage</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/b37e4bc9-173c-407e-90a9-4bb30b300bef.png</image:loc><image:caption>b37e4bc9173c407e90a94bb30b300bef</image:caption><image:title>b37e4bc9173c407e90a94bb30b300bef</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20advisory%20-%20%20credential%20stuffing.png</image:loc><image:caption>Blogadvisorycredentialstuffing</image:caption><image:title>Blogadvisorycredentialstuffing</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/9c64b820-8fb7-405b-852b-0d3c0b0a6862.png</image:loc><image:caption>9c64b8208fb7405b852b0d3c0b0a6862</image:caption><image:title>9c64b8208fb7405b852b0d3c0b0a6862</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/blog/hack-explained-radiant-capital</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Hack%20Explained%20-%20deltaprime%202%20.png</image:loc><image:caption>HackExplaineddeltaprime2</image:caption><image:title>HackExplaineddeltaprime2</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/e6a37adb-8b9e-4cf8-9e93-4473d45a5920.png</image:loc><image:caption>e6a37adb8b9e4cf89e934473d45a5920</image:caption><image:title>e6a37adb8b9e4cf89e934473d45a5920</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Hack%20Explained%20-%20unizen.png</image:loc><image:caption>HackExplainedunizen</image:caption><image:title>HackExplainedunizen</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/576138e3-6f2b-4deb-9bac-21211f849aed.png</image:loc><image:caption>576138e36f2b4deb9bac21211f849aed</image:caption><image:title>576138e36f2b4deb9bac21211f849aed</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/services/blockchain-security-assessment</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Website%20-%20blockchain%20threat%20intelligence.png</image:loc><image:caption>Websiteblockchainthreatintelligence</image:caption><image:title>Websiteblockchainthreatintelligence</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Website%20-%20rekt.png</image:loc><image:caption>Websiterekt</image:caption><image:title>Websiterekt</image:title></image:image><lastmod>2025-03-04</lastmod></url><url><loc>https://rivanorth.com/blog/stake-41-million-hack</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/b1bbed96-0bb1-4e2c-8e89-b207d2b77768.png</image:loc><image:caption>b1bbed960bb14e2c8e89b207d2b77768</image:caption><image:title>b1bbed960bb14e2c8e89b207d2b77768</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/47b279b6-e3f9-47db-902e-5268ee389755.png</image:loc><image:caption>47b279b6e3f947db902e5268ee389755</image:caption><image:title>47b279b6e3f947db902e5268ee389755</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/65f692db-1760-4d62-8293-ded167eea172.png</image:loc><image:caption>65f692db17604d628293ded167eea172</image:caption><image:title>65f692db17604d628293ded167eea172</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Hack%20Explained%20-%20Gamma.png</image:loc><image:caption>HackExplainedGamma</image:caption><image:title>HackExplainedGamma</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/blog/beyond-passwords-the-new-risks-of-dark-web-data-leaks</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Ransomhub%20waive%20anonimised.png</image:loc><image:caption>Ransomhubwaiveanonimised</image:caption><image:title>Ransomhubwaiveanonimised</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20Dark%20Web%20Lifecycle.png</image:loc><image:caption>BlogDarkWebDarkWebLifecycle</image:caption><image:title>BlogDarkWebDarkWebLifecycle</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20How%20to%20Identify%20if%20Your%20Business%20Data%20Is%20on%20the%20Dark%20Web.png</image:loc><image:caption>BlogDarkWebHowtoIdentifyifYourBusinessDataIsontheDarkWeb</image:caption><image:title>BlogDarkWebHowtoIdentifyifYourBusinessDataIsontheDarkWeb</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20What%20Are%20Data%20Breaches.png</image:loc><image:caption>BlogDarkWebWhatAreDataBreaches</image:caption><image:title>BlogDarkWebWhatAreDataBreaches</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20Beyond%20Passwords%20The%20new%20Risks%20of%20Dark%20Web%20Data%20Leaks.png</image:loc><image:caption>BlogDarkWebBeyondPasswordsThenewRisksofDarkWebDataLeaks</image:caption><image:title>BlogDarkWebBeyondPasswordsThenewRisksofDarkWebDataLeaks</image:title></image:image><lastmod>2025-02-09</lastmod></url><url><loc>https://rivanorth.com/blog/hack-explained-pike-finance</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/afaa405b-2370-4cbd-a3a9-f450eab93332.png</image:loc><image:caption>afaa405b23704cbda3a9f450eab93332</image:caption><image:title>afaa405b23704cbda3a9f450eab93332</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/68adc6d9-a2d8-4d72-9eae-2700faae5456.png</image:loc><image:caption>68adc6d9a2d84d729eae2700faae5456</image:caption><image:title>68adc6d9a2d84d729eae2700faae5456</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/df8aee59-0c0e-4b46-b35c-1a18472f5f73.png</image:loc><image:caption>df8aee590c0e4b46b35c1a18472f5f73</image:caption><image:title>df8aee590c0e4b46b35c1a18472f5f73</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Hack%20Explained%20-%20Pike%20.png</image:loc><image:caption>HackExplainedPike</image:caption><image:title>HackExplainedPike</image:title></image:image><lastmod>2025-01-09</lastmod></url><url><loc>https://rivanorth.com/blog/blockchain-security-roundup-january-2024-edition</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/f0c7cfd0-03ee-48eb-bd59-7742ab034dfa.png</image:loc><image:caption>f0c7cfd003ee48ebbd597742ab034dfa</image:caption><image:title>f0c7cfd003ee48ebbd597742ab034dfa</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/cb9cfecf-e261-4d29-b857-bd889c3fa3d6.png</image:loc><image:caption>cb9cfecfe2614d29b857bd889c3fa3d6</image:caption><image:title>cb9cfecfe2614d29b857bd889c3fa3d6</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/ff228455-0db5-47fe-ae65-763f88132209.png</image:loc><image:caption>ff2284550db547feae65763f88132209</image:caption><image:title>ff2284550db547feae65763f88132209</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Roundup%20-%20July%20%20(2).png</image:loc><image:caption>RoundupJuly2</image:caption><image:title>RoundupJuly2</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/blog/hack-explained-onyx-protocol-2</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/d99c6252-ce73-4bea-b932-49e101d25ed8.png</image:loc><image:caption>d99c6252ce734beab93249e101d25ed8</image:caption><image:title>d99c6252ce734beab93249e101d25ed8</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Hack%20Explained%20-%20sss.png</image:loc><image:caption>HackExplainedsss</image:caption><image:title>HackExplainedsss</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/a71e99f6-f285-49f3-b34b-ce46d7f0f487.png</image:loc><image:caption>a71e99f6f28549f3b34bce46d7f0f487</image:caption><image:title>a71e99f6f28549f3b34bce46d7f0f487</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/1e05b8e0-8946-47fd-a71a-675fed03ee8b.png</image:loc><image:caption>1e05b8e0894647fda71a675fed03ee8b</image:caption><image:title>1e05b8e0894647fda71a675fed03ee8b</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/blog/aquatic-panda</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20advisory%20-%20%20ISO%2027001.png</image:loc><image:caption>BlogadvisoryISO27001</image:caption><image:title>BlogadvisoryISO27001</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Telstra%20Hack%20Fake%20News.png</image:loc><image:caption>TelstraHackFakeNews</image:caption><image:title>TelstraHackFakeNews</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20aquatic%20panda.png</image:loc><image:caption>BlogDarkWebaquaticpanda</image:caption><image:title>BlogDarkWebaquaticpanda</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20radar.png</image:loc><image:caption>BlogDarkWebradar</image:caption><image:title>BlogDarkWebradar</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><lastmod>2025-09-15</lastmod></url><url><loc>https://rivanorth.com/blog/onyx-protocol</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/60dae0cc-4c5e-42b9-b6fd-4386ca465f1d.png</image:loc><image:caption>60dae0cc4c5e42b9b6fd4386ca465f1d</image:caption><image:title>60dae0cc4c5e42b9b6fd4386ca465f1d</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/3ba0f4b3-2776-4a92-9b5c-014f4ea6e371.png</image:loc><image:caption>3ba0f4b327764a929b5c014f4ea6e371</image:caption><image:title>3ba0f4b327764a929b5c014f4ea6e371</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/4372c4f8-84e8-47e1-99e9-9eea4fd688bb.png</image:loc><image:caption>4372c4f884e847e199e99eea4fd688bb</image:caption><image:title>4372c4f884e847e199e99eea4fd688bb</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><lastmod>2025-01-06</lastmod></url><url><loc>https://rivanorth.com/blog/cyber-insurance-costs-rise-40</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/73d4c7e8-1e13-439f-99a7-11f12ec97876.png</image:loc><image:caption>73d4c7e81e13439f99a711f12ec97876</image:caption><image:title>73d4c7e81e13439f99a711f12ec97876</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Telstra%20Hack%20Fake%20News.png</image:loc><image:caption>TelstraHackFakeNews</image:caption><image:title>TelstraHackFakeNews</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20Sarcoma%20Ransomware%20Group.png</image:loc><image:caption>BlogDarkWebSarcomaRansomwareGroup</image:caption><image:title>BlogDarkWebSarcomaRansomwareGroup</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20advisory%20-%20%20password%20security%202025%20(1).png</image:loc><image:caption>Blogadvisorypasswordsecurity20251</image:caption><image:title>Blogadvisorypasswordsecurity20251</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/blog/what-is-dark-web-monitoring-a-beginners-guide-for-businesses</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Telstra%20Hack%20Fake%20News.png</image:loc><image:caption>TelstraHackFakeNews</image:caption><image:title>TelstraHackFakeNews</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20case%20study%20-%20betts.png</image:loc><image:caption>Blogcasestudybetts</image:caption><image:title>Blogcasestudybetts</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20Top%205%20Reasons%20Businesses%20Need%20to%20Monitor%20the%20Dark%20Web.png</image:loc><image:caption>BlogDarkWebTop5ReasonsBusinessesNeedtoMonitortheDarkWeb</image:caption><image:title>BlogDarkWebTop5ReasonsBusinessesNeedtoMonitortheDarkWeb</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20What%20is%20dark%20web%20monitoring.png</image:loc><image:caption>BlogDarkWebWhatisdarkwebmonitoring</image:caption><image:title>BlogDarkWebWhatisdarkwebmonitoring</image:title></image:image><lastmod>2025-02-04</lastmod></url><url><loc>https://rivanorth.com/guides/dark-web-monitoring-cost</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><lastmod>2026-02-27</lastmod></url><url><loc>https://rivanorth.com/blog/hack-explained-deltaprime</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/d84f1025-380a-461d-b7e6-515bd738d591.png</image:loc><image:caption>d84f1025380a461db7e6515bd738d591</image:caption><image:title>d84f1025380a461db7e6515bd738d591</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/e623abcf-d50e-4917-96b6-f561e6ab128a.png</image:loc><image:caption>e623abcfd50e491796b6f561e6ab128a</image:caption><image:title>e623abcfd50e491796b6f561e6ab128a</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Hack%20Explained%20-%20%20woofi.png</image:loc><image:caption>HackExplainedwoofi</image:caption><image:title>HackExplainedwoofi</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/4372c4f8-84e8-47e1-99e9-9eea4fd688bb.png</image:loc><image:caption>4372c4f884e847e199e99eea4fd688bb</image:caption><image:title>4372c4f884e847e199e99eea4fd688bb</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/blog/hack-explained-unizen</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Hack%20Explained%20-%20unizen.png</image:loc><image:caption>HackExplainedunizen</image:caption><image:title>HackExplainedunizen</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Hack%20Explained%20-%20UwuLend%20.png</image:loc><image:caption>HackExplainedUwuLend</image:caption><image:title>HackExplainedUwuLend</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/720cb0a9-2af4-4e20-878d-d5d21af4b13e.png</image:loc><image:caption>720cb0a92af44e20878dd5d21af4b13e</image:caption><image:title>720cb0a92af44e20878dd5d21af4b13e</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/cb9cfecf-e261-4d29-b857-bd889c3fa3d6.png</image:loc><image:caption>cb9cfecfe2614d29b857bd889c3fa3d6</image:caption><image:title>cb9cfecfe2614d29b857bd889c3fa3d6</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/blog/top-5-reasons-businesses-need-to-monitor-the-dark-web</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20Top%205%20Reasons%20Businesses%20Need%20to%20Monitor%20the%20Dark%20Web.png</image:loc><image:caption>BlogDarkWebTop5ReasonsBusinessesNeedtoMonitortheDarkWeb</image:caption><image:title>BlogDarkWebTop5ReasonsBusinessesNeedtoMonitortheDarkWeb</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20advisory%20-%20%20safepay.png</image:loc><image:caption>Blogadvisorysafepay</image:caption><image:title>Blogadvisorysafepay</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20tor%20browser.png</image:loc><image:caption>BlogDarkWebtorbrowser</image:caption><image:title>BlogDarkWebtorbrowser</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20What%20to%20Do%20If%20Your%20Business%20Data%20Is%20Found%20on%20the%20Dark%20Web.png</image:loc><image:caption>BlogDarkWebWhattoDoIfYourBusinessDataIsFoundontheDarkWeb</image:caption><image:title>BlogDarkWebWhattoDoIfYourBusinessDataIsFoundontheDarkWeb</image:title></image:image><lastmod>2025-02-23</lastmod></url><url><loc>https://rivanorth.com/blog/remitano-hack</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/98748221-3866-479f-96aa-35059f57cc32.png</image:loc><image:caption>987482213866479f96aa35059f57cc32</image:caption><image:title>987482213866479f96aa35059f57cc32</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Hack%20Explained%20-%20unizen.png</image:loc><image:caption>HackExplainedunizen</image:caption><image:title>HackExplainedunizen</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/720cb0a9-2af4-4e20-878d-d5d21af4b13e.png</image:loc><image:caption>720cb0a92af44e20878dd5d21af4b13e</image:caption><image:title>720cb0a92af44e20878dd5d21af4b13e</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Hack%20Explained%20-%20Sonne%20.png</image:loc><image:caption>HackExplainedSonne</image:caption><image:title>HackExplainedSonne</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/blog/hack-explained-woofi</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Hack%20Explained%20-%20deltaprime%202%20.png</image:loc><image:caption>HackExplaineddeltaprime2</image:caption><image:title>HackExplaineddeltaprime2</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/072a4689-849b-44d0-aaab-7d30d2f84c9e.png</image:loc><image:caption>072a4689849b44d0aaab7d30d2f84c9e</image:caption><image:title>072a4689849b44d0aaab7d30d2f84c9e</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Hack%20Explained%20-%20UwuLend%20.png</image:loc><image:caption>HackExplainedUwuLend</image:caption><image:title>HackExplainedUwuLend</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Hack%20Explained%20-%20%20woofi.png</image:loc><image:caption>HackExplainedwoofi</image:caption><image:title>HackExplainedwoofi</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/blog/security-roundup-may-2024-edition</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/5305c307-08dd-46c4-bac0-05eca5479979.png</image:loc><image:caption>5305c30708dd46c4bac005eca5479979</image:caption><image:title>5305c30708dd46c4bac005eca5479979</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/4372c4f8-84e8-47e1-99e9-9eea4fd688bb.png</image:loc><image:caption>4372c4f884e847e199e99eea4fd688bb</image:caption><image:title>4372c4f884e847e199e99eea4fd688bb</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Roundup%20-%20July%20%20(2).png</image:loc><image:caption>RoundupJuly2</image:caption><image:title>RoundupJuly2</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/f0c7cfd0-03ee-48eb-bd59-7742ab034dfa.png</image:loc><image:caption>f0c7cfd003ee48ebbd597742ab034dfa</image:caption><image:title>f0c7cfd003ee48ebbd597742ab034dfa</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/blog/hack-explained-gamma-strategies</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/65f692db-1760-4d62-8293-ded167eea172.png</image:loc><image:caption>65f692db17604d628293ded167eea172</image:caption><image:title>65f692db17604d628293ded167eea172</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Hack%20Explained%20-%20Gamma.png</image:loc><image:caption>HackExplainedGamma</image:caption><image:title>HackExplainedGamma</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Hack%20Explained%20-%20Sonne%20.png</image:loc><image:caption>HackExplainedSonne</image:caption><image:title>HackExplainedSonne</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/1e05b8e0-8946-47fd-a71a-675fed03ee8b.png</image:loc><image:caption>1e05b8e0894647fda71a675fed03ee8b</image:caption><image:title>1e05b8e0894647fda71a675fed03ee8b</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><lastmod>2025-01-08</lastmod></url><url><loc>https://rivanorth.com/blog/security-roundup-september-2024</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/5adbfbfe-5fc2-4368-b6be-957c0146079c.png</image:loc><image:caption>5adbfbfe5fc24368b6be957c0146079c</image:caption><image:title>5adbfbfe5fc24368b6be957c0146079c</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/8977ac2e-171b-4d3a-9132-eb472b4dbbeb.jpeg</image:loc><image:caption>8977ac2e171b4d3a9132eb472b4dbbeb</image:caption><image:title>8977ac2e171b4d3a9132eb472b4dbbeb</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/3d917eb8-544e-4417-ac45-290325730e36.png</image:loc><image:caption>3d917eb8544e4417ac45290325730e36</image:caption><image:title>3d917eb8544e4417ac45290325730e36</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/07405779-c398-4c8a-bd7a-ae5f6690def6.png</image:loc><image:caption>07405779c3984c8abd7aae5f6690def6</image:caption><image:title>07405779c3984c8abd7aae5f6690def6</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/blog/vulnerability-report-may-2025</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20advisory%20-%20%20ISO%2027001.png</image:loc><image:caption>BlogadvisoryISO27001</image:caption><image:title>BlogadvisoryISO27001</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20advisory%20-%20%20Vulnerability%20Report%20-%202025%20-%20may.png</image:loc><image:caption>BlogadvisoryVulnerabilityReport2025may</image:caption><image:title>BlogadvisoryVulnerabilityReport2025may</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Telstra%20Hack%20Fake%20News.png</image:loc><image:caption>TelstraHackFakeNews</image:caption><image:title>TelstraHackFakeNews</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20radar.png</image:loc><image:caption>BlogDarkWebradar</image:caption><image:title>BlogDarkWebradar</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><lastmod>2025-06-09</lastmod></url><url><loc>https://rivanorth.com/blog/mixin-network-hack</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/720cb0a9-2af4-4e20-878d-d5d21af4b13e.png</image:loc><image:caption>720cb0a92af44e20878dd5d21af4b13e</image:caption><image:title>720cb0a92af44e20878dd5d21af4b13e</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Hack%20Explained%20-%20unizen.png</image:loc><image:caption>HackExplainedunizen</image:caption><image:title>HackExplainedunizen</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/98748221-3866-479f-96aa-35059f57cc32.png</image:loc><image:caption>987482213866479f96aa35059f57cc32</image:caption><image:title>987482213866479f96aa35059f57cc32</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/blog/security-roundup-march-2024-edition</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/8977ac2e-171b-4d3a-9132-eb472b4dbbeb.jpeg</image:loc><image:caption>8977ac2e171b4d3a9132eb472b4dbbeb</image:caption><image:title>8977ac2e171b4d3a9132eb472b4dbbeb</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20tor%20browser.png</image:loc><image:caption>BlogDarkWebtorbrowser</image:caption><image:title>BlogDarkWebtorbrowser</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/5adbfbfe-5fc2-4368-b6be-957c0146079c.png</image:loc><image:caption>5adbfbfe5fc24368b6be957c0146079c</image:caption><image:title>5adbfbfe5fc24368b6be957c0146079c</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Roundup%20-%20%20March.png</image:loc><image:caption>RoundupMarch</image:caption><image:title>RoundupMarch</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/blog/2023-hack-report</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Year%20in%20review.png</image:loc><image:caption>Yearinreview</image:caption><image:title>Yearinreview</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/5adbfbfe-5fc2-4368-b6be-957c0146079c.png</image:loc><image:caption>5adbfbfe5fc24368b6be957c0146079c</image:caption><image:title>5adbfbfe5fc24368b6be957c0146079c</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/8977ac2e-171b-4d3a-9132-eb472b4dbbeb.jpeg</image:loc><image:caption>8977ac2e171b4d3a9132eb472b4dbbeb</image:caption><image:title>8977ac2e171b4d3a9132eb472b4dbbeb</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/fbc7ebcc-e79e-40ef-b112-69b31930496a.png</image:loc><image:caption>fbc7ebcce79e40efb11269b31930496a</image:caption><image:title>fbc7ebcce79e40efb11269b31930496a</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/07405779-c398-4c8a-bd7a-ae5f6690def6.png</image:loc><image:caption>07405779c3984c8abd7aae5f6690def6</image:caption><image:title>07405779c3984c8abd7aae5f6690def6</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/blog/ultimate-guide-to-securing-your-x-account</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/jGwYJ5xs9GeneM2jL9c8a8tXyfaWVTa53oTHpZ_QeAobCjWbVTPdHpN3ELaseTjwOFsxeQ1Yy_PuuMY9ynjc3sXpolO2ioXtcHFAc29PJsUFSR_2RZOebHj6bF01om14Xu-qA3H6xHMa155CPGdPsZ5fMQ=s2048.png</image:loc><image:caption>jGwYJ5xs9GeneM2jL9c8a8tXyfaWVTa53oTHpZQeAobCjWbVTPdHpN3ELaseTjwOFsxeQ1YyPuuMY9ynjc3sXpolO2ioXtcHFAc29PJsUFSR2RZOebHj6bF01om14XuqA3H6xHMa155CPGdPsZ5fMQs2048</image:caption><image:title>jGwYJ5xs9GeneM2jL9c8a8tXyfaWVTa53oTHpZQeAobCjWbVTPdHpN3ELaseTjwOFsxeQ1YyPuuMY9ynjc3sXpolO2ioXtcHFAc29PJsUFSR2RZOebHj6bF01om14XuqA3H6xHMa155CPGdPsZ5fMQs2048</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/uCOl8rqrbTeopwpS6cqWUqfl3svz3wtzNmHqNkPS4KIewWxA8xN4mrrHwS32a8SyNTjaeH8KfOnxWlXZJc8ggCYKYJ4rUhwOuqhM2USq8bSmmRQZijEckITgqueDHJVEw4TdssTisRM18H7F-emtl8oqug=s2048.png</image:loc><image:caption>uCOl8rqrbTeopwpS6cqWUqfl3svz3wtzNmHqNkPS4KIewWxA8xN4mrrHwS32a8SyNTjaeH8KfOnxWlXZJc8ggCYKYJ4rUhwOuqhM2USq8bSmmRQZijEckITgqueDHJVEw4TdssTisRM18H7Femtl8oqugs2048</image:caption><image:title>uCOl8rqrbTeopwpS6cqWUqfl3svz3wtzNmHqNkPS4KIewWxA8xN4mrrHwS32a8SyNTjaeH8KfOnxWlXZJc8ggCYKYJ4rUhwOuqhM2USq8bSmmRQZijEckITgqueDHJVEw4TdssTisRM18H7Femtl8oqugs2048</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/47b279b6-e3f9-47db-902e-5268ee389755.png</image:loc><image:caption>47b279b6e3f947db902e5268ee389755</image:caption><image:title>47b279b6e3f947db902e5268ee389755</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/314175a7-fe7e-418a-838e-abd73c45c36a.png</image:loc><image:caption>314175a7fe7e418a838eabd73c45c36a</image:caption><image:title>314175a7fe7e418a838eabd73c45c36a</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/28879f76-fe53-4775-8d08-b2f0fd3bb24a.png</image:loc><image:caption>28879f76fe5347758d08b2f0fd3bb24a</image:caption><image:title>28879f76fe5347758d08b2f0fd3bb24a</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/f3830e71-b889-4885-b3f9-2d7bdcc95bc5.png</image:loc><image:caption>f3830e71b8894885b3f92d7bdcc95bc5</image:caption><image:title>f3830e71b8894885b3f92d7bdcc95bc5</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/9uw9USG6R90xKiQYifH3GEQpeYz1UnynTKf0mRUByWGvE8MO7aM9CsIH3Jj3VpZIO9kgqq-YYLqPNyudWOtENvfSP2HDN1y10v-Bwp0WZ1yMjMKrKhYrS5Q5MVK47B6YwsCwEyCUjCoN36eGLNvQz9Xulg=s2048.png</image:loc><image:caption>9uw9USG6R90xKiQYifH3GEQpeYz1UnynTKf0mRUByWGvE8MO7aM9CsIH3Jj3VpZIO9kgqqYYLqPNyudWOtENvfSP2HDN1y10vBwp0WZ1yMjMKrKhYrS5Q5MVK47B6YwsCwEyCUjCoN36eGLNvQz9Xulgs2048</image:caption><image:title>9uw9USG6R90xKiQYifH3GEQpeYz1UnynTKf0mRUByWGvE8MO7aM9CsIH3Jj3VpZIO9kgqqYYLqPNyudWOtENvfSP2HDN1y10vBwp0WZ1yMjMKrKhYrS5Q5MVK47B6YwsCwEyCUjCoN36eGLNvQz9Xulgs2048</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Research%20-%20ERC721.png</image:loc><image:caption>ResearchERC721</image:caption><image:title>ResearchERC721</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/clB2Y22mulZyofENTPaEcmdjawiwwLfhwTF5pRclmwFjkhL5iaCcRAbVhbcer5eVEDMG7NfXDjjfjJE_3qNG2LIUx1UtGThgGgqEta0wNlbFI8I7E44UZDwVPB5LuU8QWvfzFNSXTdMxA56mHiGTfsF2Yw=s2048.png</image:loc><image:caption>clB2Y22mulZyofENTPaEcmdjawiwwLfhwTF5pRclmwFjkhL5iaCcRAbVhbcer5eVEDMG7NfXDjjfjJE3qNG2LIUx1UtGThgGgqEta0wNlbFI8I7E44UZDwVPB5LuU8QWvfzFNSXTdMxA56mHiGTfsF2Yws2048</image:caption><image:title>clB2Y22mulZyofENTPaEcmdjawiwwLfhwTF5pRclmwFjkhL5iaCcRAbVhbcer5eVEDMG7NfXDjjfjJE3qNG2LIUx1UtGThgGgqEta0wNlbFI8I7E44UZDwVPB5LuU8QWvfzFNSXTdMxA56mHiGTfsF2Yws2048</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/3d917eb8-544e-4417-ac45-290325730e36.png</image:loc><image:caption>3d917eb8544e4417ac45290325730e36</image:caption><image:title>3d917eb8544e4417ac45290325730e36</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/c9b5e79d-7930-4007-9f28-b51ef47fda7f.png</image:loc><image:caption>c9b5e79d793040079f28b51ef47fda7f</image:caption><image:title>c9b5e79d793040079f28b51ef47fda7f</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/d9d8ae60-b815-4404-b3c3-8b0d5098da2c.png</image:loc><image:caption>d9d8ae60b8154404b3c38b0d5098da2c</image:caption><image:title>d9d8ae60b8154404b3c38b0d5098da2c</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/586c797f-a974-4536-b2f8-01cc041d3792.png</image:loc><image:caption>586c797fa9744536b2f801cc041d3792</image:caption><image:title>586c797fa9744536b2f801cc041d3792</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Research%20-%20x%20hardening.png</image:loc><image:caption>Researchxhardening</image:caption><image:title>Researchxhardening</image:title></image:image><lastmod>2025-03-04</lastmod></url><url><loc>https://rivanorth.com/blog/kronos-research-hack</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/3d917eb8-544e-4417-ac45-290325730e36.png</image:loc><image:caption>3d917eb8544e4417ac45290325730e36</image:caption><image:title>3d917eb8544e4417ac45290325730e36</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/8977ac2e-171b-4d3a-9132-eb472b4dbbeb.jpeg</image:loc><image:caption>8977ac2e171b4d3a9132eb472b4dbbeb</image:caption><image:title>8977ac2e171b4d3a9132eb472b4dbbeb</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Year%20in%20review.png</image:loc><image:caption>Yearinreview</image:caption><image:title>Yearinreview</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/38c12729-1be4-46ad-a60b-cd67bf6ef569.png</image:loc><image:caption>38c127291be446ada60bcd67bf6ef569</image:caption><image:title>38c127291be446ada60bcd67bf6ef569</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/blog/dns-hijacking-protection-on-vercel</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/a0bbf77a-3d75-4a59-95da-79f0953166bd.png</image:loc><image:caption>a0bbf77a3d754a5995da79f0953166bd</image:caption><image:title>a0bbf77a3d754a5995da79f0953166bd</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Hack%20Explained%20-%20Squarespace%20%20(1).png</image:loc><image:caption>HackExplainedSquarespace1</image:caption><image:title>HackExplainedSquarespace1</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/55a169f9-3649-4e4d-a004-e6e6c7bf94b2.png</image:loc><image:caption>55a169f936494e4da004e6e6c7bf94b2</image:caption><image:title>55a169f936494e4da004e6e6c7bf94b2</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/3ba0f4b3-2776-4a92-9b5c-014f4ea6e371.png</image:loc><image:caption>3ba0f4b327764a929b5c014f4ea6e371</image:caption><image:title>3ba0f4b327764a929b5c014f4ea6e371</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><lastmod>2025-03-04</lastmod></url><url><loc>https://rivanorth.com/blog/what-is-the-dark-web-understanding-the-clear-deep-and-dark-web</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20Dark%20Web%20Lifecycle.png</image:loc><image:caption>BlogDarkWebDarkWebLifecycle</image:caption><image:title>BlogDarkWebDarkWebLifecycle</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20What%20is%20the%20Dark%20Web.png</image:loc><image:caption>BlogDarkWebWhatistheDarkWeb</image:caption><image:title>BlogDarkWebWhatistheDarkWeb</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20What%20Are%20Data%20Breaches.png</image:loc><image:caption>BlogDarkWebWhatAreDataBreaches</image:caption><image:title>BlogDarkWebWhatAreDataBreaches</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20Beyond%20Passwords%20The%20new%20Risks%20of%20Dark%20Web%20Data%20Leaks.png</image:loc><image:caption>BlogDarkWebBeyondPasswordsThenewRisksofDarkWebDataLeaks</image:caption><image:title>BlogDarkWebBeyondPasswordsThenewRisksofDarkWebDataLeaks</image:title></image:image><lastmod>2025-02-04</lastmod></url><url><loc>https://rivanorth.com/guides/crowdstrike-alternative</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/X%20icon.svg</image:loc><image:caption>Xicon</image:caption><image:title>Xicon</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Tick%20icon.svg</image:loc><image:caption>Tickicon</image:caption><image:title>Tickicon</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Comparison%20-%20crowdstrike.png</image:loc><image:caption>Comparisoncrowdstrike</image:caption><image:title>Comparisoncrowdstrike</image:title></image:image><lastmod>2026-02-27</lastmod></url><url><loc>https://rivanorth.com/blog/hack-explained-m2-exchange</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/4372c4f8-84e8-47e1-99e9-9eea4fd688bb.png</image:loc><image:caption>4372c4f884e847e199e99eea4fd688bb</image:caption><image:title>4372c4f884e847e199e99eea4fd688bb</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/df8aee59-0c0e-4b46-b35c-1a18472f5f73.png</image:loc><image:caption>df8aee590c0e4b46b35c1a18472f5f73</image:caption><image:title>df8aee590c0e4b46b35c1a18472f5f73</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/8bb0af35-8f81-44ca-b1be-a0efd3588e1b.png</image:loc><image:caption>8bb0af358f8144cab1bea0efd3588e1b</image:caption><image:title>8bb0af358f8144cab1bea0efd3588e1b</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/3d917eb8-544e-4417-ac45-290325730e36.png</image:loc><image:caption>3d917eb8544e4417ac45290325730e36</image:caption><image:title>3d917eb8544e4417ac45290325730e36</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/blog/what-are-zero-day-vulnerabilities</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Telstra%20Hack%20Fake%20News.png</image:loc><image:caption>TelstraHackFakeNews</image:caption><image:title>TelstraHackFakeNews</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20radar.png</image:loc><image:caption>BlogDarkWebradar</image:caption><image:title>BlogDarkWebradar</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20advisory%20-%20%20zero%20days.png</image:loc><image:caption>Blogadvisoryzerodays</image:caption><image:title>Blogadvisoryzerodays</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20advisory%20-%20%20ISO%2027001.png</image:loc><image:caption>BlogadvisoryISO27001</image:caption><image:title>BlogadvisoryISO27001</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><lastmod>2025-09-01</lastmod></url><url><loc>https://rivanorth.com/blog/web3-defence-in-depth-origami-finance-case-study</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/46e25fe0-e08d-4dd9-bd67-7ea93d4c7640.png</image:loc><image:caption>46e25fe0e08d4dd9bd677ea93d4c7640</image:caption><image:title>46e25fe0e08d4dd9bd677ea93d4c7640</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/07405779-c398-4c8a-bd7a-ae5f6690def6.png</image:loc><image:caption>07405779c3984c8abd7aae5f6690def6</image:caption><image:title>07405779c3984c8abd7aae5f6690def6</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20What%20Are%20Data%20Breaches.png</image:loc><image:caption>BlogDarkWebWhatAreDataBreaches</image:caption><image:title>BlogDarkWebWhatAreDataBreaches</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20What%20is%20the%20Dark%20Web.png</image:loc><image:caption>BlogDarkWebWhatistheDarkWeb</image:caption><image:title>BlogDarkWebWhatistheDarkWeb</image:title></image:image><lastmod>2025-03-04</lastmod></url><url><loc>https://rivanorth.com/blog/recent-rug-pulls</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/408eddf0-078b-4765-a264-f9e3c972a13f.png</image:loc><image:caption>408eddf0078b4765a264f9e3c972a13f</image:caption><image:title>408eddf0078b4765a264f9e3c972a13f</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20advisory%20-%20%20ISO%2027001.png</image:loc><image:caption>BlogadvisoryISO27001</image:caption><image:title>BlogadvisoryISO27001</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Roundup%20-%20%20March.png</image:loc><image:caption>RoundupMarch</image:caption><image:title>RoundupMarch</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20advisory%20-%20%20safepay.png</image:loc><image:caption>Blogadvisorysafepay</image:caption><image:title>Blogadvisorysafepay</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/blog/hack-explained-indodax</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/e9668847-66f6-4519-80f9-c268779b2e9f.png</image:loc><image:caption>e966884766f6451980f9c268779b2e9f</image:caption><image:title>e966884766f6451980f9c268779b2e9f</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/4372c4f8-84e8-47e1-99e9-9eea4fd688bb.png</image:loc><image:caption>4372c4f884e847e199e99eea4fd688bb</image:caption><image:title>4372c4f884e847e199e99eea4fd688bb</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20Jandamuda.png</image:loc><image:caption>BlogDarkWebJandamuda</image:caption><image:title>BlogDarkWebJandamuda</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/b37e4bc9-173c-407e-90a9-4bb30b300bef.png</image:loc><image:caption>b37e4bc9173c407e90a94bb30b300bef</image:caption><image:title>b37e4bc9173c407e90a94bb30b300bef</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/blog/vulnerability-report-november-2024</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/9f344078-b6d0-440b-8e2b-e10a97e4c01e.png</image:loc><image:caption>9f344078b6d0440b8e2be10a97e4c01e</image:caption><image:title>9f344078b6d0440b8e2be10a97e4c01e</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Research%20-%20x%20hardening.png</image:loc><image:caption>Researchxhardening</image:caption><image:title>Researchxhardening</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/4a4d24ef-fe15-4842-abd0-d4d177288c00.png</image:loc><image:caption>4a4d24effe154842abd0d4d177288c00</image:caption><image:title>4a4d24effe154842abd0d4d177288c00</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/60dae0cc-4c5e-42b9-b6fd-4386ca465f1d.png</image:loc><image:caption>60dae0cc4c5e42b9b6fd4386ca465f1d</image:caption><image:title>60dae0cc4c5e42b9b6fd4386ca465f1d</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/blog/hack-explained-uwulend</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/072a4689-849b-44d0-aaab-7d30d2f84c9e.png</image:loc><image:caption>072a4689849b44d0aaab7d30d2f84c9e</image:caption><image:title>072a4689849b44d0aaab7d30d2f84c9e</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/1e05b8e0-8946-47fd-a71a-675fed03ee8b.png</image:loc><image:caption>1e05b8e0894647fda71a675fed03ee8b</image:caption><image:title>1e05b8e0894647fda71a675fed03ee8b</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Hack%20Explained%20-%20UwuLend%20.png</image:loc><image:caption>HackExplainedUwuLend</image:caption><image:title>HackExplainedUwuLend</image:title></image:image><lastmod>2025-01-09</lastmod></url><url><loc>https://rivanorth.com/services/cloud-security-assessment</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><lastmod>2025-03-04</lastmod></url><url><loc>https://rivanorth.com/blog/vulnerability-report-september-2024</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/b5b1cf1c-1012-4cf4-890a-920385d01e60.jpeg</image:loc><image:caption>b5b1cf1c10124cf4890a920385d01e60</image:caption><image:title>b5b1cf1c10124cf4890a920385d01e60</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20advisory%20-%20%20Vulnerability%20Report%20-%202025%20-%20april.png</image:loc><image:caption>BlogadvisoryVulnerabilityReport2025april</image:caption><image:title>BlogadvisoryVulnerabilityReport2025april</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20advisory%20-%20%20Vulnerability%20Report%20-%202025%20-%20February.png</image:loc><image:caption>BlogadvisoryVulnerabilityReport2025February</image:caption><image:title>BlogadvisoryVulnerabilityReport2025February</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/9f344078-b6d0-440b-8e2b-e10a97e4c01e.png</image:loc><image:caption>9f344078b6d0440b8e2be10a97e4c01e</image:caption><image:title>9f344078b6d0440b8e2be10a97e4c01e</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/blog/hack-explained-sonne-finance</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Hack%20Explained%20-%20Gamma.png</image:loc><image:caption>HackExplainedGamma</image:caption><image:title>HackExplainedGamma</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/a71e99f6-f285-49f3-b34b-ce46d7f0f487.png</image:loc><image:caption>a71e99f6f28549f3b34bce46d7f0f487</image:caption><image:title>a71e99f6f28549f3b34bce46d7f0f487</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Hack%20Explained%20-%20Sonne%20.png</image:loc><image:caption>HackExplainedSonne</image:caption><image:title>HackExplainedSonne</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><lastmod>2025-01-09</lastmod></url><url><loc>https://rivanorth.com/blog/raft-protocol-hack</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/072a4689-849b-44d0-aaab-7d30d2f84c9e.png</image:loc><image:caption>072a4689849b44d0aaab7d30d2f84c9e</image:caption><image:title>072a4689849b44d0aaab7d30d2f84c9e</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/b76e9719-18ec-4c44-b573-91897eb3357f.png</image:loc><image:caption>b76e971918ec4c44b57391897eb3357f</image:caption><image:title>b76e971918ec4c44b57391897eb3357f</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/0f826aa5-4718-4aaf-88af-c464ab7a700b.png</image:loc><image:caption>0f826aa547184aaf88afc464ab7a700b</image:caption><image:title>0f826aa547184aaf88afc464ab7a700b</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/1e05b8e0-8946-47fd-a71a-675fed03ee8b.png</image:loc><image:caption>1e05b8e0894647fda71a675fed03ee8b</image:caption><image:title>1e05b8e0894647fda71a675fed03ee8b</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/blog/hack-explained-shezmu</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/afaa405b-2370-4cbd-a3a9-f450eab93332.png</image:loc><image:caption>afaa405b23704cbda3a9f450eab93332</image:caption><image:title>afaa405b23704cbda3a9f450eab93332</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/e6a37adb-8b9e-4cf8-9e93-4473d45a5920.png</image:loc><image:caption>e6a37adb8b9e4cf89e934473d45a5920</image:caption><image:title>e6a37adb8b9e4cf89e934473d45a5920</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/576138e3-6f2b-4deb-9bac-21211f849aed.png</image:loc><image:caption>576138e36f2b4deb9bac21211f849aed</image:caption><image:title>576138e36f2b4deb9bac21211f849aed</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/191a690a-838b-4867-926d-4177691cea0e.png</image:loc><image:caption>191a690a838b4867926d4177691cea0e</image:caption><image:title>191a690a838b4867926d4177691cea0e</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/blog/hack-explained-orbit-bridge</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Hack%20Explained%20-%20sss.png</image:loc><image:caption>HackExplainedsss</image:caption><image:title>HackExplainedsss</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/e8878983-7f44-46d9-8461-743a8f555245.png</image:loc><image:caption>e88789837f4446d98461743a8f555245</image:caption><image:title>e88789837f4446d98461743a8f555245</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/0f826aa5-4718-4aaf-88af-c464ab7a700b.png</image:loc><image:caption>0f826aa547184aaf88afc464ab7a700b</image:caption><image:title>0f826aa547184aaf88afc464ab7a700b</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/98cd491c-85ed-4385-9095-7d2447a53376.png</image:loc><image:caption>98cd491c85ed438590957d2447a53376</image:caption><image:title>98cd491c85ed438590957d2447a53376</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/blog/security-roundup-august-2024-edition</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/46e25fe0-e08d-4dd9-bd67-7ea93d4c7640.png</image:loc><image:caption>46e25fe0e08d4dd9bd677ea93d4c7640</image:caption><image:title>46e25fe0e08d4dd9bd677ea93d4c7640</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Roundup%20-%20%20March.png</image:loc><image:caption>RoundupMarch</image:caption><image:title>RoundupMarch</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/4b5f0a8f-eae0-440e-98cc-b9766e662a17.png</image:loc><image:caption>4b5f0a8feae0440e98ccb9766e662a17</image:caption><image:title>4b5f0a8feae0440e98ccb9766e662a17</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/5adbfbfe-5fc2-4368-b6be-957c0146079c.png</image:loc><image:caption>5adbfbfe5fc24368b6be957c0146079c</image:caption><image:title>5adbfbfe5fc24368b6be957c0146079c</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/8977ac2e-171b-4d3a-9132-eb472b4dbbeb.jpeg</image:loc><image:caption>8977ac2e171b4d3a9132eb472b4dbbeb</image:caption><image:title>8977ac2e171b4d3a9132eb472b4dbbeb</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/blog/heco-htx-hack</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/68adc6d9-a2d8-4d72-9eae-2700faae5456.png</image:loc><image:caption>68adc6d9a2d84d729eae2700faae5456</image:caption><image:title>68adc6d9a2d84d729eae2700faae5456</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/afaa405b-2370-4cbd-a3a9-f450eab93332.png</image:loc><image:caption>afaa405b23704cbda3a9f450eab93332</image:caption><image:title>afaa405b23704cbda3a9f450eab93332</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/191a690a-838b-4867-926d-4177691cea0e.png</image:loc><image:caption>191a690a838b4867926d4177691cea0e</image:caption><image:title>191a690a838b4867926d4177691cea0e</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Hack%20Explained%20-%20heco%20htx.png</image:loc><image:caption>HackExplainedhecohtx</image:caption><image:title>HackExplainedhecohtx</image:title></image:image><lastmod>2025-01-09</lastmod></url><url><loc>https://rivanorth.com/blog/strengthen-password-policy-in-5-steps</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20radar.png</image:loc><image:caption>BlogDarkWebradar</image:caption><image:title>BlogDarkWebradar</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20advisory%20-%20%20password%20policy.png</image:loc><image:caption>Blogadvisorypasswordpolicy</image:caption><image:title>Blogadvisorypasswordpolicy</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Telstra%20Hack%20Fake%20News.png</image:loc><image:caption>TelstraHackFakeNews</image:caption><image:title>TelstraHackFakeNews</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20advisory%20-%20%20ISO%2027001.png</image:loc><image:caption>BlogadvisoryISO27001</image:caption><image:title>BlogadvisoryISO27001</image:title></image:image><lastmod>2025-08-05</lastmod></url><url><loc>https://rivanorth.com/blog/hack-fantom-202310</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/720cb0a9-2af4-4e20-878d-d5d21af4b13e.png</image:loc><image:caption>720cb0a92af44e20878dd5d21af4b13e</image:caption><image:title>720cb0a92af44e20878dd5d21af4b13e</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/191a690a-838b-4867-926d-4177691cea0e.png</image:loc><image:caption>191a690a838b4867926d4177691cea0e</image:caption><image:title>191a690a838b4867926d4177691cea0e</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/34e12a3e-c3af-4e91-9b0c-fcee45a77ad4.png</image:loc><image:caption>34e12a3ec3af4e919b0cfcee45a77ad4</image:caption><image:title>34e12a3ec3af4e919b0cfcee45a77ad4</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/5e87e3a9-345e-493d-a7b1-c333bc347e65.png</image:loc><image:caption>5e87e3a9345e493da7b1c333bc347e65</image:caption><image:title>5e87e3a9345e493da7b1c333bc347e65</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/blog/hack-explained-deltaprime-2</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/e6a37adb-8b9e-4cf8-9e93-4473d45a5920.png</image:loc><image:caption>e6a37adb8b9e4cf89e934473d45a5920</image:caption><image:title>e6a37adb8b9e4cf89e934473d45a5920</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Hack%20Explained%20-%20deltaprime%202%20.png</image:loc><image:caption>HackExplaineddeltaprime2</image:caption><image:title>HackExplaineddeltaprime2</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/65f692db-1760-4d62-8293-ded167eea172.png</image:loc><image:caption>65f692db17604d628293ded167eea172</image:caption><image:title>65f692db17604d628293ded167eea172</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/576138e3-6f2b-4deb-9bac-21211f849aed.png</image:loc><image:caption>576138e36f2b4deb9bac21211f849aed</image:caption><image:title>576138e36f2b4deb9bac21211f849aed</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><lastmod>2025-01-09</lastmod></url><url><loc>https://rivanorth.com/partner-programme</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Website%20Partners.png</image:loc><image:caption>WebsitePartners</image:caption><image:title>WebsitePartners</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><lastmod>2026-02-26</lastmod></url><url><loc>https://rivanorth.com/blog</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20radar.png</image:loc><image:caption>BlogDarkWebradar</image:caption><image:title>BlogDarkWebradar</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20advisory%20-%20%20ISO%2027001.png</image:loc><image:caption>BlogadvisoryISO27001</image:caption><image:title>BlogadvisoryISO27001</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20Global%20Ransomware%20Group.png</image:loc><image:caption>BlogDarkWebGlobalRansomwareGroup</image:caption><image:title>BlogDarkWebGlobalRansomwareGroup</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20FTP.png</image:loc><image:caption>BlogDarkWebFTP</image:caption><image:title>BlogDarkWebFTP</image:title></image:image><lastmod>2025-01-10</lastmod></url><url><loc>https://rivanorth.com/blog/what-to-do-if-your-business-data-is-found-on-the-dark-web</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20What%20to%20Do%20If%20Your%20Business%20Data%20Is%20Found%20on%20the%20Dark%20Web.png</image:loc><image:caption>BlogDarkWebWhattoDoIfYourBusinessDataIsFoundontheDarkWeb</image:caption><image:title>BlogDarkWebWhattoDoIfYourBusinessDataIsFoundontheDarkWeb</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20advisory%20-%20%20ISO%2027001.png</image:loc><image:caption>BlogadvisoryISO27001</image:caption><image:title>BlogadvisoryISO27001</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Telstra%20Hack%20Fake%20News.png</image:loc><image:caption>TelstraHackFakeNews</image:caption><image:title>TelstraHackFakeNews</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20radar.png</image:loc><image:caption>BlogDarkWebradar</image:caption><image:title>BlogDarkWebradar</image:title></image:image><lastmod>2025-06-24</lastmod></url><url><loc>https://rivanorth.com/blog/hack-explained-alex-lab</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/706b4393-67d1-4028-b8f6-f1037d417464.png</image:loc><image:caption>706b439367d14028b8f6f1037d417464</image:caption><image:title>706b439367d14028b8f6f1037d417464</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/4a4d24ef-fe15-4842-abd0-d4d177288c00.png</image:loc><image:caption>4a4d24effe154842abd0d4d177288c00</image:caption><image:title>4a4d24effe154842abd0d4d177288c00</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Hack%20Explained%20-%20KnowBe4%20.png</image:loc><image:caption>HackExplainedKnowBe4</image:caption><image:title>HackExplainedKnowBe4</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Hack%20Explained%20-%20deltaprime%202%20.png</image:loc><image:caption>HackExplaineddeltaprime2</image:caption><image:title>HackExplaineddeltaprime2</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/blog/tor-browser-the-gateway-to-the-dark-web</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20advisory%20-%20%20ISO%2027001.png</image:loc><image:caption>BlogadvisoryISO27001</image:caption><image:title>BlogadvisoryISO27001</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20tor%20browser.png</image:loc><image:caption>BlogDarkWebtorbrowser</image:caption><image:title>BlogDarkWebtorbrowser</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Telstra%20Hack%20Fake%20News.png</image:loc><image:caption>TelstraHackFakeNews</image:caption><image:title>TelstraHackFakeNews</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20radar.png</image:loc><image:caption>BlogDarkWebradar</image:caption><image:title>BlogDarkWebradar</image:title></image:image><lastmod>2025-06-16</lastmod></url><url><loc>https://rivanorth.com/blog/vulnerability-report-march-2025</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Telstra%20Hack%20Fake%20News.png</image:loc><image:caption>TelstraHackFakeNews</image:caption><image:title>TelstraHackFakeNews</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20advisory%20-%20%20ISO%2027001.png</image:loc><image:caption>BlogadvisoryISO27001</image:caption><image:title>BlogadvisoryISO27001</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20advisory%20-%20%20Vulnerability%20Report%20-%202025%20-%20March.png</image:loc><image:caption>BlogadvisoryVulnerabilityReport2025March</image:caption><image:title>BlogadvisoryVulnerabilityReport2025March</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20radar.png</image:loc><image:caption>BlogDarkWebradar</image:caption><image:title>BlogDarkWebradar</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><lastmod>2025-04-01</lastmod></url><url><loc>https://rivanorth.com/blog/hack-explained-squarespace</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/072a4689-849b-44d0-aaab-7d30d2f84c9e.png</image:loc><image:caption>072a4689849b44d0aaab7d30d2f84c9e</image:caption><image:title>072a4689849b44d0aaab7d30d2f84c9e</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/ff228455-0db5-47fe-ae65-763f88132209.png</image:loc><image:caption>ff2284550db547feae65763f88132209</image:caption><image:title>ff2284550db547feae65763f88132209</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Hack%20Explained%20-%20Squarespace%20%20(1).png</image:loc><image:caption>HackExplainedSquarespace1</image:caption><image:title>HackExplainedSquarespace1</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/a0bbf77a-3d75-4a59-95da-79f0953166bd.png</image:loc><image:caption>a0bbf77a3d754a5995da79f0953166bd</image:caption><image:title>a0bbf77a3d754a5995da79f0953166bd</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/blog/hack-explained-lifi-protocol</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/68adc6d9-a2d8-4d72-9eae-2700faae5456.png</image:loc><image:caption>68adc6d9a2d84d729eae2700faae5456</image:caption><image:title>68adc6d9a2d84d729eae2700faae5456</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/afaa405b-2370-4cbd-a3a9-f450eab93332.png</image:loc><image:caption>afaa405b23704cbda3a9f450eab93332</image:caption><image:title>afaa405b23704cbda3a9f450eab93332</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/d99c6252-ce73-4bea-b932-49e101d25ed8.png</image:loc><image:caption>d99c6252ce734beab93249e101d25ed8</image:caption><image:title>d99c6252ce734beab93249e101d25ed8</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/55a169f9-3649-4e4d-a004-e6e6c7bf94b2.png</image:loc><image:caption>55a169f936494e4da004e6e6c7bf94b2</image:caption><image:title>55a169f936494e4da004e6e6c7bf94b2</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/blog/vulnerability-report-july-2024</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/d5001720-b073-41f1-876e-9827f88e32bb.png</image:loc><image:caption>d5001720b07341f1876e9827f88e32bb</image:caption><image:title>d5001720b07341f1876e9827f88e32bb</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20Cracked%20and%20Nulled%20Seized.png</image:loc><image:caption>BlogDarkWebCrackedandNulledSeized</image:caption><image:title>BlogDarkWebCrackedandNulledSeized</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/6be63e7b-1061-47e8-b5e2-b10a874c02ae.png</image:loc><image:caption>6be63e7b106147e8b5e2b10a874c02ae</image:caption><image:title>6be63e7b106147e8b5e2b10a874c02ae</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20radar.png</image:loc><image:caption>BlogDarkWebradar</image:caption><image:title>BlogDarkWebradar</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/blog/hack-explained-radiant-capital-2</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/e6a37adb-8b9e-4cf8-9e93-4473d45a5920.png</image:loc><image:caption>e6a37adb8b9e4cf89e934473d45a5920</image:caption><image:title>e6a37adb8b9e4cf89e934473d45a5920</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/d18437f8-f3f2-4858-b345-eebf55362827.png</image:loc><image:caption>d18437f8f3f24858b345eebf55362827</image:caption><image:title>d18437f8f3f24858b345eebf55362827</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/b37e4bc9-173c-407e-90a9-4bb30b300bef.png</image:loc><image:caption>b37e4bc9173c407e90a94bb30b300bef</image:caption><image:title>b37e4bc9173c407e90a94bb30b300bef</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/47b279b6-e3f9-47db-902e-5268ee389755.png</image:loc><image:caption>47b279b6e3f947db902e5268ee389755</image:caption><image:title>47b279b6e3f947db902e5268ee389755</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/services/advanced-penetration-testing</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><lastmod>2025-03-04</lastmod></url><url><loc>https://rivanorth.com/blog/security-roundup-april-2024-edition</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/59be17f3-6856-4018-b72f-a6a63ed26802.png</image:loc><image:caption>59be17f368564018b72fa6a63ed26802</image:caption><image:title>59be17f368564018b72fa6a63ed26802</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/46f1026c-d16a-49b3-9211-6e447311b223.png</image:loc><image:caption>46f1026cd16a49b392116e447311b223</image:caption><image:title>46f1026cd16a49b392116e447311b223</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Hack%20Explained%20-%20Pike%20.png</image:loc><image:caption>HackExplainedPike</image:caption><image:title>HackExplainedPike</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/afaa405b-2370-4cbd-a3a9-f450eab93332.png</image:loc><image:caption>afaa405b23704cbda3a9f450eab93332</image:caption><image:title>afaa405b23704cbda3a9f450eab93332</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/blog/hack-explained-penpie</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/98748221-3866-479f-96aa-35059f57cc32.png</image:loc><image:caption>987482213866479f96aa35059f57cc32</image:caption><image:title>987482213866479f96aa35059f57cc32</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20advisory%20-%20%20ISO%2027001.png</image:loc><image:caption>BlogadvisoryISO27001</image:caption><image:title>BlogadvisoryISO27001</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/785a55d1-bfab-463c-a591-8712949db8c3.png</image:loc><image:caption>785a55d1bfab463ca5918712949db8c3</image:caption><image:title>785a55d1bfab463ca5918712949db8c3</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/4372c4f8-84e8-47e1-99e9-9eea4fd688bb.png</image:loc><image:caption>4372c4f884e847e199e99eea4fd688bb</image:caption><image:title>4372c4f884e847e199e99eea4fd688bb</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/blog/kyberswap-hack</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Hack%20Explained%20-%20KyberSwap.png</image:loc><image:caption>HackExplainedKyberSwap</image:caption><image:title>HackExplainedKyberSwap</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/4372c4f8-84e8-47e1-99e9-9eea4fd688bb.png</image:loc><image:caption>4372c4f884e847e199e99eea4fd688bb</image:caption><image:title>4372c4f884e847e199e99eea4fd688bb</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/a71e99f6-f285-49f3-b34b-ce46d7f0f487.png</image:loc><image:caption>a71e99f6f28549f3b34bce46d7f0f487</image:caption><image:title>a71e99f6f28549f3b34bce46d7f0f487</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/072a4689-849b-44d0-aaab-7d30d2f84c9e.png</image:loc><image:caption>072a4689849b44d0aaab7d30d2f84c9e</image:caption><image:title>072a4689849b44d0aaab7d30d2f84c9e</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/blog/iso-27001</loc><lastmod>2025-11-12</lastmod></url><url><loc>https://rivanorth.com/blog/2025-password-security-trends-best-practices-for-businesses</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20advisory%20-%20%20password%20security%202025%20(1).png</image:loc><image:caption>Blogadvisorypasswordsecurity20251</image:caption><image:title>Blogadvisorypasswordsecurity20251</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20Sarcoma%20Ransomware%20Group.png</image:loc><image:caption>BlogDarkWebSarcomaRansomwareGroup</image:caption><image:title>BlogDarkWebSarcomaRansomwareGroup</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20advisory%20-%20%205%20cybersecurity%20tools%20every%20business%20should%20be%20using.png</image:loc><image:caption>Blogadvisory5cybersecuritytoolseverybusinessshouldbeusing</image:caption><image:title>Blogadvisory5cybersecuritytoolseverybusinessshouldbeusing</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20advisory%20-%20%20password%20policy.png</image:loc><image:caption>Blogadvisorypasswordpolicy</image:caption><image:title>Blogadvisorypasswordpolicy</image:title></image:image><lastmod>2025-02-18</lastmod></url><url><loc>https://rivanorth.com/blog/vulnerability-report-june-2024</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/9f344078-b6d0-440b-8e2b-e10a97e4c01e.png</image:loc><image:caption>9f344078b6d0440b8e2be10a97e4c01e</image:caption><image:title>9f344078b6d0440b8e2be10a97e4c01e</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/b5b1cf1c-1012-4cf4-890a-920385d01e60.jpeg</image:loc><image:caption>b5b1cf1c10124cf4890a920385d01e60</image:caption><image:title>b5b1cf1c10124cf4890a920385d01e60</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20advisory%20-%20%20Vulnerability%20Report%20-%202025%20-%20February.png</image:loc><image:caption>BlogadvisoryVulnerabilityReport2025February</image:caption><image:title>BlogadvisoryVulnerabilityReport2025February</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20advisory%20-%20%20Vulnerability%20Report%20-%202025%20-%20april.png</image:loc><image:caption>BlogadvisoryVulnerabilityReport2025april</image:caption><image:title>BlogadvisoryVulnerabilityReport2025april</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/oko/faq</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><lastmod>2026-02-26</lastmod></url><url><loc>https://rivanorth.com/blog/hack-explained-rho-market</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/b761da6d-831b-4d54-8dd9-9536fdb6ab65.png</image:loc><image:caption>b761da6d831b4d548dd99536fdb6ab65</image:caption><image:title>b761da6d831b4d548dd99536fdb6ab65</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/98cd491c-85ed-4385-9095-7d2447a53376.png</image:loc><image:caption>98cd491c85ed438590957d2447a53376</image:caption><image:title>98cd491c85ed438590957d2447a53376</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/d84f1025-380a-461d-b7e6-515bd738d591.png</image:loc><image:caption>d84f1025380a461db7e6515bd738d591</image:caption><image:title>d84f1025380a461db7e6515bd738d591</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/191a690a-838b-4867-926d-4177691cea0e.png</image:loc><image:caption>191a690a838b4867926d4177691cea0e</image:caption><image:title>191a690a838b4867926d4177691cea0e</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Logo%20Black%20on%20white%20-%201200x627.png</image:loc><image:caption>LogoBlackonwhite1200x627</image:caption><image:title>LogoBlackonwhite1200x627</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Screenshot%202025-11-06%20at%206.09.01%20pm.png</image:loc><image:caption>Screenshot20251106at60901pm</image:caption><image:title>Screenshot20251106at60901pm</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Rivanorth%20Website/Third%20Party%20Icon%203.png</image:loc><image:caption>ThirdPartyIcon3</image:caption><image:title>ThirdPartyIcon3</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Screenshot%202025-11-06%20at%206.05.57%20pm.png</image:loc><image:caption>Screenshot20251106at60557pm</image:caption><image:title>Screenshot20251106at60557pm</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20advisory%20-%20%20ISO%2027001.png</image:loc><image:caption>BlogadvisoryISO27001</image:caption><image:title>BlogadvisoryISO27001</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Investa.png</image:loc><image:caption>Investa</image:caption><image:title>Investa</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Rivanorth%20Website/eye%202.png</image:loc><image:caption>eye2</image:caption><image:title>eye2</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Rivanorth%20Website/Untitled%20design%20(3).png</image:loc><image:caption>Untitleddesign3</image:caption><image:title>Untitleddesign3</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20Global%20Ransomware%20Group.png</image:loc><image:caption>BlogDarkWebGlobalRansomwareGroup</image:caption><image:title>BlogDarkWebGlobalRansomwareGroup</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Website%20-%20Zen%20-%202026%20-%20black.png</image:loc><image:caption>WebsiteZen2026black</image:caption><image:title>WebsiteZen2026black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Website%20-%20Betts%20-%202026%20-%20black-1.png</image:loc><image:caption>WebsiteBetts2026black1</image:caption><image:title>WebsiteBetts2026black1</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Rivanorth%20Website/Third%20Party%20Icon%202.png</image:loc><image:caption>ThirdPartyIcon2</image:caption><image:title>ThirdPartyIcon2</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Website%20-%20uptick%20-%202026%20-%20black.png</image:loc><image:caption>Websiteuptick2026black</image:caption><image:title>Websiteuptick2026black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Rivanorth%20Website/3p.png</image:loc><image:caption>3p</image:caption><image:title>3p</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Rivanorth%20Website/Threat%20Intelligence%20Icon.png</image:loc><image:caption>ThreatIntelligenceIcon</image:caption><image:title>ThreatIntelligenceIcon</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Rivanorth%20Website/Compliance%20Icon.png</image:loc><image:caption>ComplianceIcon</image:caption><image:title>ComplianceIcon</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Stuff.png</image:loc><image:caption>Stuff</image:caption><image:title>Stuff</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20FTP.png</image:loc><image:caption>BlogDarkWebFTP</image:caption><image:title>BlogDarkWebFTP</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Rivanorth%20Website/Australia%20map%20(5).png</image:loc><image:caption>Australiamap5</image:caption><image:title>Australiamap5</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/compliance%20frameworks%201.png</image:loc><image:caption>complianceframeworks1</image:caption><image:title>complianceframeworks1</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><lastmod>2026-02-26</lastmod></url><url><loc>https://rivanorth.com/guides/compare</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><lastmod>2026-02-26</lastmod></url><url><loc>https://rivanorth.com/blog/cracked-and-nulled-seized</loc><lastmod>2025-11-18</lastmod></url><url><loc>https://rivanorth.com/blog/hack-platypus3</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/4372c4f8-84e8-47e1-99e9-9eea4fd688bb.png</image:loc><image:caption>4372c4f884e847e199e99eea4fd688bb</image:caption><image:title>4372c4f884e847e199e99eea4fd688bb</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/5305c307-08dd-46c4-bac0-05eca5479979.png</image:loc><image:caption>5305c30708dd46c4bac005eca5479979</image:caption><image:title>5305c30708dd46c4bac005eca5479979</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/afaa405b-2370-4cbd-a3a9-f450eab93332.png</image:loc><image:caption>afaa405b23704cbda3a9f450eab93332</image:caption><image:title>afaa405b23704cbda3a9f450eab93332</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/df8aee59-0c0e-4b46-b35c-1a18472f5f73.png</image:loc><image:caption>df8aee590c0e4b46b35c1a18472f5f73</image:caption><image:title>df8aee590c0e4b46b35c1a18472f5f73</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/blog/australia-ransomware-payment-law</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20advisory%20-%20%20ransomware%20law.png</image:loc><image:caption>Blogadvisoryransomwarelaw</image:caption><image:title>Blogadvisoryransomwarelaw</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20advisory%20-%20%20ISO%2027001.png</image:loc><image:caption>BlogadvisoryISO27001</image:caption><image:title>BlogadvisoryISO27001</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20radar.png</image:loc><image:caption>BlogDarkWebradar</image:caption><image:title>BlogDarkWebradar</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Telstra%20Hack%20Fake%20News.png</image:loc><image:caption>TelstraHackFakeNews</image:caption><image:title>TelstraHackFakeNews</image:title></image:image><lastmod>2025-06-02</lastmod></url><url><loc>https://rivanorth.com/blog/hack-explained-ronin-2024</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/6010198a-727d-428e-9d89-72e5b4b0b56e.png</image:loc><image:caption>6010198a727d428e9d8972e5b4b0b56e</image:caption><image:title>6010198a727d428e9d8972e5b4b0b56e</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/46f1026c-d16a-49b3-9211-6e447311b223.png</image:loc><image:caption>46f1026cd16a49b392116e447311b223</image:caption><image:title>46f1026cd16a49b392116e447311b223</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/ff228455-0db5-47fe-ae65-763f88132209.png</image:loc><image:caption>ff2284550db547feae65763f88132209</image:caption><image:title>ff2284550db547feae65763f88132209</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Hack%20Explained%20-%20unizen.png</image:loc><image:caption>HackExplainedunizen</image:caption><image:title>HackExplainedunizen</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/03cabae1-32e8-4958-827a-e123d395565b.png</image:loc><image:caption>03cabae132e84958827ae123d395565b</image:caption><image:title>03cabae132e84958827ae123d395565b</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/blog/secure-proxy-models-beacon-proxies</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Research%20-%20proxies.png</image:loc><image:caption>Researchproxies</image:caption><image:title>Researchproxies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/4e2a09be-99fe-4d46-a6ff-b0b570f32dd0.png</image:loc><image:caption>4e2a09be99fe4d46a6ffb0b570f32dd0</image:caption><image:title>4e2a09be99fe4d46a6ffb0b570f32dd0</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/68adc6d9-a2d8-4d72-9eae-2700faae5456.png</image:loc><image:caption>68adc6d9a2d84d729eae2700faae5456</image:caption><image:title>68adc6d9a2d84d729eae2700faae5456</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/aaf2af2f-8768-479a-b4d6-e38ba59da1cd.png</image:loc><image:caption>aaf2af2f8768479ab4d6e38ba59da1cd</image:caption><image:title>aaf2af2f8768479ab4d6e38ba59da1cd</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/b78052bd-be9d-40c8-b776-3f70bbffffc8.png</image:loc><image:caption>b78052bdbe9d40c8b7763f70bbffffc8</image:caption><image:title>b78052bdbe9d40c8b7763f70bbffffc8</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/services</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Rivanorth%20Website/Blockchain%20Icon%202.png</image:loc><image:caption>BlockchainIcon2</image:caption><image:title>BlockchainIcon2</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Rivanorth%20Website/Pentest%20Icon.png</image:loc><image:caption>PentestIcon</image:caption><image:title>PentestIcon</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Rivanorth%20Website/Cloud%20icon.png</image:loc><image:caption>Cloudicon</image:caption><image:title>Cloudicon</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Rivanorth%20Website/OSINT%201.png</image:loc><image:caption>OSINT1</image:caption><image:title>OSINT1</image:title></image:image><lastmod>2025-03-04</lastmod></url><url><loc>https://rivanorth.com/blog/coinex-hack</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/d18437f8-f3f2-4858-b345-eebf55362827.png</image:loc><image:caption>d18437f8f3f24858b345eebf55362827</image:caption><image:title>d18437f8f3f24858b345eebf55362827</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/04a68fe4-8c8d-4b2c-ae8f-8daa2b9ea368.png</image:loc><image:caption>04a68fe48c8d4b2cae8f8daa2b9ea368</image:caption><image:title>04a68fe48c8d4b2cae8f8daa2b9ea368</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/e623abcf-d50e-4917-96b6-f561e6ab128a.png</image:loc><image:caption>e623abcfd50e491796b6f561e6ab128a</image:caption><image:title>e623abcfd50e491796b6f561e6ab128a</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/47b279b6-e3f9-47db-902e-5268ee389755.png</image:loc><image:caption>47b279b6e3f947db902e5268ee389755</image:caption><image:title>47b279b6e3f947db902e5268ee389755</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/blog/hack-explained-super-sushi-samurai</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Hack%20Explained%20-%20Gamma.png</image:loc><image:caption>HackExplainedGamma</image:caption><image:title>HackExplainedGamma</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Hack%20Explained%20-%20sss.png</image:loc><image:caption>HackExplainedsss</image:caption><image:title>HackExplainedsss</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/a71e99f6-f285-49f3-b34b-ce46d7f0f487.png</image:loc><image:caption>a71e99f6f28549f3b34bce46d7f0f487</image:caption><image:title>a71e99f6f28549f3b34bce46d7f0f487</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Hack%20Explained%20-%20Pike%20.png</image:loc><image:caption>HackExplainedPike</image:caption><image:title>HackExplainedPike</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><lastmod>2025-01-09</lastmod></url><url><loc>https://rivanorth.com/blog/security-roundup-october-2024-edition</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/07405779-c398-4c8a-bd7a-ae5f6690def6.png</image:loc><image:caption>07405779c3984c8abd7aae5f6690def6</image:caption><image:title>07405779c3984c8abd7aae5f6690def6</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/3ba0f4b3-2776-4a92-9b5c-014f4ea6e371.png</image:loc><image:caption>3ba0f4b327764a929b5c014f4ea6e371</image:caption><image:title>3ba0f4b327764a929b5c014f4ea6e371</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/3d917eb8-544e-4417-ac45-290325730e36.png</image:loc><image:caption>3d917eb8544e4417ac45290325730e36</image:caption><image:title>3d917eb8544e4417ac45290325730e36</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/9ed5bad0-e2d7-465f-88cd-3d3bbf1dd656.png</image:loc><image:caption>9ed5bad0e2d7465f88cd3d3bbf1dd656</image:caption><image:title>9ed5bad0e2d7465f88cd3d3bbf1dd656</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/blog/security-roundup-july-2024-edition</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/07405779-c398-4c8a-bd7a-ae5f6690def6.png</image:loc><image:caption>07405779c3984c8abd7aae5f6690def6</image:caption><image:title>07405779c3984c8abd7aae5f6690def6</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/3ba0f4b3-2776-4a92-9b5c-014f4ea6e371.png</image:loc><image:caption>3ba0f4b327764a929b5c014f4ea6e371</image:caption><image:title>3ba0f4b327764a929b5c014f4ea6e371</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/3d917eb8-544e-4417-ac45-290325730e36.png</image:loc><image:caption>3d917eb8544e4417ac45290325730e36</image:caption><image:title>3d917eb8544e4417ac45290325730e36</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/8bb0af35-8f81-44ca-b1be-a0efd3588e1b.png</image:loc><image:caption>8bb0af358f8144cab1bea0efd3588e1b</image:caption><image:title>8bb0af358f8144cab1bea0efd3588e1b</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/blog/5-cyber-security-tools-every-business-should-be-using</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Research%20-%20proxies.png</image:loc><image:caption>Researchproxies</image:caption><image:title>Researchproxies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20advisory%20-%20%205%20cybersecurity%20tools%20every%20business%20should%20be%20using.png</image:loc><image:caption>Blogadvisory5cybersecuritytoolseverybusinessshouldbeusing</image:caption><image:title>Blogadvisory5cybersecuritytoolseverybusinessshouldbeusing</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20advisory%20-%20%20django.png</image:loc><image:caption>Blogadvisorydjango</image:caption><image:title>Blogadvisorydjango</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20advisory%20-%20%20password%20security%202025%20(1).png</image:loc><image:caption>Blogadvisorypasswordsecurity20251</image:caption><image:title>Blogadvisorypasswordsecurity20251</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><lastmod>2025-05-11</lastmod></url><url><loc>https://rivanorth.com/guides/recorded-future-alternative</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Tick%20icon.svg</image:loc><image:caption>Tickicon</image:caption><image:title>Tickicon</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/X%20icon.svg</image:loc><image:caption>Xicon</image:caption><image:title>Xicon</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/alternative%20-%20recorded%20future-1.png</image:loc><image:caption>alternativerecordedfuture1</image:caption><image:title>alternativerecordedfuture1</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/alternative%20-%20recorded%20future.png</image:loc><image:caption>alternativerecordedfuture</image:caption><image:title>alternativerecordedfuture</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><lastmod>2026-02-26</lastmod></url><url><loc>https://rivanorth.com/blog/twilio-authy-hack-mfa-disaster-recovery</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/720cb0a9-2af4-4e20-878d-d5d21af4b13e.png</image:loc><image:caption>720cb0a92af44e20878dd5d21af4b13e</image:caption><image:title>720cb0a92af44e20878dd5d21af4b13e</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/e6a37adb-8b9e-4cf8-9e93-4473d45a5920.png</image:loc><image:caption>e6a37adb8b9e4cf89e934473d45a5920</image:caption><image:title>e6a37adb8b9e4cf89e934473d45a5920</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/3aaef52c-2be1-4109-ac0f-d79d07875409.png</image:loc><image:caption>3aaef52c2be14109ac0fd79d07875409</image:caption><image:title>3aaef52c2be14109ac0fd79d07875409</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/5adbfbfe-5fc2-4368-b6be-957c0146079c.png</image:loc><image:caption>5adbfbfe5fc24368b6be957c0146079c</image:caption><image:title>5adbfbfe5fc24368b6be957c0146079c</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/blog/hack-explained-velocore</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/68adc6d9-a2d8-4d72-9eae-2700faae5456.png</image:loc><image:caption>68adc6d9a2d84d729eae2700faae5456</image:caption><image:title>68adc6d9a2d84d729eae2700faae5456</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Roundup%20-%20November%20.png</image:loc><image:caption>RoundupNovember</image:caption><image:title>RoundupNovember</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Roundup%20-%20July%20%20(2).png</image:loc><image:caption>RoundupJuly2</image:caption><image:title>RoundupJuly2</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Imported_Blog_Media/55a169f9-3649-4e4d-a004-e6e6c7bf94b2.png</image:loc><image:caption>55a169f936494e4da004e6e6c7bf94b2</image:caption><image:title>55a169f936494e4da004e6e6c7bf94b2</image:title></image:image><lastmod>2025-01-07</lastmod></url><url><loc>https://rivanorth.com/guides/dark-web-monitoring</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><lastmod>2026-02-27</lastmod></url><url><loc>https://rivanorth.com/blog/vulnerability-report-april-2025</loc><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Black.png</image:loc><image:caption>Black</image:caption><image:title>Black</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Telstra%20Hack%20Fake%20News.png</image:loc><image:caption>TelstraHackFakeNews</image:caption><image:title>TelstraHackFakeNews</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20Dark%20Web%20-%20radar.png</image:loc><image:caption>BlogDarkWebradar</image:caption><image:title>BlogDarkWebradar</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/01.svg</image:loc><image:caption>01</image:caption><image:title>01</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20advisory%20-%20%20Vulnerability%20Report%20-%202025%20-%20april.png</image:loc><image:caption>BlogadvisoryVulnerabilityReport2025april</image:caption><image:title>BlogadvisoryVulnerabilityReport2025april</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Top%20Cybersecurity%20Companies.png</image:loc><image:caption>TopCybersecurityCompanies</image:caption><image:title>TopCybersecurityCompanies</image:title></image:image><image:image><image:loc>https://47132797.fs1.hubspotusercontent-ap1.net/hubfs/47132797/Blog%20-%20advisory%20-%20%20ISO%2027001.png</image:loc><image:caption>BlogadvisoryISO27001</image:caption><image:title>BlogadvisoryISO27001</image:title></image:image><lastmod>2025-05-05</lastmod></url></urlset>