<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://deceptiq.com</loc>
<lastmod>2026-04-03T17:52:08.222Z</lastmod>
<changefreq>weekly</changefreq>
<priority>1</priority>
</url>
<url>
<loc>https://deceptiq.com/pricing</loc>
<lastmod>2026-04-03T17:52:08.222Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://deceptiq.com/blog</loc>
<lastmod>2026-04-03T17:52:08.222Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deceptiq.com/about-us</loc>
<lastmod>2026-04-03T17:52:08.222Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://deceptiq.com/contact-us</loc>
<lastmod>2026-04-03T17:52:08.222Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://deceptiq.com/privacy</loc>
<lastmod>2026-04-03T17:52:08.222Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.3</priority>
</url>
<url>
<loc>https://deceptiq.com/resources/cyber-deception</loc>
<lastmod>2026-04-03T17:52:08.222Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deceptiq.com/resources/honey-tokens</loc>
<lastmod>2026-04-03T17:52:08.222Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://starter.deceptiq.com</loc>
<lastmod>2026-04-03T17:52:08.222Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://deceptiq.com/blog/aws-honey-tokens-good-bad-ugly</loc>
<lastmod>2026-01-03T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://deceptiq.com/blog/rise-of-read-teaming</loc>
<lastmod>2025-06-07T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://deceptiq.com/blog/deception-fundamentals</loc>
<lastmod>2026-01-03T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://deceptiq.com/blog/cyber-deception-maturity-model</loc>
<lastmod>2026-01-03T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://deceptiq.com/blog/threat-intelligence-cyber-deception-guide</loc>
<lastmod>2025-07-04T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://deceptiq.com/blog/understanding-your-adversary-cyber-deception</loc>
<lastmod>2026-01-03T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://deceptiq.com/blog/from-phish-to-package-npm-supply-chain-attacks</loc>
<lastmod>2025-07-20T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://deceptiq.com/blog/launch</loc>
<lastmod>2025-11-10T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://deceptiq.com/blog/early-warning-honey-tokens</loc>
<lastmod>2026-01-03T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://deceptiq.com/blog/ai-orchestrated-attacks-honey-tokens</loc>
<lastmod>2026-01-03T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://deceptiq.com/blog/eventbridge-pattern-matching-guide</loc>
<lastmod>2026-01-03T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://deceptiq.com/blog/early-warning-detection-credential-theft</loc>
<lastmod>2025-11-18T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://deceptiq.com/blog/psychology-effective-honey-tokens</loc>
<lastmod>2026-01-03T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://deceptiq.com/blog/processing-cloudtrail-logs-s3</loc>
<lastmod>2026-01-03T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://deceptiq.com/blog/field-notes-on-malware</loc>
<lastmod>2026-01-03T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://deceptiq.com/blog/macos-stealers-technical-analysis</loc>
<lastmod>2025-12-02T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://deceptiq.com/blog/windows-stealers-technical-analysis</loc>
<lastmod>2026-01-03T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://deceptiq.com/blog/detecting-unauth-aws-osint</loc>
<lastmod>2026-01-03T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://deceptiq.com/blog/deception-taxonomy</loc>
<lastmod>2025-12-16T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://deceptiq.com/blog/post-compromise-gap</loc>
<lastmod>2025-12-17T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://deceptiq.com/blog/the-reflexive-game-deception</loc>
<lastmod>2026-01-03T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://deceptiq.com/blog/ntuser-man-registry-persistence</loc>
<lastmod>2026-01-03T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://deceptiq.com/blog/getting-started-early-warning-honey-tokens</loc>
<lastmod>2025-12-28T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://deceptiq.com/blog/pre-emptive-detection-without-prediction</loc>
<lastmod>2026-01-03T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://deceptiq.com/blog/whats-in-a-good-honeytoken</loc>
<lastmod>2026-01-06T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
</urlset>
