<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
  <!-- Learning Page Exercise Images -->
  <url>
    <loc>https://ransomleak.com/learning/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/exercises/phishing.svg</image:loc>
      <image:caption>Phishing email detection training exercise - Learn to identify suspicious emails</image:caption>
      <image:title>Phishing Training Exercise</image:title>
    </image:image>
    <image:image>
      <image:loc>https://ransomleak.com/exercises/ransomware.svg</image:loc>
      <image:caption>Ransomware prevention training exercise - Recognize and prevent ransomware attacks</image:caption>
      <image:title>Ransomware Prevention Exercise</image:title>
    </image:image>
    <image:image>
      <image:loc>https://ransomleak.com/exercises/social-engineering.svg</image:loc>
      <image:caption>Social engineering awareness training - Defend against manipulation tactics</image:caption>
      <image:title>Social Engineering Exercise</image:title>
    </image:image>
    <image:image>
      <image:loc>https://ransomleak.com/exercises/vishing.svg</image:loc>
      <image:caption>Voice phishing (vishing) training exercise - Identify phone-based scams</image:caption>
      <image:title>Vishing Training Exercise</image:title>
    </image:image>
    <image:image>
      <image:loc>https://ransomleak.com/exercises/smishing.svg</image:loc>
      <image:caption>SMS phishing (smishing) training exercise - Recognize text message threats</image:caption>
      <image:title>Smishing Training Exercise</image:title>
    </image:image>
    <image:image>
      <image:loc>https://ransomleak.com/exercises/business-email-compromise.svg</image:loc>
      <image:caption>Business email compromise (BEC) training - Prevent executive impersonation fraud</image:caption>
      <image:title>BEC Training Exercise</image:title>
    </image:image>
    <image:image>
      <image:loc>https://ransomleak.com/exercises/double-barrel-phishing.svg</image:loc>
      <image:caption>Double-barrel phishing training - Detect multi-stage phishing attacks</image:caption>
      <image:title>Double-Barrel Phishing Exercise</image:title>
    </image:image>
    <image:image>
      <image:loc>https://ransomleak.com/exercises/whaling-with-a-deepfake.svg</image:loc>
      <image:caption>Whaling and deepfake detection training - Protect against executive-targeted attacks</image:caption>
      <image:title>Whaling Deepfake Exercise</image:title>
    </image:image>
    <image:image>
      <image:loc>https://ransomleak.com/exercises/data-leakage.svg</image:loc>
      <image:caption>Data leakage prevention training - Secure sensitive information handling</image:caption>
      <image:title>Data Leakage Exercise</image:title>
    </image:image>
    <image:image>
      <image:loc>https://ransomleak.com/exercises/onenote-email-attack.svg</image:loc>
      <image:caption>OneNote email attack training - Detect malicious attachment threats</image:caption>
      <image:title>OneNote Attack Exercise</image:title>
    </image:image>
    <image:image>
      <image:loc>https://ransomleak.com/exercises/mgm-resorts-security-breach.svg</image:loc>
      <image:caption>MGM Resorts case study training - Learn from real-world security breaches</image:caption>
      <image:title>MGM Breach Case Study</image:title>
    </image:image>
    <image:image>
      <image:loc>https://ransomleak.com/exercises/social-media-oversharing.svg</image:loc>
      <image:caption>Social media security training - Prevent oversharing of sensitive information</image:caption>
      <image:title>Social Media Security Exercise</image:title>
    </image:image>
  </url>

  <!-- Blog Post Hero Images -->
  <url>
    <loc>https://ransomleak.com/blog/security-awareness-training-guide/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/blog/security-awareness-training-hero.svg</image:loc>
      <image:caption>Security awareness training guide - Shield representing employee cyber protection</image:caption>
      <image:title>Security Awareness Training Guide</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/free-security-awareness-training/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/blog/free-security-training-hero.svg</image:loc>
      <image:caption>Free security awareness training resources - Gift box representing free cybersecurity education</image:caption>
      <image:title>Free Security Awareness Training</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/social-engineering-attacks/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/blog/social-engineering-hero.svg</image:loc>
      <image:caption>Social engineering attacks explained - Puppet strings representing psychological manipulation tactics</image:caption>
      <image:title>Social Engineering Attacks Guide</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/phishing-simulation-training/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/blog/phishing-simulation-hero.svg</image:loc>
      <image:caption>Phishing simulation training - Email with fishing hook representing simulated phishing attacks</image:caption>
      <image:title>Phishing Simulation Training</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/knowbe4-alternatives/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/blog/knowbe4-alternatives-hero.svg</image:loc>
      <image:caption>KnowBe4 alternatives comparison - Checklist representing security awareness platform evaluation</image:caption>
      <image:title>KnowBe4 Alternatives Comparison</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/bec-training/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/blog/bec-training-hero.svg</image:loc>
      <image:caption>Business email compromise training - Email with dollar sign representing wire fraud prevention</image:caption>
      <image:title>BEC Training Guide</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/cybersecurity-awareness-exercises/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/blog/cybersecurity-exercises-hero.svg</image:loc>
      <image:caption>Cybersecurity awareness exercises - Target with cursor representing interactive security practice</image:caption>
      <image:title>Cybersecurity Awareness Exercises</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/phishing-detection/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/blog/phishing-detection-hero.svg</image:loc>
      <image:caption>Phishing detection guide - Magnifying glass over email revealing fraud indicators</image:caption>
      <image:title>Phishing Detection Guide</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/what-is-smishing-cybersecurity/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/blog/smishing-hero.svg</image:loc>
      <image:caption>Smishing attacks explained - Smartphone with malicious SMS message</image:caption>
      <image:title>What is Smishing in Cybersecurity</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/what-is-whaling-cybersecurity/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/blog/whaling-hero.svg</image:loc>
      <image:caption>Whaling attacks explained - Executive with crown representing high-value targets</image:caption>
      <image:title>What is Whaling in Cybersecurity</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/vishing-awareness/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/blog/vishing-hero.svg</image:loc>
      <image:caption>Vishing attacks explained - Phone with voice waves representing deceptive voice phishing calls</image:caption>
      <image:title>Vishing Awareness Guide</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/scorm-security-training/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/blog/scorm-training-hero.svg</image:loc>
      <image:caption>SCORM security training - Puzzle pieces representing LMS integration</image:caption>
      <image:title>SCORM Security Training Guide</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/human-firewall-training/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/blog/human-firewall-hero.svg</image:loc>
      <image:caption>Human firewall training - Employees forming a protective shield against cyber threats</image:caption>
      <image:title>Building a Human Firewall Guide</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/email-security-training/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/blog/email-security-training-hero.svg</image:loc>
      <image:caption>Email security training - Protected envelope with shield representing secure email practices</image:caption>
      <image:title>Email Security Training Guide</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/mobile-security-training/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/blog/mobile-security-training-hero.svg</image:loc>
      <image:caption>Mobile security training - Smartphone with protective shield against mobile cyber threats</image:caption>
      <image:title>Mobile Security Training Guide</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/compliance-training/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/blog/compliance-training-hero.svg</image:loc>
      <image:caption>Compliance training - Security shield with checklist representing HIPAA, PCI DSS, SOC 2, GDPR compliance</image:caption>
      <image:title>Compliance Training for Regulated Industries</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/open-source-lms-security-training/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/blog/scorm-training-hero.svg</image:loc>
      <image:caption>Open source LMS platforms for SCORM security awareness training comparison</image:caption>
      <image:title>Open Source LMS for SCORM Training</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/clawdbot-security-risks/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/blog/clawdbot-security-hero.svg</image:loc>
      <image:caption>Clawdbot (Moltbot) security risks - lobster mascot with sensitive files and infostealer warning</image:caption>
      <image:title>Clawdbot Security Risks</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/security-awareness-training-effectiveness/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/blog/security-awareness-training-hero.svg</image:loc>
      <image:caption>Security awareness training effectiveness - chart showing improvement metrics and ROI research</image:caption>
      <image:title>Security Awareness Training Effectiveness</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/cyber-security-activities-for-employees/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/blog/cybersecurity-exercises-hero.svg</image:loc>
      <image:caption>Cyber security activities for employees - team collaboration on interactive security challenges</image:caption>
      <image:title>Cyber Security Activities for Employees</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/ai-coding-assistant-security-risks/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/blog/ai-coding-assistant-security-hero.svg</image:loc>
      <image:caption>AI coding assistant security risks - code editor with prompt injection attack visualization</image:caption>
      <image:title>AI Coding Assistant Security Risks</image:title>
    </image:image>
  </url>
</urlset>
