<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
  <url>
    <loc>https://ransomleak.com/learning/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/exercises/phishing.svg</image:loc>
      <image:caption>Spot a phishing email before you click.</image:caption>
      <image:title>Phishing Exercise</image:title>
    </image:image>
    <image:image>
      <image:loc>https://ransomleak.com/exercises/vishing.svg</image:loc>
      <image:caption>Handle a realistic voice phishing call.</image:caption>
      <image:title>Vishing Exercise</image:title>
    </image:image>
    <image:image>
      <image:loc>https://ransomleak.com/exercises/smishing.svg</image:loc>
      <image:caption>Detect fraud hiding in your text messages.</image:caption>
      <image:title>Smishing Exercise</image:title>
    </image:image>
    <image:image>
      <image:loc>https://ransomleak.com/exercises/double-barrel-phishing.svg</image:loc>
      <image:caption>Recognize the two-email trust trap.</image:caption>
      <image:title>Double Barrel Phishing Exercise</image:title>
    </image:image>
    <image:image>
      <image:loc>https://ransomleak.com/exercises/business-email-compromise.svg</image:loc>
      <image:caption>Stop a CEO impersonation wire fraud.</image:caption>
      <image:title>Business Email Compromise Exercise</image:title>
    </image:image>
    <image:image>
      <image:loc>https://ransomleak.com/exercises/social-engineering.svg</image:loc>
      <image:caption>Recognize manipulation before you comply.</image:caption>
      <image:title>Social Engineering Exercise</image:title>
    </image:image>
    <image:image>
      <image:loc>https://ransomleak.com/exercises/whaling-with-a-deepfake.svg</image:loc>
      <image:caption>Spot an AI-generated executive on a video call.</image:caption>
      <image:title>Whaling With A Deepfake Exercise</image:title>
    </image:image>
    <image:image>
      <image:loc>https://ransomleak.com/exercises/ransomware.svg</image:loc>
      <image:caption>Survive a ransomware attack in real time.</image:caption>
      <image:title>Ransomware Exercise</image:title>
    </image:image>
    <image:image>
      <image:loc>https://ransomleak.com/exercises/social-media-oversharing.svg</image:loc>
      <image:caption>See how attackers exploit your public profiles.</image:caption>
      <image:title>Social Media Oversharing Exercise</image:title>
    </image:image>
    <image:image>
      <image:loc>https://ransomleak.com/exercises/data-leakage.svg</image:loc>
      <image:caption>Stop sensitive data from leaving your org.</image:caption>
      <image:title>Data Leakage Exercise</image:title>
    </image:image>
    <image:image>
      <image:loc>https://ransomleak.com/exercises/onenote-email-attack.svg</image:loc>
      <image:caption>Trace a real BEC scam built on weeks of inbox surveillance.</image:caption>
      <image:title>OneNote Email Attack Exercise</image:title>
    </image:image>
    <image:image>
      <image:loc>https://ransomleak.com/exercises/mgm-resorts-security-breach.svg</image:loc>
      <image:caption>Relive the 10-minute helpdesk call that cost $100M.</image:caption>
      <image:title>MGM Resorts Breach Exercise</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/uk/learning/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/exercises/phishing.svg</image:loc>
      <image:caption>Розпізнайте фішинговий лист до того, як натиснете.</image:caption>
      <image:title>Фішинг Exercise</image:title>
    </image:image>
    <image:image>
      <image:loc>https://ransomleak.com/exercises/vishing.svg</image:loc>
      <image:caption>Розпізнайте реалістичний голосовий фішинговий дзвінок.</image:caption>
      <image:title>Вішинг Exercise</image:title>
    </image:image>
    <image:image>
      <image:loc>https://ransomleak.com/exercises/smishing.svg</image:loc>
      <image:caption>Виявіть шахрайство у ваших текстових повідомленнях.</image:caption>
      <image:title>Смішинг Exercise</image:title>
    </image:image>
    <image:image>
      <image:loc>https://ransomleak.com/exercises/double-barrel-phishing.svg</image:loc>
      <image:caption>Не дайте себе обдурити двом листам, що працюють в парі.</image:caption>
      <image:title>Подвійний фішинг Exercise</image:title>
    </image:image>
    <image:image>
      <image:loc>https://ransomleak.com/exercises/business-email-compromise.svg</image:loc>
      <image:caption>Зупиніть підроблений запит на переказ коштів від керівника.</image:caption>
      <image:title>Компрометація ділової пошти Exercise</image:title>
    </image:image>
    <image:image>
      <image:loc>https://ransomleak.com/exercises/social-engineering.svg</image:loc>
      <image:caption>Розпізнайте психологічні маніпуляції, що обходять технічний захист.</image:caption>
      <image:title>Соціальна інженерія Exercise</image:title>
    </image:image>
    <image:image>
      <image:loc>https://ransomleak.com/exercises/whaling-with-a-deepfake.svg</image:loc>
      <image:caption>Виявіть дипфейк-відеодзвінок від підробленого керівника.</image:caption>
      <image:title>Вейлінг із дипфейком Exercise</image:title>
    </image:image>
    <image:image>
      <image:loc>https://ransomleak.com/exercises/ransomware.svg</image:loc>
      <image:caption>Переживіть атаку програми-вимагача в реальному часі.</image:caption>
      <image:title>Програми-вимагачі Exercise</image:title>
    </image:image>
    <image:image>
      <image:loc>https://ransomleak.com/exercises/social-media-oversharing.svg</image:loc>
      <image:caption>Зрозумійте, скільки про вас можна дізнатися з ваших профілів.</image:caption>
      <image:title>Надмірне розкриття у соціальних мережах Exercise</image:title>
    </image:image>
    <image:image>
      <image:loc>https://ransomleak.com/exercises/data-leakage.svg</image:loc>
      <image:caption>Запобігайте ненавмисному витоку конфіденційної інформації.</image:caption>
      <image:title>Витік даних Exercise</image:title>
    </image:image>
    <image:image>
      <image:loc>https://ransomleak.com/exercises/onenote-email-attack.svg</image:loc>
      <image:caption>Відслідкуйте реальне BEC-шахрайство, побудоване на тижнях стеження за поштовою скринькою.</image:caption>
      <image:title>Атака через OneNote Email Exercise</image:title>
    </image:image>
    <image:image>
      <image:loc>https://ransomleak.com/exercises/mgm-resorts-security-breach.svg</image:loc>
      <image:caption>Переживіть 10-хвилинний дзвінок у службу підтримки, що коштував $100 млн.</image:caption>
      <image:title>Злам MGM Resorts Exercise</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/ai-coding-assistant-security-risks/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/ai-coding-assistant-security-hero.CKqUwFWN.svg</image:loc>
      <image:caption>AI coding assistant security risks - code editor with prompt injection attack visualization</image:caption>
      <image:title>AI Coding Assistant Security Risks You Can&apos;t Ignore</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/ai-data-leakage-employees/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/ai-data-leakage-hero.CM45TRrh.svg</image:loc>
      <image:caption>AI data leakage illustration - employee pasting confidential code into a chatbot window with data flowing to external servers</image:caption>
      <image:title>AI Data Leakage: How Employees Expose Secrets to ChatGPT, Claude, and Copilot</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/ai-deepfake-detection-realtime/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/ai-deepfake-detection-hero.Dij3zgwe.svg</image:loc>
      <image:caption>Split-screen video call showing a real person and a deepfake impersonator with detection overlay flagging synthetic regions</image:caption>
      <image:title>Can AI Detect Deepfake Video Calls in Real Time?</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/ai-powered-phishing/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/ai-powered-phishing-hero.BM3ksxsH.svg</image:loc>
      <image:caption>AI-powered phishing - LLM neural network generating targeted phishing emails to multiple victims</image:caption>
      <image:title>AI-Powered Phishing: How LLMs Help Attackers Write Better Lures</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/barrel-phishing/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/barrel-phishing-hero.CdWCimHi.svg</image:loc>
      <image:caption>Barrel phishing attack - two-stage email sequence with trust-building message followed by malicious payload</image:caption>
      <image:title>Barrel Phishing vs Phishing: How Two-Stage Attacks Work</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/bec-training/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/bec-training-hero.B1X07pSO.svg</image:loc>
      <image:caption>Business email compromise training - email with dollar sign representing wire fraud</image:caption>
      <image:title>BEC Training: Stop Business Email Compromise</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/browser-security-training/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/browser-security-training-hero.lLxqBN6O.svg</image:loc>
      <image:caption>Browser security training - browser window with protective shield against web-based cyber threats</image:caption>
      <image:title>Browser Security Training: What Employees Actually Need to Know</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/callback-phishing/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/callback-phishing-hero.C4KASgci.svg</image:loc>
      <image:caption>Callback phishing attack flow showing a fake invoice email leading to a phone call and remote access compromise</image:caption>
      <image:title>Callback Phishing (TOAD): No Links, All Danger</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/clawdbot-security-risks/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/clawdbot-security-hero.CbxImT03.svg</image:loc>
      <image:caption>Clawdbot (Moltbot) security risks - lobster mascot with sensitive files and infostealer warning</image:caption>
      <image:title>Clawdbot (Moltbot) Security Risks: What to Know</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/collaboration-tool-security/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/collaboration-tool-security-hero.BE2tHLMT.svg</image:loc>
      <image:caption>A chat message bubble containing a database password, surrounded by open integrations and disconnected user avatars with warning indicators</image:caption>
      <image:title>Collaboration Tool Security: Hidden Risks in Slack, Teams, and Chat Platforms</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/compliance-training/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/compliance-training-hero.STl-PqJb.svg</image:loc>
      <image:caption>Compliance training - security shield with checkmarks representing regulatory compliance</image:caption>
      <image:title>Compliance Training That Passes Audits and Engages Staff</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/credential-stuffing-awareness/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/credential-stuffing-hero.DthWhrV8.svg</image:loc>
      <image:caption>Credential stuffing attack visualization showing a breached database, an automated bot, and multiple login forms being tested</image:caption>
      <image:title>Credential Stuffing: How Leaked Passwords Work</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/cyber-helmets-ransomleak-partnership/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/cyber-helmets-partnership-hero.D4pp_hwY.jpg</image:loc>
      <image:caption>Cyber Helmets and RansomLeak partnership announcement with both company logos</image:caption>
      <image:title>RansomLeak Partners with Cyber Helmets for Threat Intelligence-Driven Training</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/cyber-security-activities-for-employees/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/cybersecurity-exercises-hero.iqPdSt4d.svg</image:loc>
      <image:caption>Cyber security activities for employees - team collaboration on security challenges</image:caption>
      <image:title>15 Cyber Security Activities for Employees (That Don&apos;t Suck)</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/cybersecurity-awareness-exercises/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/cybersecurity-exercises-hero.iqPdSt4d.svg</image:loc>
      <image:caption>Cybersecurity awareness exercises - target with cursor representing interactive practice</image:caption>
      <image:title>12 Common Cybersecurity Training Exercises (Free to Try)</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/data-classification-training/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/data-classification-training-hero.Da5xB3Is.svg</image:loc>
      <image:caption>Four data classification folders arranged by sensitivity level from public to restricted, each with progressively stronger lock symbols</image:caption>
      <image:title>Data Classification Training for Employees</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/deepfake-social-engineering/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/deepfake-social-engineering-hero.kw--PViq.svg</image:loc>
      <image:caption>Deepfake social engineering - split view comparing a real person and their AI-generated deepfake clone</image:caption>
      <image:title>Deepfake Social Engineering: When You Can&apos;t Trust Your Own Eyes</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/email-security-training/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/email-security-training-hero.CvzNxV75.svg</image:loc>
      <image:caption>Email security training - protected envelope with shield representing secure email practices</image:caption>
      <image:title>Email Security Training: What Works and What Doesn&apos;t</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/free-security-awareness-training/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/free-security-training-hero.C-YOem7T.svg</image:loc>
      <image:caption>Free security awareness training - gift box representing free resources</image:caption>
      <image:title>Free Security Awareness Training That Works (2026)</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/gdpr-employee-training/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/gdpr-employee-training-hero.YAmRH67u.svg</image:loc>
      <image:caption>GDPR employee training - compliance document with interactive training scenarios</image:caption>
      <image:title>GDPR Training for Employees: Beyond the Annual Checkbox</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/human-firewall-training/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/human-firewall-hero.Dx5i81iX.svg</image:loc>
      <image:caption>Human firewall - employees forming a protective shield against cyber threats</image:caption>
      <image:title>Human Firewall Training: Employees as Cyber Defense</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/insider-threat-training/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/insider-threat-hero.BXPyp1JF.svg</image:loc>
      <image:caption>Insider threat visualization showing an authorized employee with access badge alongside a data exfiltration timeline</image:caption>
      <image:title>Insider Threat Awareness Training for Employees</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/is-scorm-still-relevant/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/scorm-relevance-hero.BHO3dMKq.svg</image:loc>
      <image:caption>SCORM standard timeline from 2000 to 2026 showing continued enterprise LMS dominance despite newer standards</image:caption>
      <image:title>Is SCORM Still Relevant in 2026?</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/iso-27001-awareness-training/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/iso-27001-awareness-training-hero.DFaFUfV0.svg</image:loc>
      <image:caption>ISO 27001 awareness training diagram showing an ISMS policy document beside an audit readiness checklist.</image:caption>
      <image:title>ISO 27001 Awareness Training for Employees</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/knowbe4-alternatives/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/knowbe4-alternatives-hero.CTP_i-OK.svg</image:loc>
      <image:caption>KnowBe4 alternatives comparison - checklist representing platform evaluation</image:caption>
      <image:title>KnowBe4 Alternatives: 6 Platforms Compared (2026)</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/mobile-security-training/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/mobile-security-training-hero.B9HcH6yj.svg</image:loc>
      <image:caption>Mobile security training - smartphone with protective shield against mobile cyber threats</image:caption>
      <image:title>Mobile Security Training for the Remote Workforce</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/open-source-lms-security-training/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/scorm-training-hero.C8x7gl98.svg</image:loc>
      <image:caption>Open source LMS platforms for security awareness training comparison</image:caption>
      <image:title>Open Source LMS for SCORM Training: 5 Platforms Compared</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/owasp-agentic-ai-top-10/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/owasp-agentic-ai-hero.CfZFhDnN.svg</image:loc>
      <image:caption>OWASP Agentic AI Top 10 - interconnected AI agents with cascading failure visualization</image:caption>
      <image:title>OWASP Agentic AI Top 10: Security Risks When AI Acts on Its Own</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/owasp-agentic-top-10-training-course/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/owasp-agentic-training-course-hero.ZikY5HgS.svg</image:loc>
      <image:caption>OWASP Top 10 for Agentic Applications training course - terminal showing all 10 exercises live with checkmarks</image:caption>
      <image:title>OWASP Top 10 for Agentic Applications: 10 free training exercises now live</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/owasp-llm-top-10-training-course/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/owasp-llm-training-course-hero.C7as6DWw.svg</image:loc>
      <image:caption>OWASP Top 10 for LLM Applications training course - terminal showing all 10 exercises live with checkmarks</image:caption>
      <image:title>OWASP Top 10 for LLM Applications: 10 free training exercises now live</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/owasp-llm-top-10/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/owasp-llm-top-10-hero.Y0tqYKXT.svg</image:loc>
      <image:caption>OWASP Top 10 for LLM Applications - neural network with vulnerability categories</image:caption>
      <image:title>OWASP Top 10 for LLM Applications: What Security Teams Get Wrong</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/password-security-training/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/password-security-training-hero.CZ5RoBWy.svg</image:loc>
      <image:caption>Password security progression from a broken lock with weak passwords through a vault representing a password manager to an MFA shield with a one-time code</image:caption>
      <image:title>Password Security Training That Changes Behavior</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/phishing-detection/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/phishing-detection-hero.BdHHU1I8.svg</image:loc>
      <image:caption>Phishing detection - magnifying glass over email revealing fraud</image:caption>
      <image:title>How to Spot Phishing: Visual and Technical Signs of Fraud</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/phishing-simulation-training/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/phishing-simulation-hero.C_YPF1ii.svg</image:loc>
      <image:caption>Phishing simulation training - email with fishing hook representing simulated attacks</image:caption>
      <image:title>Phishing Simulation Training That Reduces Click Rates</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/quishing/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/quishing-hero.CBWYlNf-.svg</image:loc>
      <image:caption>Quishing attack flow showing a malicious QR code being scanned by a phone and redirecting to a fake login page for credential harvesting</image:caption>
      <image:title>Quishing: How QR Code Phishing Bypasses Your Email Filters</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/ransomleak-vs-hoxhunt/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/ransomleak-vs-hoxhunt-hero.C9hfw_uI.svg</image:loc>
      <image:caption>Side-by-side comparison of RansomLeak interactive 3D simulations versus Hoxhunt AI-adaptive phishing platform</image:caption>
      <image:title>RansomLeak vs Hoxhunt: Security Awareness Training Compared (2026)</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/ransomleak-vs-knowbe4/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/ransomleak-vs-knowbe4-hero.B17sgwKL.svg</image:loc>
      <image:caption>Side-by-side comparison of RansomLeak interactive 3D simulations versus KnowBe4 video content library for security awareness training</image:caption>
      <image:title>RansomLeak vs KnowBe4: Security Awareness Training Compared (2026)</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/ransomleak-vs-ninjio/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/ransomleak-vs-ninjio-hero.z356ffcQ.svg</image:loc>
      <image:caption>Side-by-side comparison of RansomLeak interactive 3D simulations versus Ninjio Hollywood micro-learning video content</image:caption>
      <image:title>RansomLeak vs Ninjio: Security Awareness Training Compared (2026)</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/ransomleak-vs-phished/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/ransomleak-vs-phished-hero.A6LrPus_.svg</image:loc>
      <image:caption>Side-by-side comparison of RansomLeak interactive 3D simulations versus Phished AI-automated phishing platform</image:caption>
      <image:title>RansomLeak vs Phished: Security Awareness Training Compared (2026)</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/ransomleak-vs-proofpoint/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/ransomleak-vs-proofpoint-hero.Bf4Lb6cy.svg</image:loc>
      <image:caption>Side-by-side comparison of RansomLeak interactive 3D simulations versus Proofpoint email security suite training</image:caption>
      <image:title>RansomLeak vs Proofpoint: Security Awareness Training Compared (2026)</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/ransomleak-vs-usecure/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/ransomleak-vs-usecure-hero.B5NaoODp.svg</image:loc>
      <image:caption>Side-by-side comparison of RansomLeak interactive 3D simulations versus Usecure MSP-focused automated security awareness</image:caption>
      <image:title>RansomLeak vs Usecure: Security Awareness Training Compared (2026)</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/ransomware-awareness-training/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/ransomware-awareness-hero.C0L2B9EO.svg</image:loc>
      <image:caption>Ransomware attack visualization showing encrypted files, a locked padlock, and a ransom note countdown timer</image:caption>
      <image:title>Ransomware Awareness Training for Employees</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/scorm-security-training/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/scorm-training-hero.C8x7gl98.svg</image:loc>
      <image:caption>SCORM security training - puzzle pieces representing LMS integration</image:caption>
      <image:title>SCORM Security Awareness Training: LMS Setup Guide</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/security-awareness-training-effectiveness/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/security-awareness-training-hero.AxN_MsnB.svg</image:loc>
      <image:caption>Security awareness training effectiveness - chart showing improvement metrics</image:caption>
      <image:title>Does Security Awareness Training Work? The ROI Research</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/security-awareness-training-guide/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/security-awareness-training-hero.AxN_MsnB.svg</image:loc>
      <image:caption>Security awareness training - shield with checkmark representing employee protection</image:caption>
      <image:title>Security Awareness Training: Complete Guide for 2026</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/shadow-it-security-risks/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/shadow-it-security-hero.Bnh2XCp-.svg</image:loc>
      <image:caption>Shadow IT security risks - unauthorized cloud apps orbiting a corporate server, connected by warning-flagged data flows</image:caption>
      <image:title>Shadow IT: The Security Risks Hiding in Your SaaS Stack</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/social-engineering-attacks/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/social-engineering-hero.BVC4Agmv.svg</image:loc>
      <image:caption>Social engineering attacks - puppet strings representing psychological manipulation</image:caption>
      <image:title>Social Engineering Attacks: Exploiting Human Psychology</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/typosquatting-awareness/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/typosquatting-hero.C8MEeYW2.svg</image:loc>
      <image:caption>Comparison of a legitimate URL and a typosquatted URL showing how replacing the letter m with rn creates a convincing lookalike domain</image:caption>
      <image:title>Typosquatting: When One Wrong Letter Hands Over Your Credentials</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/vishing-awareness/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/vishing-hero.CYSua__w.svg</image:loc>
      <image:caption>Vishing attacks - phone with voice waves representing deceptive calls</image:caption>
      <image:title>Vishing Attacks: How Voice Phishing Works and Why It Wins</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/what-is-smishing-cybersecurity/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/smishing-hero.DZ3rZnMB.svg</image:loc>
      <image:caption>Smishing attacks - smartphone with malicious SMS message</image:caption>
      <image:title>Smishing Attacks: How SMS Phishing Works and How to Stop It</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/blog/what-is-whaling-cybersecurity/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/whaling-hero.Dup0lLEm.svg</image:loc>
      <image:caption>Whaling attacks - executive with crown representing high-value targets</image:caption>
      <image:title>Whaling Attacks: Why Executives Are Prime Targets</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/uk/blog/ai-coding-assistant-security-risks/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/ai-coding-assistant-security-hero.CKqUwFWN.svg</image:loc>
      <image:caption>AI coding assistant security risks - code editor with prompt injection attack visualization</image:caption>
      <image:title>Ризики безпеки AI-асистентів для програмування, які не можна ігнорувати</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/uk/blog/ai-powered-phishing/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/ai-powered-phishing-hero.BM3ksxsH.svg</image:loc>
      <image:caption>AI-powered phishing - LLM neural network generating targeted phishing emails to multiple victims</image:caption>
      <image:title>AI-фішинг: як LLM допомагають зловмисникам писати кращі приманки</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/uk/blog/barrel-phishing/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/barrel-phishing-hero.CdWCimHi.svg</image:loc>
      <image:caption>Barrel phishing attack - two-stage email sequence with trust-building message followed by malicious payload</image:caption>
      <image:title>Бочковий фішинг проти фішингу: як працюють двоетапні атаки</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/uk/blog/bec-training/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/bec-training-hero.B1X07pSO.svg</image:loc>
      <image:caption>Business email compromise training - email with dollar sign representing wire fraud</image:caption>
      <image:title>Навчання з BEC: зупиніть компрометацію бізнес-пошти</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/uk/blog/browser-security-training/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/browser-security-training-hero.lLxqBN6O.svg</image:loc>
      <image:caption>Browser security training - browser window with protective shield against web-based cyber threats</image:caption>
      <image:title>Навчання з безпеки браузера: що співробітники дійсно повинні знати</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/uk/blog/callback-phishing/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/callback-phishing-hero.C4KASgci.svg</image:loc>
      <image:caption>Callback phishing attack flow showing a fake invoice email leading to a phone call and remote access compromise</image:caption>
      <image:title>Зворотний фішинг (TOAD): без посилань, але повна небезпека</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/uk/blog/clawdbot-security-risks/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/clawdbot-security-hero.CbxImT03.svg</image:loc>
      <image:caption>Clawdbot (Moltbot) security risks - lobster mascot with sensitive files and infostealer warning</image:caption>
      <image:title>Ризики безпеки Clawdbot (Moltbot): що потрібно знати</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/uk/blog/collaboration-tool-security/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/collaboration-tool-security-hero.BE2tHLMT.svg</image:loc>
      <image:caption>A chat message bubble containing a database password, surrounded by open integrations and disconnected user avatars with warning indicators</image:caption>
      <image:title>Безпека інструментів співпраці: приховані ризики в Slack, Teams та чат-платформах</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/uk/blog/compliance-training/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/compliance-training-hero.STl-PqJb.svg</image:loc>
      <image:caption>Compliance training - security shield with checkmarks representing regulatory compliance</image:caption>
      <image:title>Навчання з комплаєнсу, яке проходить аудити та залучає персонал</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/uk/blog/credential-stuffing-awareness/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/credential-stuffing-hero.DthWhrV8.svg</image:loc>
      <image:caption>Credential stuffing attack visualization showing a breached database, an automated bot, and multiple login forms being tested</image:caption>
      <image:title>Credential Stuffing: як працюють витоки паролів</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/uk/blog/cyber-helmets-ransomleak-partnership/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/cyber-helmets-partnership-hero.D4pp_hwY.jpg</image:loc>
      <image:caption>Cyber Helmets and RansomLeak partnership announcement with both company logos</image:caption>
      <image:title>RansomLeak та Cyber Helmets: партнерство для навчання на основі розвідки загроз</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/uk/blog/cyber-security-activities-for-employees/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/cybersecurity-exercises-hero.iqPdSt4d.svg</image:loc>
      <image:caption>Cyber security activities for employees - team collaboration on security challenges</image:caption>
      <image:title>15 активностей з кібербезпеки для співробітників (які не нудні)</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/uk/blog/cybersecurity-awareness-exercises/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/cybersecurity-exercises-hero.iqPdSt4d.svg</image:loc>
      <image:caption>Cybersecurity awareness exercises - target with cursor representing interactive practice</image:caption>
      <image:title>12 поширених вправ з кібербезпеки (спробуйте безкоштовно)</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/uk/blog/data-classification-training/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/data-classification-training-hero.Da5xB3Is.svg</image:loc>
      <image:caption>Four data classification folders arranged by sensitivity level from public to restricted, each with progressively stronger lock symbols</image:caption>
      <image:title>Навчання з класифікації даних для співробітників</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/uk/blog/deepfake-social-engineering/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/deepfake-social-engineering-hero.kw--PViq.svg</image:loc>
      <image:caption>Deepfake social engineering - split view comparing a real person and their AI-generated deepfake clone</image:caption>
      <image:title>Deepfake соціальна інженерія: коли ви не можете довіряти власним очам</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/uk/blog/email-security-training/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/email-security-training-hero.CvzNxV75.svg</image:loc>
      <image:caption>Email security training - protected envelope with shield representing secure email practices</image:caption>
      <image:title>Навчання з безпеки електронної пошти: що працює, а що ні</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/uk/blog/free-security-awareness-training/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/free-security-training-hero.C-YOem7T.svg</image:loc>
      <image:caption>Free security awareness training - gift box representing free resources</image:caption>
      <image:title>Безкоштовне навчання з кібербезпекової обізнаності, що працює (2026)</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/uk/blog/gdpr-employee-training/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/gdpr-employee-training-hero.YAmRH67u.svg</image:loc>
      <image:caption>GDPR employee training - compliance document with interactive training scenarios</image:caption>
      <image:title>Навчання GDPR для працівників: за межами щорічної галочки</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/uk/blog/human-firewall-training/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/human-firewall-hero.Dx5i81iX.svg</image:loc>
      <image:caption>Human firewall - employees forming a protective shield against cyber threats</image:caption>
      <image:title>Навчання людського файрвола: працівники як кіберзахист</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/uk/blog/insider-threat-training/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/insider-threat-hero.BXPyp1JF.svg</image:loc>
      <image:caption>Insider threat visualization showing an authorized employee with access badge alongside a data exfiltration timeline</image:caption>
      <image:title>Навчання обізнаності щодо внутрішніх загроз для працівників</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/uk/blog/iso-27001-awareness-training/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/iso-27001-awareness-training-hero.DFaFUfV0.svg</image:loc>
      <image:caption>Схема навчання з обізнаності ISO 27001: документ політики СМІБ поруч із чек-лістом готовності до аудиту.</image:caption>
      <image:title>Навчання з обізнаності ISO 27001 для співробітників</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/uk/blog/knowbe4-alternatives/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/knowbe4-alternatives-hero.CTP_i-OK.svg</image:loc>
      <image:caption>KnowBe4 alternatives comparison - checklist representing platform evaluation</image:caption>
      <image:title>Альтернативи KnowBe4: 6 платформ у порівнянні (2026)</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/uk/blog/mobile-security-training/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/mobile-security-training-hero.B9HcH6yj.svg</image:loc>
      <image:caption>Mobile security training - smartphone with protective shield against mobile cyber threats</image:caption>
      <image:title>Навчання мобільної безпеки для віддаленої робочої сили</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/uk/blog/open-source-lms-security-training/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/scorm-training-hero.C8x7gl98.svg</image:loc>
      <image:caption>Open source LMS platforms for security awareness training comparison</image:caption>
      <image:title>LMS з відкритим кодом для SCORM-навчання: 5 платформ у порівнянні</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/uk/blog/owasp-agentic-ai-top-10/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/owasp-agentic-ai-hero.CfZFhDnN.svg</image:loc>
      <image:caption>OWASP Agentic AI Top 10 - interconnected AI agents with cascading failure visualization</image:caption>
      <image:title>OWASP Agentic AI Top 10: ризики безпеки, коли AI діє самостійно</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/uk/blog/owasp-agentic-top-10-training-course/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/owasp-agentic-training-course-hero.ZikY5HgS.svg</image:loc>
      <image:caption>OWASP Top 10 for Agentic Applications training course - terminal showing all 10 exercises live with checkmarks</image:caption>
      <image:title>OWASP Top 10 для Agentic Applications: 10 безкоштовних навчальних вправ вже доступні</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/uk/blog/owasp-llm-top-10-training-course/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/owasp-llm-training-course-hero.C7as6DWw.svg</image:loc>
      <image:caption>OWASP Top 10 for LLM Applications training course - terminal showing all 10 exercises live with checkmarks</image:caption>
      <image:title>OWASP Top 10 для LLM Applications: 10 безкоштовних навчальних вправ вже доступні</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/uk/blog/owasp-llm-top-10/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/owasp-llm-top-10-hero.Y0tqYKXT.svg</image:loc>
      <image:caption>OWASP Top 10 for LLM Applications - neural network with vulnerability categories</image:caption>
      <image:title>OWASP Top 10 для LLM Applications: що команди безпеки роблять неправильно</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/uk/blog/password-security-training/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/password-security-training-hero.CZ5RoBWy.svg</image:loc>
      <image:caption>Password security progression from a broken lock with weak passwords through a vault representing a password manager to an MFA shield with a one-time code</image:caption>
      <image:title>Навчання безпеки паролів, що змінює поведінку</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/uk/blog/phishing-detection/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/phishing-detection-hero.BdHHU1I8.svg</image:loc>
      <image:caption>Phishing detection - magnifying glass over email revealing fraud</image:caption>
      <image:title>Як розпізнати фішинг: візуальні та технічні ознаки шахрайства</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/uk/blog/phishing-simulation-training/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/phishing-simulation-hero.C_YPF1ii.svg</image:loc>
      <image:caption>Phishing simulation training - email with fishing hook representing simulated attacks</image:caption>
      <image:title>Навчання через симуляцію фішингу, що знижує рівень кліків</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/uk/blog/quishing/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/quishing-hero.CBWYlNf-.svg</image:loc>
      <image:caption>Quishing attack flow showing a malicious QR code being scanned by a phone and redirecting to a fake login page for credential harvesting</image:caption>
      <image:title>Квішинг: як QR-код фішинг обходить ваші email-фільтри</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/uk/blog/ransomleak-vs-hoxhunt/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/ransomleak-vs-hoxhunt-hero.C9hfw_uI.svg</image:loc>
      <image:caption>Side-by-side comparison of RansomLeak interactive 3D simulations versus Hoxhunt AI-adaptive phishing platform</image:caption>
      <image:title>RansomLeak проти Hoxhunt: порівняння навчання з кібербезпеки (2026)</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/uk/blog/ransomleak-vs-knowbe4/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/ransomleak-vs-knowbe4-hero.B17sgwKL.svg</image:loc>
      <image:caption>Side-by-side comparison of RansomLeak interactive 3D simulations versus KnowBe4 video content library for security awareness training</image:caption>
      <image:title>RansomLeak проти KnowBe4: порівняння навчання з кібербезпеки (2026)</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/uk/blog/ransomleak-vs-ninjio/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/ransomleak-vs-ninjio-hero.z356ffcQ.svg</image:loc>
      <image:caption>Side-by-side comparison of RansomLeak interactive 3D simulations versus Ninjio Hollywood micro-learning video content</image:caption>
      <image:title>RansomLeak проти Ninjio: порівняння навчання з кібербезпеки (2026)</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/uk/blog/ransomleak-vs-phished/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/ransomleak-vs-phished-hero.A6LrPus_.svg</image:loc>
      <image:caption>Side-by-side comparison of RansomLeak interactive 3D simulations versus Phished AI-automated phishing platform</image:caption>
      <image:title>RansomLeak проти Phished: порівняння навчання з кібербезпеки (2026)</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/uk/blog/ransomleak-vs-proofpoint/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/ransomleak-vs-proofpoint-hero.Bf4Lb6cy.svg</image:loc>
      <image:caption>Side-by-side comparison of RansomLeak interactive 3D simulations versus Proofpoint email security suite training</image:caption>
      <image:title>RansomLeak проти Proofpoint: порівняння навчання з кібербезпеки (2026)</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/uk/blog/ransomleak-vs-usecure/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/ransomleak-vs-usecure-hero.B5NaoODp.svg</image:loc>
      <image:caption>Side-by-side comparison of RansomLeak interactive 3D simulations versus Usecure MSP-focused automated security awareness</image:caption>
      <image:title>RansomLeak проти Usecure: порівняння навчання з кібербезпеки (2026)</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/uk/blog/ransomware-awareness-training/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/ransomware-awareness-hero.C0L2B9EO.svg</image:loc>
      <image:caption>Ransomware attack visualization showing encrypted files, a locked padlock, and a ransom note countdown timer</image:caption>
      <image:title>Навчання працівників з обізнаності про програми-вимагачі</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/uk/blog/scorm-security-training/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/scorm-training-hero.C8x7gl98.svg</image:loc>
      <image:caption>SCORM security training - puzzle pieces representing LMS integration</image:caption>
      <image:title>SCORM навчання з кібербезпеки: посібник з налаштування LMS</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/uk/blog/security-awareness-training-effectiveness/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/security-awareness-training-hero.AxN_MsnB.svg</image:loc>
      <image:caption>Security awareness training effectiveness - chart showing improvement metrics</image:caption>
      <image:title>Чи працює навчання з кібербезпеки? Дослідження ROI</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/uk/blog/security-awareness-training-guide/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/security-awareness-training-hero.AxN_MsnB.svg</image:loc>
      <image:caption>Security awareness training - shield with checkmark representing employee protection</image:caption>
      <image:title>Навчання з кібербезпеки: повний посібник на 2026 рік</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/uk/blog/shadow-it-security-risks/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/shadow-it-security-hero.Bnh2XCp-.svg</image:loc>
      <image:caption>Shadow IT security risks - unauthorized cloud apps orbiting a corporate server, connected by warning-flagged data flows</image:caption>
      <image:title>Тіньове IT: ризики безпеки, приховані у вашому SaaS-стеку</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/uk/blog/social-engineering-attacks/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/social-engineering-hero.BVC4Agmv.svg</image:loc>
      <image:caption>Social engineering attacks - puppet strings representing psychological manipulation</image:caption>
      <image:title>Атаки соціальної інженерії: експлуатація людської психології</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/uk/blog/typosquatting-awareness/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/typosquatting-hero.C8MEeYW2.svg</image:loc>
      <image:caption>Comparison of a legitimate URL and a typosquatted URL showing how replacing the letter m with rn creates a convincing lookalike domain</image:caption>
      <image:title>Тайпосквотинг: коли одна неправильна літера передає ваші облікові дані</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/uk/blog/vishing-awareness/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/vishing-hero.CYSua__w.svg</image:loc>
      <image:caption>Vishing attacks - phone with voice waves representing deceptive calls</image:caption>
      <image:title>Вішинг-атаки: як голосовий фішинг працює та чому перемагає</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/uk/blog/what-is-smishing-cybersecurity/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/smishing-hero.DZ3rZnMB.svg</image:loc>
      <image:caption>Smishing attacks - smartphone with malicious SMS message</image:caption>
      <image:title>Смішинг-атаки: як SMS-фішинг працює та як його зупинити</image:title>
    </image:image>
  </url>

  <url>
    <loc>https://ransomleak.com/uk/blog/what-is-whaling-cybersecurity/</loc>
    <image:image>
      <image:loc>https://ransomleak.com/_astro/whaling-hero.Dup0lLEm.svg</image:loc>
      <image:caption>Whaling attacks - executive with crown representing high-value targets</image:caption>
      <image:title>Вейлінг-атаки: чому керівники є головними цілями</image:title>
    </image:image>
  </url>
</urlset>
