<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 3, 2026 at 7:17 pm by All in One SEO v4.9.2 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://threatactix.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Threatactix</title>
		<link><![CDATA[https://threatactix.com]]></link>
		<description><![CDATA[Threatactix]]></description>
		<lastBuildDate><![CDATA[Wed, 24 Dec 2025 10:20:44 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://threatactix.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://threatactix.com/blog/]]></guid>
			<link><![CDATA[https://threatactix.com/blog/]]></link>
			<title>Blog</title>
			<pubDate><![CDATA[Wed, 24 Dec 2025 10:20:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://threatactix.com/platform/]]></guid>
			<link><![CDATA[https://threatactix.com/platform/]]></link>
			<title>Platform</title>
			<pubDate><![CDATA[Wed, 25 Mar 2026 12:46:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://threatactix.com/services/zero-day-infrastructure-detection/]]></guid>
			<link><![CDATA[https://threatactix.com/services/zero-day-infrastructure-detection/]]></link>
			<title>Zero-Day Infrastructure Detection</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 02:38:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://threatactix.com/services/external-attack-surface-management/]]></guid>
			<link><![CDATA[https://threatactix.com/services/external-attack-surface-management/]]></link>
			<title>External Attack Surface Management</title>
			<pubDate><![CDATA[Tue, 31 Mar 2026 10:31:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://threatactix.com/services/ransomware-hunting-prevention-strategies/]]></guid>
			<link><![CDATA[https://threatactix.com/services/ransomware-hunting-prevention-strategies/]]></link>
			<title>Ransomware hunting and Prevention Strategies</title>
			<pubDate><![CDATA[Tue, 31 Mar 2026 01:59:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://threatactix.com/cybersecurity-services/]]></guid>
			<link><![CDATA[https://threatactix.com/cybersecurity-services/]]></link>
			<title>Services</title>
			<pubDate><![CDATA[Sun, 29 Mar 2026 12:03:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://threatactix.com/about/]]></guid>
			<link><![CDATA[https://threatactix.com/about/]]></link>
			<title>Why Threatactix</title>
			<pubDate><![CDATA[Sun, 29 Mar 2026 00:28:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://threatactix.com/contact/]]></guid>
			<link><![CDATA[https://threatactix.com/contact/]]></link>
			<title>Contact</title>
			<pubDate><![CDATA[Sun, 28 Dec 2025 01:41:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://threatactix.com/services/cyber-threat-hunting/]]></guid>
			<link><![CDATA[https://threatactix.com/services/cyber-threat-hunting/]]></link>
			<title>Cyber Threat Hunting</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 11:10:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://threatactix.com/services/threat-intelligence/]]></guid>
			<link><![CDATA[https://threatactix.com/services/threat-intelligence/]]></link>
			<title>Threat Intelligence</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 01:52:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://threatactix.com/2025/09/29/global-exploitation-campaign-widespread-wordpress-exploitation-and-ftp-rce/]]></guid>
			<link><![CDATA[https://threatactix.com/2025/09/29/global-exploitation-campaign-widespread-wordpress-exploitation-and-ftp-rce/]]></link>
			<title>Global Exploitation Campaign — Widespread WordPress Exploitation and FTP RCE</title>
			<pubDate><![CDATA[Mon, 29 Sep 2025 08:56:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://threatactix.com/solution/]]></guid>
			<link><![CDATA[https://threatactix.com/solution/]]></link>
			<title>Solution</title>
			<pubDate><![CDATA[Mon, 29 Dec 2025 02:06:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://threatactix.com/services/adversary-simulation/]]></guid>
			<link><![CDATA[https://threatactix.com/services/adversary-simulation/]]></link>
			<title>Breach &#038; Attack Simulation (BAS)</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 10:10:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://threatactix.com/2025/02/28/successful-threat-hunting-village-for-ransomware-execution/]]></guid>
			<link><![CDATA[https://threatactix.com/2025/02/28/successful-threat-hunting-village-for-ransomware-execution/]]></link>
			<title>Successful Threat Hunting Village for Ransomware Theme Execution</title>
			<pubDate><![CDATA[Fri, 28 Feb 2025 03:46:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://threatactix.com/services/cybersecurity-awareness-training/]]></guid>
			<link><![CDATA[https://threatactix.com/services/cybersecurity-awareness-training/]]></link>
			<title>Cybersecurity Awareness training</title>
			<pubDate><![CDATA[Tue, 10 Dec 2024 23:55:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://threatactix.com/2024/09/24/asyncrat-command-control-overview-191-93-114-27/]]></guid>
			<link><![CDATA[https://threatactix.com/2024/09/24/asyncrat-command-control-overview-191-93-114-27/]]></link>
			<title>ASYNCRAT-Command &amp; Control Overview- 191.93.114.27</title>
			<pubDate><![CDATA[Tue, 24 Sep 2024 10:41:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://threatactix.com/portfolios/web-development-2/]]></guid>
			<link><![CDATA[https://threatactix.com/portfolios/web-development-2/]]></link>
			<title>Web Development</title>
			<pubDate><![CDATA[Thu, 30 May 2024 13:08:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://threatactix.com/portfolios/network-security-2/]]></guid>
			<link><![CDATA[https://threatactix.com/portfolios/network-security-2/]]></link>
			<title>Network Security</title>
			<pubDate><![CDATA[Thu, 30 May 2024 13:08:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://threatactix.com/portfolios/web-development/]]></guid>
			<link><![CDATA[https://threatactix.com/portfolios/web-development/]]></link>
			<title>Web Development</title>
			<pubDate><![CDATA[Thu, 30 May 2024 13:08:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://threatactix.com/portfolios/it-management/]]></guid>
			<link><![CDATA[https://threatactix.com/portfolios/it-management/]]></link>
			<title>IT Management</title>
			<pubDate><![CDATA[Thu, 30 May 2024 13:08:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://threatactix.com/portfolios/network-security/]]></guid>
			<link><![CDATA[https://threatactix.com/portfolios/network-security/]]></link>
			<title>Network Security</title>
			<pubDate><![CDATA[Thu, 30 May 2024 13:08:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://threatactix.com/faq/]]></guid>
			<link><![CDATA[https://threatactix.com/faq/]]></link>
			<title>Faq</title>
			<pubDate><![CDATA[Thu, 30 May 2024 13:08:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://threatactix.com/portfolios/it-management-2/]]></guid>
			<link><![CDATA[https://threatactix.com/portfolios/it-management-2/]]></link>
			<title>IT Management</title>
			<pubDate><![CDATA[Thu, 30 May 2024 13:08:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://threatactix.com/portfolios/modified-roofing/]]></guid>
			<link><![CDATA[https://threatactix.com/portfolios/modified-roofing/]]></link>
			<title>Web Development</title>
			<pubDate><![CDATA[Thu, 30 May 2024 13:08:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://threatactix.com/portfolios/roof-installation/]]></guid>
			<link><![CDATA[https://threatactix.com/portfolios/roof-installation/]]></link>
			<title>IT Management</title>
			<pubDate><![CDATA[Thu, 30 May 2024 13:08:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://threatactix.com/2024/07/04/cybersecurity-monthly-updates-june-2024/]]></guid>
			<link><![CDATA[https://threatactix.com/2024/07/04/cybersecurity-monthly-updates-june-2024/]]></link>
			<title>Cybersecurity Monthly Updates &#8211; June 2024</title>
			<pubDate><![CDATA[Thu, 04 Jul 2024 10:58:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://threatactix.com/2024/06/15/cybersecurity-prevention-strategies/]]></guid>
			<link><![CDATA[https://threatactix.com/2024/06/15/cybersecurity-prevention-strategies/]]></link>
			<title>Cybersecurity Prevention &#038; Strategies</title>
			<pubDate><![CDATA[Sun, 16 Jun 2024 00:11:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://threatactix.com/blogs/]]></guid>
			<link><![CDATA[https://threatactix.com/blogs/]]></link>
			<title>Blogs</title>
			<pubDate><![CDATA[Sun, 01 Dec 2024 00:36:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://threatactix.com/2024/09/23/threat-intelligence-report-september-3rd-week/]]></guid>
			<link><![CDATA[https://threatactix.com/2024/09/23/threat-intelligence-report-september-3rd-week/]]></link>
			<title>Threat Intelligence Report- September 3rd week</title>
			<pubDate><![CDATA[Mon, 23 Sep 2024 10:01:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://threatactix.com/]]></guid>
			<link><![CDATA[https://threatactix.com/]]></link>
			<title>Home</title>
			<pubDate><![CDATA[Fri, 27 Mar 2026 01:37:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://threatactix.com/portfolios/platform-integration/]]></guid>
			<link><![CDATA[https://threatactix.com/portfolios/platform-integration/]]></link>
			<title>Platform Integration</title>
			<pubDate><![CDATA[Thu, 30 May 2024 13:08:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://threatactix.com/portfolios/network-security-3/]]></guid>
			<link><![CDATA[https://threatactix.com/portfolios/network-security-3/]]></link>
			<title>Network Security</title>
			<pubDate><![CDATA[Thu, 30 May 2024 13:08:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://threatactix.com/2024/09/30/asyncrat-command-control-overview-51-81-30-54666/]]></guid>
			<link><![CDATA[https://threatactix.com/2024/09/30/asyncrat-command-control-overview-51-81-30-54666/]]></link>
			<title>ASYNCRAT-Command &amp; Control Overview- 51.81.30.54:666</title>
			<pubDate><![CDATA[Sun, 01 Dec 2024 00:43:14 +0000]]></pubDate>
		</item>
				</channel>
</rss>
