<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://www.miragesecurity.ai</loc>
<lastmod>2026-04-03T17:04:31.591Z</lastmod>
<changefreq>weekly</changefreq>
<priority>1</priority>
</url>
<url>
<loc>https://www.miragesecurity.ai/blog</loc>
<lastmod>2026-04-03T17:04:31.591Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.miragesecurity.ai/resources</loc>
<lastmod>2026-04-03T17:04:31.591Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.miragesecurity.ai/simulation</loc>
<lastmod>2026-04-03T17:04:31.591Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://www.miragesecurity.ai/talk-to-founders</loc>
<lastmod>2026-04-03T17:04:31.591Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.miragesecurity.ai/privacy-policy</loc>
<lastmod>2026-04-03T17:04:31.591Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.3</priority>
</url>
<url>
<loc>https://www.miragesecurity.ai/tos</loc>
<lastmod>2026-04-03T17:04:31.591Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.3</priority>
</url>
<url>
<loc>https://www.miragesecurity.ai/blog/25-million-hk-deepfake-theft-what-you-need-to-know</loc>
<lastmod>2024-02-04T13:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.miragesecurity.ai/blog/ai-at-war-unveiling-nation-state-attacks-with-gpt</loc>
<lastmod>2024-02-19T13:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.miragesecurity.ai/blog/deepfake-detection-a-lost-cause</loc>
<lastmod>2024-05-09T13:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.miragesecurity.ai/blog/phishing-simulations-legit-training-or-bs</loc>
<lastmod>2024-05-29T13:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.miragesecurity.ai/blog/the-dark-side-of-phishing-simulations-new-study-reveals-unexpected-risks</loc>
<lastmod>2024-11-20T13:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.miragesecurity.ai/blog/hackers-x-humans-ep-0-executive-security</loc>
<lastmod>2025-01-06T13:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.miragesecurity.ai/blog/social-engineering-in-2024-a-year-in-review</loc>
<lastmod>2025-02-13T13:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.miragesecurity.ai/blog/hackers-x-humans-ep-1-the-darknet</loc>
<lastmod>2025-02-20T13:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.miragesecurity.ai/blog/mirage-knowbe4-the-first-ai-social-engineer-integrated-with-ksat</loc>
<lastmod>2025-03-27T13:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.miragesecurity.ai/blog/hackers-x-humans-ep-2-synthetic-threats-with-dr-matthew-canham</loc>
<lastmod>2025-05-05T13:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.miragesecurity.ai/blog/ai-social-engineering-strategy-guide</loc>
<lastmod>2025-06-01T13:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.miragesecurity.ai/blog/scattered-spider-a-retrospective</loc>
<lastmod>2025-06-24T13:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.miragesecurity.ai/blog/how-scattered-spider-hacks-global-it-service-providers</loc>
<lastmod>2025-07-24T13:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.miragesecurity.ai/blog/introducing-adaptive-training-for-vishing</loc>
<lastmod>2025-08-03T13:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.miragesecurity.ai/blog/mirage-mimecast-integration</loc>
<lastmod>2026-01-06T09:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.miragesecurity.ai/blog/hackers-x-humans-ep-3-human-risk-management-with-oz-alashe</loc>
<lastmod>2026-01-13T13:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.miragesecurity.ai/blog/human-risk-blind-spot-dprk-hiring-fraud</loc>
<lastmod>2026-02-10T13:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.miragesecurity.ai/blog/mirage-ethical-simulation-standards</loc>
<lastmod>2026-02-27T13:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.miragesecurity.ai/blog/inside-p1bot-vishing-platform-weaponizing-elevenlabs</loc>
<lastmod>2026-03-11T13:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.miragesecurity.ai/blog/introducing-mirage-rover</loc>
<lastmod>2026-04-01T13:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.miragesecurity.ai/blog/axios-maintainer-social-engineering</loc>
<lastmod>2026-04-06T13:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.miragesecurity.ai/resources/phish-scale-calculator</loc>
<lastmod>2025-12-06T13:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.miragesecurity.ai/resources/vishing-simulator</loc>
<lastmod>2025-12-07T13:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
</urlset>
