<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml"><url><loc>https://thecyberriddler.com/</loc><changefreq>daily</changefreq><priority>1.0</priority></url><url><loc>https://thecyberriddler.com/participants</loc><lastmod>2023-06-29T15:50:31.507Z</lastmod><priority>0.7</priority></url><url><loc>https://thecyberriddler.com/be-a-guest</loc><lastmod>2023-06-29T15:31:32.243Z</lastmod><priority>0.7</priority></url><url><loc>https://thecyberriddler.com/episodes</loc><lastmod>2023-01-04T17:10:50.225Z</lastmod><priority>0.7</priority></url><url><loc>https://thecyberriddler.com/reviews</loc><lastmod>2023-01-04T17:10:50.225Z</lastmod><priority>0.7</priority></url><url><loc>https://thecyberriddler.com/blog</loc><lastmod>2023-01-04T17:10:50.225Z</lastmod><priority>0.7</priority></url><url><loc>https://thecyberriddler.com/contact</loc><lastmod>2023-01-05T07:45:15.748Z</lastmod><priority>0.7</priority></url><url><loc>https://thecyberriddler.com/about</loc><lastmod>2023-01-06T19:25:57.012Z</lastmod><priority>0.7</priority></url><url><loc>https://thecyberriddler.com/blog/promo</loc><lastmod>2023-01-05T07:57:18.461Z</lastmod><priority>0.6</priority></url><url><loc>https://thecyberriddler.com/blog/getting-started-with-dfir-paula-januszkiewicz</loc><lastmod>2023-07-19T08:14:45.226Z</lastmod><priority>0.6</priority></url><url><loc>https://thecyberriddler.com/blog/windows-internals</loc><lastmod>2023-07-26T05:57:23.910Z</lastmod><priority>0.6</priority></url><url><loc>https://thecyberriddler.com/blog/vulnerability-research-kevin-backhouse</loc><lastmod>2023-07-26T05:56:22.165Z</lastmod><priority>0.6</priority></url><url><loc>https://thecyberriddler.com/blog/malware-analysis-karsten</loc><lastmod>2023-09-06T06:10:32.612Z</lastmod><priority>0.6</priority></url><url><loc>https://thecyberriddler.com/person/lance-james</loc><lastmod>2023-06-29T15:48:02.841Z</lastmod><priority>0.6</priority></url><url><loc>https://thecyberriddler.com/person/paula-januszkiewicz</loc><lastmod>2023-07-19T08:14:38.780Z</lastmod><priority>0.6</priority></url><url><loc>https://thecyberriddler.com/person/kevin-backhouse</loc><lastmod>2023-07-26T08:34:11.639Z</lastmod><priority>0.6</priority></url><url><loc>https://thecyberriddler.com/person/pavel-yosifovich</loc><lastmod>2023-07-19T08:13:51.171Z</lastmod><priority>0.6</priority></url><url><loc>https://thecyberriddler.com/person/yarden-shafir</loc><lastmod>2023-08-23T08:51:47.692Z</lastmod><priority>0.6</priority></url><url><loc>https://thecyberriddler.com/person/karsten-hahn</loc><lastmod>2023-09-06T08:19:13.931Z</lastmod><priority>0.6</priority></url><url><loc>https://thecyberriddler.com/podcast/the-cyber-riddler</loc><priority>0.7</priority></url><url><loc>https://thecyberriddler.com/episode/promo</loc><lastmod>2025-07-13T16:10:53.229Z</lastmod><priority>0.8</priority></url><url><loc>https://thecyberriddler.com/episode/episode-1-ar-vpn-and-proxy-issues</loc><lastmod>2025-07-13T16:09:43.658Z</lastmod><priority>0.8</priority></url><url><loc>https://thecyberriddler.com/episode/episode-1-en-vpn-and-proxy-issues</loc><lastmod>2025-07-13T16:08:58.516Z</lastmod><priority>0.8</priority></url><url><loc>https://thecyberriddler.com/episode/episode-2-ar-apt-groups-and-apt29</loc><lastmod>2025-07-13T16:08:28.490Z</lastmod><priority>0.8</priority></url><url><loc>https://thecyberriddler.com/episode/episode-2-en-apt-groups-and-apt29</loc><lastmod>2025-07-13T16:08:28.490Z</lastmod><priority>0.8</priority></url><url><loc>https://thecyberriddler.com/episode/episode-3-en-juicy-exploits</loc><lastmod>2025-07-13T16:07:18.933Z</lastmod><priority>0.8</priority></url><url><loc>https://thecyberriddler.com/episode/episode-4-en-prngs-and-randomness</loc><lastmod>2025-07-13T16:05:40.934Z</lastmod><priority>0.8</priority></url><url><loc>https://thecyberriddler.com/episode/episode-4-ar-prngs-and-randomness</loc><lastmod>2025-07-13T16:05:40.934Z</lastmod><priority>0.8</priority></url><url><loc>https://thecyberriddler.com/episode/ransomware-with-lance-james</loc><lastmod>2025-07-13T16:02:29.984Z</lastmod><priority>0.8</priority></url><url><loc>https://thecyberriddler.com/episode/browser-exploitation</loc><lastmod>2025-07-13T15:59:46.429Z</lastmod><priority>0.8</priority></url><url><loc>https://thecyberriddler.com/episode/lolbins-living-off-the-land-binaries</loc><lastmod>2025-07-13T15:56:35.750Z</lastmod><priority>0.8</priority></url><url><loc>https://thecyberriddler.com/episode/dns-attacks</loc><lastmod>2025-11-05T22:11:11.889Z</lastmod><priority>0.8</priority></url><url><loc>https://thecyberriddler.com/episode/getting-started-with-dfir-paula-januszkiewicz</loc><lastmod>2025-07-13T15:51:29.836Z</lastmod><priority>0.8</priority></url><url><loc>https://thecyberriddler.com/episode/windows-internals-pavel-yosifovich</loc><lastmod>2025-07-13T15:51:08.843Z</lastmod><priority>0.8</priority></url><url><loc>https://thecyberriddler.com/episode/vulnerability-research-kevin-backhouse</loc><lastmod>2025-07-13T15:50:17.763Z</lastmod><priority>0.8</priority></url><url><loc>https://thecyberriddler.com/episode/kernel-drivers-yarden-shafir</loc><lastmod>2025-07-13T15:47:49.338Z</lastmod><priority>0.8</priority></url><url><loc>https://thecyberriddler.com/episode/malware-analysis-karsten-hahn</loc><lastmod>2025-07-13T15:46:31.036Z</lastmod><priority>0.8</priority></url><url><loc>https://thecyberriddler.com/episode/the-lazarus-group</loc><lastmod>2025-11-05T22:11:11.889Z</lastmod><priority>0.8</priority></url><url><loc>https://thecyberriddler.com/episode/insider-threat</loc><lastmod>2025-11-05T22:11:11.889Z</lastmod><priority>0.8</priority></url><url><loc>https://thecyberriddler.com/episode/lateral-movement</loc><lastmod>2025-11-05T22:11:11.889Z</lastmod><priority>0.8</priority></url><url><loc>https://thecyberriddler.com/episode/threat-intelligence</loc><lastmod>2025-11-05T22:11:11.889Z</lastmod><priority>0.8</priority></url><url><loc>https://thecyberriddler.com/episode/https-and-tls-tales</loc><lastmod>2025-11-05T22:11:11.889Z</lastmod><priority>0.8</priority></url><url><loc>https://thecyberriddler.com/episode/phishing-world</loc><lastmod>2025-11-05T22:11:11.889Z</lastmod><priority>0.8</priority></url><url><loc>https://thecyberriddler.com/episode/threat-hunting</loc><lastmod>2025-11-05T22:11:11.889Z</lastmod><priority>0.8</priority></url><url><loc>https://thecyberriddler.com/episode/zero-day-exploits</loc><lastmod>2025-11-05T22:11:11.889Z</lastmod><priority>0.8</priority></url><url><loc>https://thecyberriddler.com/episode/threats-and-defenses</loc><lastmod>2025-11-05T22:11:11.889Z</lastmod><priority>0.8</priority></url><url><loc>https://thecyberriddler.com/episode/initial-access</loc><lastmod>2025-11-05T22:11:11.889Z</lastmod><priority>0.8</priority></url><url><loc>https://thecyberriddler.com/episode/logs-dont-lie</loc><lastmod>2025-11-05T22:11:11.889Z</lastmod><priority>0.8</priority></url><url><loc>https://thecyberriddler.com/channel/the-riddler-lab</loc><priority>0.7</priority></url><url><loc>https://thecyberriddler.com/video/catalyzer-small-tool-for-incident-responders-and-soc-analysts</loc><lastmod>2025-09-29T10:08:58.323Z</lastmod><priority>0.8</priority></url><url><loc>https://thecyberriddler.com/video/the-cyber-riddler-ransomware-with-lance-james</loc><lastmod>2025-09-29T10:08:57.535Z</lastmod><priority>0.8</priority></url><url><loc>https://thecyberriddler.com/video/getting-started-with-dfir-paula-januszkiewicz</loc><lastmod>2025-09-29T10:08:57.293Z</lastmod><priority>0.8</priority></url><url><loc>https://thecyberriddler.com/video/windows-internals-pavel-yosifovich</loc><lastmod>2025-09-29T10:08:56.003Z</lastmod><priority>0.8</priority></url><url><loc>https://thecyberriddler.com/video/vulnerability-research-kevin-backhouse</loc><lastmod>2025-09-29T10:08:56.003Z</lastmod><priority>0.8</priority></url><url><loc>https://thecyberriddler.com/video/the-cyber-riddler-kernel-drivers-yarden-shafir</loc><lastmod>2025-09-29T10:08:56.003Z</lastmod><priority>0.8</priority></url><url><loc>https://thecyberriddler.com/video/the-cyber-riddler-malware-analysis-karsten-hahn</loc><lastmod>2025-09-29T10:08:56.003Z</lastmod><priority>0.8</priority></url><url><loc>https://thecyberriddler.com/video/hooksweeper-tool</loc><lastmod>2025-09-29T10:08:56.003Z</lastmod><priority>0.8</priority></url><url><loc>https://thecyberriddler.com/video/phishing-world</loc><lastmod>2025-09-29T10:08:56.003Z</lastmod><priority>0.8</priority></url><url><loc>https://thecyberriddler.com/video/threat-hunting</loc><lastmod>2025-09-29T10:08:56.003Z</lastmod><priority>0.8</priority></url><url><loc>https://thecyberriddler.com/video/zero-day-exploits</loc><lastmod>2025-09-29T10:08:56.003Z</lastmod><priority>0.8</priority></url><url><loc>https://thecyberriddler.com/video/threats-and-defenses</loc><lastmod>2025-09-29T10:08:56.003Z</lastmod><priority>0.8</priority></url><url><loc>https://thecyberriddler.com/video/initial-access</loc><lastmod>2025-09-29T10:08:56.003Z</lastmod><priority>0.8</priority></url><url><loc>https://thecyberriddler.com/video/logs-dont-lie</loc><lastmod>2025-09-29T10:08:56.003Z</lastmod><priority>0.8</priority></url></urlset>