<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://hoxhunt.com</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/why-hoxhunt</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/request-a-demo</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/customers</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/webinars</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/about</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/ebooks-whitepapers</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/careers</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/security</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/press</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/partners</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/behavioral-cybersecurity-ebook</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/tools/impact-calculator</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/phish-bowl</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/pricing</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/resource-hub</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/feature/human-risk-dashboard</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/feature/benchmark-phishing-simulations</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/feature/automated-phishing-analysis</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/feature/incident-orchestration-platform</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/threat-feed-signup</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/product/security-awareness-training</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/product/phishing-training</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/product/phishing-email-incident-response-automation</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/product/behavior-risk-console</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/lb/phishing-training-loser</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/interactive-platform-tour</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/human-risk-management-masterclass</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/laf/request-a-demo</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/laf/pricing</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/compare-hoxhunt</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/la/compare-hoxhunt</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/e/phishing-training</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/e/compare-hoxhunt</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/customer-reviews</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/e/customer-reviews</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/lb/phishing-training-us-loser</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/case-studies</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/e/case-studies</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/interactive-platform-tour-v2</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/e/request-demo</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/la/compare-hoxhunt-us</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/e/why-hoxhunt</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/spring-update-2025</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/how-it-works</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/hoxhunt-interactive-demo-tour</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/tour-rsa-2025</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/podcast</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/la/human-risk-reduction-platform-us</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/lb/cyber-security-awareness-platform-us</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/la/compare-hoxhunt-us-copy-test</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/lb/cyber-security-awareness-platform-eu-uk</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/lb/cyber-security-awareness-platform-for-employees-us</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/la/security-awareness-training-for-employees-that-just-works</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/la/email-incident-response-automation</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/security-culture-quiz</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/feature/deepfake-phishing-attack</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/cybersecurity-awareness-month-toolkit-2025</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/compare-hoxhunt-g2</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/compare-hoxhunt-g2-with-demo</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/feature/deepfake-phishing-attack-demo</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/search</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/lb/human-risk-management-platform</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/lb/cyber-security-awareness-platform-sat-aimax</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/lb/cyber-security-awareness-platform-dach-test</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/lb/cyber-security-awareness-plattform-de</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/la/vergleiche-hoxhunt-mit-anderen-losungen</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/case-studies/avanade-reduced-cyber-risk-and-saved-5-soc-analyst-ftes-with-hoxhunt</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/case-studies/brightstar-hits-the-cybersecurity-awareness-training-jackpot-with-hoxhunt</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/case-studies/case-study-how-a-global-fast-moving-consumer-good-company-uses-hoxhunt-to-reduce-the-risk-of-a-phishing-incident</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/case-studies/case-study-ordermark-is-built-to-last-with-cybersecurity-awareness-as-a-cultural-foundation</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/case-studies/copart-cso-award-winning-security-behavior-change-and-engagement</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/case-studies/docusign-and-the-psychology-of-behavior-change-for-cybersecurity-training-with-hoxhunt</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/case-studies/eon-energizes-security-awareness-engagement-with-qr-code-campaign</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/case-studies/how-a-swiss-insurance-company-integrated-human-threat-detection-into-their-security-stack</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/case-studies/how-aes-a-fortune-500-global-energy-company-fueled-security-vigilance-and-measurably-lowered-the-human-factor-in-cyber-risks</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/case-studies/how-celonis-optimized-incident-response-with-phishing-training</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/case-studies/how-eckes-granini-group-transformed-cybersecurity-awareness-with-hoxhunt</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/case-studies/how-elisa-joins-people-and-awareness-results-with-the-security-stack-to-boost-detection-and-response-while-preventing-breaches</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/case-studies/how-g2-built-positive-experience-into-phishing-awareness-training</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/case-studies/how-kverneland-group-sewed-awareness-training-and-reaped-resilience</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/case-studies/how-publishing-factory-achieved-compliance-and-near-perfect-cybersecurity-behavior-change-results-with-minimal-resources</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/case-studies/how-qualcomm-used-targeted-security-awareness-training-for-employees</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/case-studies/how-victorinox-used-hoxhunt-in-a-swiss-army-knife-approach-to-cybersecurity-behavior-change</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/case-studies/how-we-helped-a-leading-swiss-financial-technology-and-services-provider-teach-employees-to-recognize-and-report-threats</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/case-studies/igt-hits-the-cybersecurity-awareness-training-jackpot-with-hoxhunt</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/case-studies/incident-response-chemical-manufacturing-human-risk-management</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/case-studies/iress-invested-in-security-behavior-change-for-human-risk-management</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/case-studies/karcher-transformational-awareness-via-automation-efficiency-and-engagement</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/case-studies/lyondellbasell-gamified-security-training-for-increased-engagement-and-reduced-repeat-clickers</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/case-studies/monster-energy-wins-cso-award-with-hoxhunt</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/case-studies/moss-credits-hoxhunt-with-measurable-human-cyber-risk-reduction</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/case-studies/operational-technology-cyber-security-ahlstrom</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/case-studies/port-of-antwerp-bruges-security-behavior-change-human-risk-management</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/case-studies/ramboll-educates-employees-on-email-based-threats-with-hoxhunt</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/case-studies/swisscom-security-awareness-and-phishing-training-testimonial-switzerland-german</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/case-studies/tomtom-human-cyber-risk-management-and-real-threat-detection</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/case-studies/using-hoxhunt-helped-sparebanken-vest-move-from-cybersecurity-awareness-towards-cybersecurity-engagement</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/case-studies/valmet-uses-hoxhunt-to-provide-employees-with-cybersecurity-training</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/case-studies/vertigis-linking-supply-chain-cybersecurity-to-it-and-hr</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/case-studies/wateraid-behavior-change-human-risk-management-case-study</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/case-studies/why-altisource-leadership-gives-security-awareness-prime-real-estate-in-its-corporate-culture</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/10-cybersecurity-trends-2020</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/10-steps-to-award-winning-cybersecurity-training-the-aes-cso50-playbook</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/12-ways-how-attackers-crack-your-password</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/2024-best-software</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/3-ways-to-spot-the-2-most-common-ukraine-themed-phishing-campaigns</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/4-essential-phishing-metrics</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/5-ways-to-bypass-two-factor-authentication</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/5-ways-to-prevent-business-email-compromise-attacks</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/a-guide-to-cybersecurity-awareness-training-for-your-employees</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/a-phish-named-malware-email-verification-scam</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/a-real-approach-to-implementing-machine-learning-to-security-awareness-by-ira-winkler</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/advanced-phishing-attack-mimics-facebook-policy-violation-notification</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/advanced-phishing-attack-using-google-subdomain-could-trick-anyone</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/aes-wins-cso50-award-for-transformative-security-behavior-change-with-hoxhunt</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/ai-and-the-future-of-phishing-training-insights-from-hoxhunt-ceo-mika-aalto</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/ai-phishing-attacks</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/ai-powered-phishing-vs-humans</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/ai-powered-translations-for-security-awareness-training</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/amazon-account-locked-phishing-email-impersonates-amazon-to-steal-your-login-credentials</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/announcing-hoxhunts-soc2-type-2-compliance</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/are-phishing-tests-enough</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/are-smartphones-a-cyber-threat-for-your-company</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/attachments-in-phishing-101</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/attachments-in-phishing-102</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/attack-simulation-training</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/attackers-personalize-phishing-campaigns</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/automated-security-awareness-program-steps</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/automation-awareness-and-design-thinking-for-improved-cybersecurity</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/available-reward-phishing-email-impersonates-booking-com</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/banking-phishing-qr-codes</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/barak-engel-author-of-the-security-hippie-joins-the-ciso-sandbox</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/barak-engel-author-of-the-security-hippie-video-from-ciso-sandbox-appearance</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/behavior-based-cyber-security-training</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/behavior-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/best-cybersecurity-solutions</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/best-human-risk-management-software</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/best-phishing-simulation-tools</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/best-security-awareness-training</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/big-money-spearphish-campaign</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/book-review-of-the-security-hippie-by-virtual-ciso-barak-engel</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/brand-credibility-and-cybersecurity-awareness-in-the-financial-industry-expert-interview-with-international-bank-abn-amro</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/breaking-scam-alert-the-2022-us-department-of-transportation-phishing-attack-is-the-greatest-in-a-bad-way-credential-harvesting-scam-weve-ever-seen</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/brute-force-attack-cybersecurity-sports-metaphor</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/bug-g-suite-lets-attackers-spread-malware</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/buggy-phishing-attack-accidentally-reveals-how-cyber-criminals-personalize-messages-to-elude-detection-by-filters</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/business-email-compromise-statistics</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/calendar-invite-phishing</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/cancel-phishing-training-good-luck-with-that-ira-winkler</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/case-study-consumer-goods-company</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/change-this-one-setting-in-your-azure-ad-now</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/changing-the-security-narrative</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/chatgpt-vs-human-phishing-and-social-engineering-study-whos-better</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/check-out-some-of-hoxhunts-stellar-g2-reviews</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/christophe-rome-lineas-ciso-interview</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/ciso-executive-primer-with-bill-bonney-gary-hayslip-and-matt-stamper</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/ciso-fantasy-phish-bowl-2025-week-1</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/ciso-phish-bowl-thought-leadership-with-katie-arrington-and-larry-whiteside-jr</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/ciso-phish-bowl-week-zero-draft-results</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/ciso-sandbox-with-dan-lohrmann-video-and-key-takeaways</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/clone-phishing</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/confidential-message-notification-steals-users-credentials-using-compromised-business-email-accounts</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/copyright-infringement-phishing-attacks</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/covid-19-policy</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/covid19-phishing-campaign</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/creating-a-company-culture-for-security</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/credential-harvesting</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/credential-harvesting-fake-popups-microsoft-windows-os</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/customize-sat-content-with-ai-security-training-tool</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/cut-phishing-alert-volume-by-99-with-hoxhunt-respond</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/cyber-awareness-month-horror-stories</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/cyber-human-risk-industry-comparison</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/cyber-insurance-and-security-awareness-training</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/cyber-security-simulation-training</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/cyber-security-threats-in-manufacturing-industry</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/cybersecurity-at-step-zero-with-ciso-chris-castaldo-and-cto-pyry-avist</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/cybersecurity-awareness-month</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/cybersecurity-awareness-month-ideas</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/cybersecurity-awareness-roadmap</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/cybersecurity-awareness-training-and-cyber-insurance-the-future-of-risk-management</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/cybersecurity-awareness-year-in-review-2021</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/cybersecurity-behavior-change</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/cybersecurity-communications</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/cybersecurity-glossary-phishing</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/cybersecurity-in-a-hybrid-work-environment</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/cybersecurity-month-treesolutions-5-tips-on-cybersecurity</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/cyrm-mastering-the-management-of-cybersecurity-risk-with-david-x-martin</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/dawn-of-the-undead-king-of-malware-emotet</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/deepfake-attacks</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/deliveroo-feedback-survey-phishing-email</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/difference-between-a-security-awareness-and-human-risk-manager</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/disney-and-netflix-impersonation-fake-streaming-service-subscription-notices</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/domain-registration-phishing-attack</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/dora-regulation</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/email-security-best-practices</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/embedded-credential-harvesting-email</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/emotional-trigger-phish-off-the-hook</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/employee-false-sense-of-security</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/employee-first-security-awareness-training</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/employees-shopping-online-could-expose-your-company-to-cyber-threats</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/end-user-security-training</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/everything-you-wanted-to-know-about-malware-but-were-afraid-to-click-a-survival-guide</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/evolution-ciso-business-enabler-financial-industry</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/external-email-warning-banner-phish</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/fake-email-notification-about-a-signed-agreement-impersonates-adobe-acrobat-sign</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/fake-usps-package-notifications-harvests-your-mfa-tokens</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/fake-voicemail-notification-phishing-scam</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/fax-phishing</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/file-sharing-notification-phish-from-a-compromised-business-email</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/file-sharing-sites-phish</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/financially-motivated-cyber-attacks-on-executives-is-on-the-rise</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/five-cso-award-winners-and-one-hrm-partner-the-hoxhunt-advantage</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/foxit-pdf-file-execution-vulnerability-reported</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/foxit-pdf-vulnerability-reported</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/from-sleep-to-cybersecurity-the-science-of-human-cyber-performance</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/funds-transfer-phishing-attacks-work-better-with-a-crisis-off-the-hook</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/g2-awards-hoxhunt-14-spring-2023-badges</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/g2-summer-2023-hoxhunt-category-leader</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/g2-winter-2023</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/gamified-cyber-security-training</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/gartner-customers-choice-security-awareness-training</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/gartner-names-hoxhunt-a-security-behavior-and-culture-change-program-representative-provider</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/gartner-top-cybersecurity-trends-of-2024</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/george-finney-joins-the-ciso-sandbox-video-and-key-takeaways</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/george-finney-on-cybersecurity-and-fantasy-football</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/get-your-hands-off-my-crypto-wallet</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/gone-phishin-volume-2-late-july-2022</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/gone-phishin-volume-3</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/gone-phishin-volume-4-late-august-2022</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/gone-phishin-volume-5-early-to-mid-september-2022</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/gone-phishin-volume-6-mid-to-late-september-2022</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/gone-phishing-volume-7-early-to-mid-october-2022</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/gone-phishing-weekly-media-roundup-week-26-2022</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/great-expectations-how-the-ciso-can-shine-in-the-c-suite</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/gta-6-leaks-and-uber-hacked-through-social-engineering</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/guide-to-the-dod-phishing-awareness-challenge-9-key-takeaways</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/hackers-trick-people-by-making-them-believe-they-have-been-hacked-in-order-to-hack-them</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/have-you-seen-these-common-pretexting-techniques</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/hello-world-2</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/henri-heinonen-aktia-ciso-interview</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/hipaa-soc-2-compliance</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/hit-and-run-phishing-attack</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/holistic-cybersecurity-starting-with-culture-and-awareness-what-the-research-says-with-dr-dave-chatterjee-phd-professor-at-uga-and-author-of-cybersecurity-readiness</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/how-browser-features-easily-become-security-flaws</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/how-can-generative-ai-be-used-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/how-can-you-protect-your-organization-on-social-networking-sites</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/how-do-you-prove-security-awareness-is-working</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/how-effective-is-security-awareness-training</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/how-hackers-bypass-multifactor-authentication</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/how-hackers-hide-behind-trusted-services</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/how-hackers-prey-on-your-insecurity-personally-identifiable-information</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/how-much-does-phishing-really-cost-businesses</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/how-osint-is-used-against-your-employees</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/how-surveys-and-research-inquiries-can-be-harmful</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/how-to-achieve-90-reporting-and-completion-rates</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/how-to-avoid-catphishing</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/how-to-improve-engagement-in-security-awareness-training</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/how-to-improve-your-internal-email-communication-for-cybersecurity</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/how-to-influence-security-behaviors-insights-from-the-human-element-webinar-series</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/how-to-prevent-phishing</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/how-to-prevent-smishing</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/how-to-recognize-and-avoid-phishing-attacks</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/how-to-reduce-human-risk</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/how-to-run-a-phishing-simulation-test</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/hoxhunt-awarded-best-of-phishing-simulation-for-spring-2022-by-expert-insights</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/hoxhunt-challenge-social-media</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/hoxhunt-challenge-unknown-devices</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/hoxhunt-ciso-sandbox-webinar-with-dr-rebecca-wynn-on-holistic-leadership-key-takeaways</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/hoxhunt-competitors</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/hoxhunt-cracks-2023-deloitte-fast-50</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/hoxhunt-cyber-intelligence-house</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/hoxhunt-distinguished-in-2021-gartner-market-guide-for-security-awareness-computer-based-training</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/hoxhunt-earns-coveted-spot-on-g2s-2023-best-software-awards-for-emea-software-companies</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/hoxhunt-fantasy-football-as-a-security-metaphor-week-1</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/hoxhunt-fantasy-football-as-a-security-metaphor-week-2</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/hoxhunt-fastest-growing-software-company-in-finland-places-4th-in-deloitte-fast-50</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/hoxhunt-g2-category-leader-fall-2023</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/hoxhunt-guidepoint-security-partnership-security-behavior-change</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/hoxhunt-human-risk-management-uk-partners</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/hoxhunt-human-risk-report-on-critical-infrastructure-key-takeaways</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/hoxhunt-instant-feedback-webinar-key-takeaways-next-level-threat-reporting</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/hoxhunt-microsoft-partner-network</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/hoxhunt-most-innovative-security-education-globee</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/hoxhunt-named-winner-of-two-prestigious-global-infosec-awards-by-cyber-defense-magazine</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/hoxhunt-partners-with-kite-distribution-uki</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/hoxhunt-partners-with-microsoft-partner-of-the-year-kocho</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/hoxhunt-partners-with-secon-to-empower-uk-organisations-against-cyber-threats</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/hoxhunt-recognized-as-g2-spring-2022-leader-in-security-awareness-training-g2-reviewers-vote-us-into-top-place-overall-for-satisfaction-and-ease-of-use</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/hoxhunt-recognized-as-g2-winter-2022-leader-in-security-awareness-training</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/hoxhunt-recognized-by-g2-as-summer-2022-leader-and-best-usability-in-security-awareness-training</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/hoxhunt-recognized-by-g2-with-highest-users-likely-to-recommend-rating</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/hoxhunt-recognized-with-3-trustradius-awards</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/hoxhunt-reviews</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/hoxhunt-selected-as-award-winner-for-fall-2021-best-of-phishing-simulation-and-testing-by-expert-insights</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/hoxhunt-simulations-during-covid-19</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/hoxhunt-talks-ransomware-in-finlands-top-business-publication-cites-landmark-phishing-study</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/hoxhunt-teams-up-with-venor-to-boost-cybersecurity-in-sweden</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/hoxhunt-voice-phishing-training</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/hoxhunt-vs-adaptive-security</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/hoxhunt-vs-knowbe4</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/hoxinsert-attack-vector-outlook-web-app-owa-windows-vulnerability</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/hoxinsert-nsa-aots-quantuminsert-attack</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/hr-payroll-phishing-scam</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/human-cyber-risk-critical-infrastructure</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/human-cyber-risk-score</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/human-error-impacts-human-risk-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/human-firewall</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/human-risk-reduction-cybersecurity-metrics</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/impersonation-and-smishing-threats</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/infographic-data-breaches-in-the-workplace</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/infographic-gamification-in-the-workplace</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/infographic-make-or-break-phishing-metrics</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/insights-hoxhunt-cybersecurity-human-risk-benchmark-challenge</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/instant-feedback</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/interview-and-qa-with-professor-daniel-shoemaker-on-integrating-cybersecurity-with-the-c-suite</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/interview-with-dr-katherina-bernecker-gamification-and-its-impact-on-human-learning-behavior</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/interview-with-prof-dr-andreas-heinemann</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/interview-with-prof-dr-melanie-volkamer-tackling-each-users-individual-risk</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/introducing-the-ciso-phish-bowl-presented-by-hoxhunt</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/introducing-the-hoxhunt-behavioral-cybersecurity-report</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/introducing-three-new-products-and-hoxhunt-2-0-the-comprehensive-human-risk-management-platform</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/invoice-fraud</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/ios-mail-app-security-flaw</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/is-it-true-love-or-is-it-a-phish-fake-tinder-its-a-match-notification-phish</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/iso-iec-27001-compliance-and-cybersecurity-awareness-training</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/its-time-to-update-your-definition-of-phishing</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/jerich-beason-on-cybersecurity-leadership-and-inspirational-football-quotes</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/just-how-much-of-a-threat-is-business-email-compromise</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/justin-fields-and-the-hoxhunt-adaptive-coaching-model</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/key-learnings-from-the-sans-human-risk-summit</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/key-takeaways-from-hoxhunt-interview-with-barak-engel-virtual-ciso-and-author-of-the-security-hippie</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/knowbe4-competitors</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/knowbe4-vs-proofpoint</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/leadership-and-team-building-in-cybersecurity-lessons-from-a-fantasy-football-draft</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/leadership-support-phishing-training-program</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/link-security-awareness-training-to-your-lms-with-the-new-scorm-connector</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/lisa-kubicki-from-docusign-on-changing-behavior-with-the-hoxhunt-human-risk-management-platform</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/lisa-kubicki-from-docusign-talks-behavioral-psychology-and-security-awareness-in-the-ciso-sandbox</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/live-security-training-that-adapts-to-your-people-and-your-threat-landscape</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/loan-scam-emails</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/log4j-log4shell-vulnerability-explained-just-when-you-thought-it-was-safe-to-go-on-winter-holiday</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/logo-kits-upgrade-phishing-attacks</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/malicious-actors-create-svb-themed-phishing-attacks</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/managing-human-risk-in-cybersecurity-frost-sullivan-report</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/manufacturing-cyber-security-solutions</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/marking-legitimate-emails-as-safe</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/maxime-cartier-head-of-human-risk-management</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/mfa-fatigue</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/microsoft-teams-impersonation-fake-notification-of-teammates-trying-to-reach-you</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/mitigate-credential-harvesting-attacks-with-simulated-email-and-login-page-templates</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/new-cryptocurrency-phishing-attacks</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/new-gift-card-phishing-attacks</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/new-incident-orchestration-suite</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/new-phishing-technique-shows-alarming-vulnerability</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/new-social-media-phishing-campaigns</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/new-tax-phishing-attack-cp-2100-notice-campaign</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/nis-2-checklist-compliance-basics-for-the-cxo-and-board-of-directors</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/nis-2-compliance-ciso-executive-primer</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/nixu-hoxhunt-and-henri-heinonen-aktia-cybersecurity-awareness-month-webinar-select-transcript</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/nsa-cyber-attack-recreating-the-quantuminsert-to-phish-gmail-on-ios</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/oauth-phishing</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/off-the-hook-tax-phishing</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/office-365-credential-phishing</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/open-redirects-weaponizing-trust-built-by-legitimate-companies</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/password-protected-attachments-scam</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/patch-the-brain-with-gamified-learning</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/paypal-phishing-email-scams-2021-how-to-stay-off-the-hook</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/phish-bowl-school-of-cyber-leadership</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/phishing-101-how-phishing-attacks-and-scam-emails-work</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/phishing-attacks-and-scams-in-2019-and-beyond</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/phishing-emails-posing-as-alerts</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/phishing-kits-the-future-of-email-scams</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/phishing-red-flags</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/phishing-services-are-cheap</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/phishing-simulation-best-practices</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/phishing-simulation-best-practices-communicate-value</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/phishing-training</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/phishing-web-page-public-cloudflare-workers</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/phishmas-credential-harvesting</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/plan-your-training-curriculum-for-user-groups</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/porn-scams</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/postal-service-and-package-delivery-phishing</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/practical-phishing-cybersecurity-behavior-trends</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/pretexting-is-a-simple-and-effective-phishing-attack</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/proofpoint-competitors</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/protect-yourself-from-the-payment-available-phishing-email-scam</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/punitive-vs-positive-cybersecurity-awareness-training</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/qualcomm-wins-cso50-award-with-phishing-training-for-riskiest-employees-program</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/quarantine-phishing-emails</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/quishing</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/radical-reporting-author-sara-james-discusses-cybersecurity-communication-video-and-q-a</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/ransomware</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/ransomware-for-insider-activation-10-000-for-2-clicks</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/reach-every-employee-reduce-human-risk</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/recruitment-scams-the-hacker-ate-my-homework</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/refreshed-hoxhunt-user-interface</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/release-notes-schedule-training-packages-and-retail-training</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/release-notes-spear-phishing-agent-pharma-healthcare-training-streamlined-incident-response</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/release-notes-spring-update-hoxhunt-ios-app-remedial-training-notifications-owasp-training</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/remedial-training</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/repeat-offenders-phishing</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/report-saas-permissions-leave-huge-amounts-of-data-exposed</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/report-suspicious-text-messages-with-hoxhunt</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/richard-stiennon-joins-the-ciso-sandbox-and-talks-cyberwar-and-the-cybersecurity-industry-watch-the-video</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/right-to-left-override-attacks-are-relics-no-more</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/rookie-production-and-cybersecurity-innovation</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/santander-phishing-campaign-2020</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/sap-concur-impersonation-attack-tricks-employees-with-a-fake-report-pending-approval-notification</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/secure-message-phish-login-to-get-scammed</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/security-awareness-for-dummies-with-ira-winkler</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/security-awareness-kinsek</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/security-awareness-metrics</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/security-awareness-not-reducing-risk</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/security-awareness-topics-employees</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/security-awareness-training</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/security-awareness-training-doesnt-work</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/security-behavior-change-to-measure-true-risk-and-manage-human-risk</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/security-culture-eats-human-risk-for-breakfast</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/security-engagement</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/security-engagement-security-awareness-employee-training-comparison</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/security-frameworks</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/security-leaders-communication-playbook-8-key-takeaways</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/security-training-remote-employees</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/security-yearbook-and-dashboard-analysis-with-richard-stiennon</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/simulation-editor-create-outstanding-phishing-templates</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/social-engineering</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/social-engineering-defense</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/social-engineering-training</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/social-engineers-targeting-social-media-accounts</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/spam-vs-phishing</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/spear-phishing-agent</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/spear-phishing-credential-harvesting-ad-fraud</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/spear-phishing-vs-phishing</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/statistics-showing-5-phishing-trends-for-2019</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/summer-email-scam-trend-out-of-office-ooo-read-receipt-phishing-attacks</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/summer-release-2025</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/superhuman-detection-and-instant-user-feedback-for-your-soc</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/svg-phishing-email-attachments-mini-report</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/switching-to-hoxhunt-respond-from-knowbe4-phisher</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/targeted-payroll-phishing-attack-wants-to-steal-your-salary</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/ten-key-learnings-from-the-webinar-with-igt-ciso-kevin-delange</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/the-art-and-chaos-of-starting-a-new-leadership-position</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/the-future-of-phishing-spearphishing-and-bec-attacks-according-to-chatgpt</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/the-good-the-bad-and-the-ugly-about-browser-fingerprinting</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/the-most-brutal-phishing-techniques-where-they-came-from-and-why-they-are-used</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/the-power-of-cyber-practice</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/the-recipe-for-mitigating-human-risk</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/the-risk-of-new-employees-for-your-security-team-and-how-to-tackle-it</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/the-wall-street-journal-got-it-wrong-phishing-simulations-work-when-done-right</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/the-winding-road-to-hoxhunts-40-million-series-b-funding-round-leads-to-the-moon-with-mika-aalto-hoxhunt-co-founder-and-ceo</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/this-90s-internet-throwback-is-the-latest-hacking-trend</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/threat-feed-week-1</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/threat-feed-week-10-easypark-ebay-microsoft-disney-phishing-scams</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/threat-feed-week-13-starbucks-microsoft-paypal-apple-pay-and-more-phishing-attacks</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/threat-feed-week-14</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/threat-feed-week-15</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/threat-feed-week-16</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/threat-feed-week-17</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/threat-feed-week-18</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/threat-feed-week-19</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/threat-feed-week-2</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/threat-feed-week-20</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/threat-feed-week-21</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/threat-feed-week-22</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/threat-feed-week-23</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/threat-feed-week-24</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/threat-feed-week-25</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/threat-feed-week-26</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/threat-feed-week-27</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/threat-feed-week-28</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/threat-feed-week-29</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/threat-feed-week-3</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/threat-feed-week-30</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/threat-feed-week-31</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/threat-feed-week-32</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/threat-feed-week-33</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/threat-feed-week-34</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/threat-feed-week-35</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/threat-feed-week-36</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/threat-feed-week-37</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/threat-feed-week-38</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/threat-feed-week-39</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/threat-feed-week-4</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/threat-feed-week-40</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/threat-feed-week-41</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/threat-feed-week-42</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/threat-feed-week-43</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/threat-feed-week-44</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/threat-feed-week-45</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/threat-feed-week-46</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/threat-feed-week-47</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/threat-feed-week-48</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/threat-feed-week-49</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/threat-feed-week-5</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/threat-feed-week-50</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/threat-feed-week-51</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/threat-feed-week-52</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/threat-feed-week-6</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/threat-feed-week-7</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/threat-feed-week-8</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/threat-feed-week-9</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/threat-intelligence-aitm</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/threat-intelligence-feeds</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/three-steps-and-five-effects-of-the-phishing-attack-kill-chain</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/tiktok-phishing-link</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/tom-brady-embodies-the-power-of-instant-feedback</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/top-10-cybersecurity-takeaways-and-trends-in-2022</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/top-3-banking-phish-of-winter-2021</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/top-3-phishing-attack-factors-time-desktop-mobile</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/top-4-official-authority-impersonation-phishing-attacks-of-2021</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/top-4-ways-how-hackers-bypass-email-filters</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/top-5-things-lurking-behind-forbidden-phishing-links</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/top-five-everyday-life-phishing-attacks-in-spring-2022</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/train-your-employees-against-the-next-wave-of-phishing-deepfakes</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/true-risk-of-a-phishing-attack-breach</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/turn-security-policies-into-awareness-training-with-genai-content-generation</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/two-phishing-attacks-europe-december-2020</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/uh-oh-do-you-owe-when-invoices-strike-back</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/unprecedented-400-percent-us-tax-phishing-campaign-surge</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/update-regarding-the-apple-ios-mail-app-vulnerability</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/vishing-5-tips</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/vishing-attacks</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/webcam-cover</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/webinar-with-dan-lohrmann-award-winning-ciso-and-author-of-cyber-mayday</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/webinar-with-garrett-cook-and-michael-barone-cybersecurity-architects-of-g2</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/webinar-with-george-finney-award-winning-ciso-and-author-of-well-aware</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/webinar-with-kevin-delange-ciso-at-igt</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/webinar-with-lisa-kubicki</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/webinar-with-petri-kuivala-ciso-at-nxp</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/week-3-fantasy-football-as-a-cybersecurity-metaphor-roster-vulnerabilities-and-patches-updates</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/week-4-injuries-and-handcuffs-are-cybersecurity-recovery-plans-and-data-backups</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/week-5-seamless-security-tools-integration-and-qb-pass-catcher-stacks-behold-the-power-of-lamar-jackson-and-mark-andrews</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/whaling-phishing</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/what-are-the-top-10-costs-of-phishing</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/what-cisos-security-awareness-teams-can-learn-from-the-2024-verizon-dbir</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/what-is-a-clickfix-attack</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/what-is-a-good-phishing-failure-rate</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/what-is-a-spear-phishing-attack-and-how-do-you-recognize-it</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/what-is-an-soc-report</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/what-is-behavioural-cybersecurity</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/what-is-phishing-training</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/what-is-spear-phishing-and-how-do-you-recognize-it</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/what-is-the-biggest-unknown-risk-cybersecurity-and-how-do-you-solve-it</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/what-is-the-real-cost-of-phishing-in-2021</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/what-to-do-when-hackers-pose-as-it-or-tech-support</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/who-can-you-trust-with-dan-lohrmann-ciso-presidio</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/why-business-email-compromise-attacks-king-cybercrime</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/why-dont-phishing-simulations-reflect-real-attacks</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/why-finance-and-it-should-work-together-to-mitigate-security-risk</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/why-gitlab-employees-failed-the-phishing-test</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/why-ira-winkler-thinks-hoxhunt-is-unique</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/why-lloyds-created-a-social-media-style-security-awareness-training-program</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/why-security-awareness-plateaus-after-year-one</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/why-your-organization-needs-a-positive-cybersecurity-culture-and-training</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/wield-the-power-of-your-employees-against-attackers-with-continuous-security-awareness-training</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/winning-cyber-communications-playbooks</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/winning-in-sports-as-in-business</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/women-in-cybersecurity-its-time-to-get-more-diverse-says-kristin-helen-andersen</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/xsat-expanded-security-awareness-training</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/you-have-a-new-fake-voicemail</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/youve-been-mentioned-how-hackers-exploit-curiosity</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/blog/yu-kai-chou-gamification</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/webinars/10-steps-to-award-winning-sat-metrics</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/webinars/8-strategies-to-drive-security-awareness-year-round</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/webinars/8-tips-for-a-successful-cyber-awareness-month</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/webinars/9-cybersecurity-habits-to-maximize-sat-engagement</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/webinars/active-phishing-attacks-in-denmark</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/webinars/adopting-human-risk-management-from-awareness-to-action</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/webinars/applying-agentic-ai-in-spear-phishing-and-cyber-training</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/webinars/cyber-threat-intelligence-year-in-review-2025</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/webinars/cybersecurity-behavior-month-2025</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/webinars/death-taxes-and-phish-seasonality-in-threats-and-awareness-campaigns</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/webinars/emerging-human-risk-trends-of-2023</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/webinars/exclusive-interview-with-jessica-barker-author-of-hacked</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/webinars/gamifying-cybersecurity-securing-your-workforce-with-engaging-training</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/webinars/hope-or-hype-the-introduction-of-human-risk-management</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/webinars/how-not-to-be-fooled-by-ai-phishing-scams</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/webinars/how-to-automate-better-phishing-simulations-with-ai</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/webinars/how-to-comply-with-the-secs-new-cybersecurity-rules</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/webinars/how-to-customize-your-sat-content-with-generative-ai</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/webinars/how-to-get-started-with-security-awareness-training</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/webinars/how-to-measure-and-visualize-human-risk-on-demand</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/webinars/how-to-prevent-deepfake-phishing-scams</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/webinars/how-to-remediate-phishing-attacks-at-scale</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/webinars/human-risk-management-101</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/webinars/humans-vs-chatgpt-can-ai-trick-humans-with-phishing-attacks</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/webinars/international-women-in-cybersecurity-panel</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/webinars/leveraging-the-verizon-dbir-to-improve-your-security-awareness-program</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/webinars/leveraging-the-verizon-dbir-to-level-up-security-awareness-programs</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/webinars/making-cybersecurity-as-instinctual-as-seat-belts-with-copart</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/webinars/phishing-trends-and-outlook-for-2026</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/webinars/secure-by-default-navigating-the-security-awareness-landscape</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/webinars/security-awareness-predictions-for-2025</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/webinars/security-culture-eats-human-risk-for-breakfast</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/webinars/state-of-ai-phishing-2025</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/webinars/the-building-blocks-for-behavior-based-training</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/webinars/the-future-of-social-engineering</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/webinars/the-security-communications-playbook</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/webinars/the-security-mentalists-guide-to-influencing-human-behavior</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/webinars/top-phishing-threats-to-simulate-in-2025</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/webinars/top-phishing-trends-insights-and-benchmarks</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/webinars/top-phishing-trends-insights-and-benchmarks-2024</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/webinars/what-we-can-learn-from-curling-when-creating-secure-behaviors</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/webinars/your-guide-to-a-successful-security-champion-program</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/career-stories/career-stories-career-story-miska-junior-developer</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/career-stories/career-story-max-senior-software-developer</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/career-stories/career-story-mikael-senior-account-executive</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/company-bios/karri-kurunmaki</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/company-bios/mika-aalto</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/company-bios/pasi-salo</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/company-bios/pyry-avist</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/guide/best-cyber-security-training-for-employees</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/guide/how-to-create-behavior-change-with-security-awareness-training</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/guide/human-risk-management-playbook</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/guide/phishing-trends-bericht-2026</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/guide/phishing-trends-report</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/guide/security-awareness-training</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/guide/security-awareness-training-metrics</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/guide/tactical-threat-intelligence-report</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/guide/the-fundamentals-of-behavior-changing-cybersecurity-training</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/guide/threat-intelligence-report</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/guide/why-should-phishing-mitigation-be-your-top-priority</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/events/cso-2026-nashville-dinner-with-hoxhunt</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/events/gartner-security-risk-management-summit-2026-london</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/events/gartner-us-2026</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/events/le-salon</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/campaign/credentials-harvested</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/campaign/dont-scan-de</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/campaign/dont-scan-deutsch</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/campaign/dont-scan-en</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/campaign/dont-scan-en-1</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/campaign/dont-scan-english</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/campaign/dont-scan-es</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/campaign/dont-scan-fr</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/campaign/dont-scan-frc</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/de/fallstudie/eckes-granini</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/de/fallstudie/kaercher</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/de/fallstudie/pilatus</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/de/fallstudie/publishing-factory</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/de/fallstudie/victorinox</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/confirmation/8-strategies-to-drive-security-awareness-year-round</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/confirmation/8-tips-for-a-successful-cyber-awareness-month</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/confirmation/adopting-human-risk-management-from-awareness-to-action</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/confirmation/all-things-human-risk</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/confirmation/applying-agentic-ai-in-spear-phishing-and-cyber-training</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/confirmation/convene-dinner</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/confirmation/cyber-threat-intelligence-year-in-review-2025-thanks-for-registering</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/confirmation/cybersecurity-behavior-month-2025</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/confirmation/demo-confirmation-de</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/confirmation/demo-request-customer</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/confirmation/hope-or-hype-the-introduction-of-human-risk-management</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/confirmation/how-not-to-be-fooled-by-ai-phishing-scams</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/confirmation/how-to-get-started-with-security-awareness-training</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/confirmation/how-to-prevent-deepfake-phishing-scams</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/confirmation/how-to-remediate-phishing-attacks-at-scale</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/confirmation/international-women-in-cybersecurity-panel</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/confirmation/jessica-barker-author-interview</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/confirmation/leveraging-the-verizon-dbir-to-improve-your-security-awareness-program</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/confirmation/leveraging-the-verizon-dbir-to-level-up-security-awareness-programs</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/confirmation/making-cybersecurity-as-instinctual-as-seat-belts-with-copart</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/confirmation/meeting-confirmed</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/confirmation/qr-code-sticker</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/confirmation/rsa-discount-tickets</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/confirmation/rsac-2026-discount-codes-thankyou</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/confirmation/security-awareness-book-club</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/confirmation/security-awareness-predictions-for-2025</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/confirmation/sense</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/confirmation/thank-you-for-registering-for-the-webinar</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/confirmation/thank-you-for-registering-for-the-webinar-death-taxes-and-phishing</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/confirmation/thank-you-for-registering-for-the-webinar-phishing-trends-outlook-2026</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/confirmation/the-security-communications-playbook</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/confirmation/the-security-mentalists-guide-to-influencing-human-behavior</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/confirmation/threat-intelligence-report-download</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/confirmation/top-phishing-threats-to-simulate-in-2025</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/confirmation/top-phishing-trends-insights-and-benchmarks-for-2025</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/confirmation/unsubscribe</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/confirmation/your-guide-to-a-successful-security-champion-program</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/lp/all-things-human-risk</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/lp/behavioral-cybersecurity-statistics</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/lp/how-to-create-behavior-change-with-security-awareness-training</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/lp/hoxhunt-recognized-in-gartner-innovation-insight-report</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/lp/human-cyber-risk-report-critical-infrastructure</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/lp/maturity-assessment</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/lp/phishing-and-cyber-behavior-trends-2024</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/lp/phishing-trends-report-2026</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/lp/search-and-destroy-demo</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/lp/the-buyers-guide-to-phishing-training</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/lp/the-fundamentals-of-behavior-changing-cybersecurity-training</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/lp/the-guide-to-cybersecurity-training-metrics</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/lp/threat-intelligence</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/lp/why-should-phishing-mitigation-be-your-top-priority</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/legal/dpa</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/legal/privacy-policy</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/legal/subprocessors</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/legal/terms</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/legal/terms-poc</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/form/customer-referral-demo</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/form/cybersecurity-awareness-month-toolkit</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/form/download-phishing-trends-report-2026</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/form/hoxhunts-exclusive-convene-dinner</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/form/human-risk-management-masterclass-signup</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/form/influencer-program</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/form/knowbe4-alternative</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/form/newsletter-signup</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/form/qr-stickers</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/form/rsa-2025-discount-tickets</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/form/rsac-2026-discount-tickets</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/form/thank-you-message-test</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/form/threat-intelligence-report</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/demo-confirmation/discuss-quote-with-scott</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/demo-confirmation/meet-with-abbey</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/demo-confirmation/meet-with-hayli</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/demo-confirmation/meet-with-hoxhunt</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/demo-confirmation/meet-with-joe</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/demo-confirmation/meet-with-juha</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/demo-confirmation/meet-with-molly</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/demo-confirmation/meet-with-nick</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/demo-confirmation/meet-with-paige</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/demo-confirmation/meet-with-scott</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/author/elvi-lehtonen</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/author/james-briscoe</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/author/jon-gellin</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/author/maxime-cartier</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/author/minna-herlevi</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/author/petri-kuivala</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/podcast/a-cisos-playbook-for-security-comms-with-jeffrey-brown</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/podcast/ai-phishing-attacks-now-24-more-effective-than-humans-heres-how-to-fight-back</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/podcast/does-security-awareness-training-even-work-fixing-the-flaws-behind-training-fails-headlines</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/podcast/how-to-measure-behavior-change-moving-from-awareness-to-real-risk-reduction</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/podcast/if-completion-rates-dont-prove-anything-what-does</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/podcast/missed-rsa-2025-heres-what-cybersecurity-experts-are-really-talking-about</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/podcast/social-engineering-defense-dr-jessica-barker</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/podcast/state-of-phishing-2025-why-svgs-spiked</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/podcast/the-attacks-getting-through-your-filters-and-how-ai-is-scaling-social-engineering</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/podcast/the-ethical-guide-to-security-storytelling-navigating-real-breaches-with-care-and-respect</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/podcast/what-happens-when-users-keep-failing-and-should-we-punish-them</loc>
    </url>
    <url>
        <loc>https://hoxhunt.com/podcast/your-security-awareness-program-has-plateaued-what-happens-next</loc>
    </url>
</urlset>