<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 3, 2026 at 8:15 pm by All in One SEO v4.9.3 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://ashes-cybersecurity.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Ashes Cybersecurity</title>
		<link><![CDATA[https://ashes-cybersecurity.com]]></link>
		<description><![CDATA[Ashes Cybersecurity]]></description>
		<lastBuildDate><![CDATA[Wed, 10 Dec 2025 06:59:34 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://ashes-cybersecurity.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://ashes-cybersecurity.com/ashes-cti-docs/]]></guid>
			<link><![CDATA[https://ashes-cybersecurity.com/ashes-cti-docs/]]></link>
			<title>Ashes CTI Docs</title>
			<pubDate><![CDATA[Wed, 10 Dec 2025 06:59:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ashes-cybersecurity.com/ashes-cti-introduction/]]></guid>
			<link><![CDATA[https://ashes-cybersecurity.com/ashes-cti-introduction/]]></link>
			<title>Ashes CTI: Local Threat Intelligence Overview</title>
			<pubDate><![CDATA[Tue, 31 Mar 2026 09:30:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ashes-cybersecurity.com/solutions/]]></guid>
			<link><![CDATA[https://ashes-cybersecurity.com/solutions/]]></link>
			<title>Solutions</title>
			<pubDate><![CDATA[Thu, 06 Nov 2025 07:51:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ashes-cybersecurity.com/portfolio/]]></guid>
			<link><![CDATA[https://ashes-cybersecurity.com/portfolio/]]></link>
			<title>Adversarial Emulation</title>
			<pubDate><![CDATA[Thu, 06 Nov 2025 07:50:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ashes-cybersecurity.com/ashescti/]]></guid>
			<link><![CDATA[https://ashes-cybersecurity.com/ashescti/]]></link>
			<title>Ashes CTI &#8211; Windows Threat Intelligence Workstation for SOC Analysts</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 10:54:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ashes-cybersecurity.com/contact/]]></guid>
			<link><![CDATA[https://ashes-cybersecurity.com/contact/]]></link>
			<title>Contact</title>
			<pubDate><![CDATA[Thu, 11 Dec 2025 07:56:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ashes-cybersecurity.com/product/ashes-cti/]]></guid>
			<link><![CDATA[https://ashes-cybersecurity.com/product/ashes-cti/]]></link>
			<title>Ashes Cyber Threat Intelligence</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 10:25:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ashes-cybersecurity.com/ashes-cti-changelog/]]></guid>
			<link><![CDATA[https://ashes-cybersecurity.com/ashes-cti-changelog/]]></link>
			<title>Ashes CTI &#8211; Changelog</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 10:20:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ashes-cybersecurity.com/elastic-edr-0-day-part-2/]]></guid>
			<link><![CDATA[https://ashes-cybersecurity.com/elastic-edr-0-day-part-2/]]></link>
			<title>Elastic EDR 0-day, Part II: Technical Evidence and the Trigger</title>
			<pubDate><![CDATA[Fri, 29 Aug 2025 14:32:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ashes-cybersecurity.com/shop/]]></guid>
			<link><![CDATA[https://ashes-cybersecurity.com/shop/]]></link>
			<title>Shop</title>
			<pubDate><![CDATA[Fri, 24 Oct 2025 11:09:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ashes-cybersecurity.com/security-advisory-ashes-2025-001-elastic-endpoint-kernel-driver-vulnerability/]]></guid>
			<link><![CDATA[https://ashes-cybersecurity.com/security-advisory-ashes-2025-001-elastic-endpoint-kernel-driver-vulnerability/]]></link>
			<title>Security Advisory ASHES-2025-001: Elastic Endpoint Kernel Driver Vulnerability</title>
			<pubDate><![CDATA[Fri, 21 Nov 2025 09:29:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ashes-cybersecurity.com/elastic-edr-0-day-security-advisory/]]></guid>
			<link><![CDATA[https://ashes-cybersecurity.com/elastic-edr-0-day-security-advisory/]]></link>
			<title>Elastic EDR 0-day Security Advisory</title>
			<pubDate><![CDATA[Fri, 21 Nov 2025 08:54:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ashes-cybersecurity.com/ashesctifeatures/]]></guid>
			<link><![CDATA[https://ashes-cybersecurity.com/ashesctifeatures/]]></link>
			<title>Ashes CTI Features &#8211; Threat Intelligence Workstation</title>
			<pubDate><![CDATA[Fri, 06 Mar 2026 07:58:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ashes-cybersecurity.com/home2/]]></guid>
			<link><![CDATA[https://ashes-cybersecurity.com/home2/]]></link>
			<title>Home</title>
			<pubDate><![CDATA[Tue, 02 Dec 2025 12:41:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ashes-cybersecurity.com/0-day-research/]]></guid>
			<link><![CDATA[https://ashes-cybersecurity.com/0-day-research/]]></link>
			<title>0-Day Research</title>
			<pubDate><![CDATA[Fri, 29 Aug 2025 14:27:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ashes-cybersecurity.com/elementor-hf/site-header/]]></guid>
			<link><![CDATA[https://ashes-cybersecurity.com/elementor-hf/site-header/]]></link>
			<title>Site Header</title>
			<pubDate><![CDATA[Sat, 05 Apr 2025 20:04:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ashes-cybersecurity.com/]]></guid>
			<link><![CDATA[https://ashes-cybersecurity.com/]]></link>
			<title>Home</title>
			<pubDate><![CDATA[Fri, 06 Mar 2026 09:28:00 +0000]]></pubDate>
		</item>
				</channel>
</rss>
