<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.invictus-ir.com</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/solutions</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/solutions/protect</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/news</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/contact</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/24-7</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/solutions/prepare</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/solutions/respond</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/about</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/technology</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/success</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/privacy-policy</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/cloud-incident-response</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/news/5-tips-to-prevent-or-limit-the-impact-of-an-incident-in-azure</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/news/a-candid-perspective-on-the-cloud-threat-landscape-a-recap-from-fwd-cloudsec-eu</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/news/a-deep-dive-into-entra-id-identity-protection-for-incident-response</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/news/a-defenders-guide-to-graphrunner-part-i</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/news/a-defenders-guide-to-graphrunner-part-ii</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/news/a-royal-update</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/news/anatomy-of-a-bec-in-2025</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/news/atlas-lion-tactics-history-defenses</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/news/automated-aws-incident-response-the-next-episode</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/news/automated-first-response-in-aws-using-sigma-and-athena</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/news/aws-cloudtrail-cheat-sheet</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/news/black-hat-first-look-meet-the-new-microsoft-extractor-suite-v4</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/news/cloud-heavy-hybrid-ready-lessons-from-blackbasta-and-scattered-spider</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/news/cloud-incident-readiness-a-practical-playbook-for-cisos-and-teams-2</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/news/cloud-incident-readiness-critical-infrastructure-for-cloud-incident-response</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/news/cloud-incident-readiness-key-logs-for-cloud-incidents</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/news/cloud-incident-response-trainings</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/news/cloud-native-incident-response-in-aws---part-i</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/news/cloud-native-incident-response-in-aws---part-ii</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/news/dawnguard-and-invictus-incident-response-forge-strategic-partnership-to-redefine-cloud-security-and-resilience</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/news/do-not-use-the-get-mgauditlogsignin-for-your-investigations</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/news/entra-oauth-risk-consent-epidemic</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/news/everything-you-need-to-know-about-the-microsoftgraphactivitylogs</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/news/forensic-analysis-of-em-client</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/news/importing-windows-event-log-files-into-splunk</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/news/incident-response-in-azure</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/news/incident-response-in-kubernetes-eks</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/news/incident-response-in-the-neocloud</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/news/incident-response-in-the-neocloud---lambda-cloud-part-2</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/news/introducing-kubeforensys-a-kubernetes-forensic-collection-framework-for-azure-kubernetes-service</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/news/introduction-of-the-microsoft-365-extractor-suite</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/news/invictus-appoints-curtis-hanson-as-managing-partner</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/news/locked-out-dropboxed-in-when-bec-threats-innovate</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/news/major-update-v-1-2-for-the-microsoft-extractor-suite</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/news/profiling-javaghost-tactics-history-defenses</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/news/profiling-laundry-bear-tactics-history-defenses</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/news/profiling-sea-turtle-tactics-history-defenses</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/news/profiling-silk-typhoon-tactics-history-defenses</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/news/profiling-tradetraitor-tactics-history-defenses</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/news/ransomware-in-the-cloud</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/news/responding-to-a-cobalt-strike-attack-part-i</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/news/responding-to-a-cobalt-strike-attack-part-ii</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/news/responding-to-a-cobalt-strike-attack-part-iii</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/news/responding-to-adversary-in-the-middle-attacks</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/news/responding-to-an-attack-in-aws</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/news/responding-to-macos-attacks-part-i</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/news/responding-to-macos-attacks-part-ii</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/news/set-up-splunk-for-incident-response-in-gcp-in-15-minutes</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/news/the-azure-log-you-probably-didnt-know-existed</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/news/the-curious-case-of-dangerdev-protonmail-me</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/news/the-evolution-of-business-email-compromise</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/news/the-invisible-architecture-of-modern-phishing</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/news/the-microsoft-extractor-suite-v3</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/news/the-missing-link-aadgraphactivitylogs-finally-arrives</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/news/the-poisoned-pipeline-axios-supply-chain-attack</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/news/the-silent-saas-threat-part-2</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/news/the-story-of-how-we-almost-got-hacked</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/news/this-is-how-we-do-it-resolving-microsoft-cloud-incidents-like-pros</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/news/top-5-windows-events-for-incident-response</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/news/training-schedule---2025</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/news/training-update-2024</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/news/using-microsoft-graph-for-unified-audit-log-acquisitions</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/news/welcome-microsoft-extractor-suite</loc>
    </url>
    <url>
        <loc>https://www.invictus-ir.com/news/what-dfir-experts-need-to-know-about-the-current-state-of-the-unified-audit-log</loc>
    </url>
</urlset>