<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" generatedBy="WIX">
<url>
<loc>https://www.threathunter.com/research/fraudsters-tap-u.s.-landline-supply%3A-monthly-global-identity-intelligence-briefing-(mar-1st-to-31st%2C-2026)</loc>
<lastmod>2026-04-09</lastmod>
</url>
<url>
<loc>https://www.threathunter.com/research/fraud-networks-accelerate-on-social-platforms-global-identity-intelligence-briefing-feb-1-28-2026</loc>
<lastmod>2026-04-06</lastmod>
</url>
<url>
<loc>https://www.threathunter.com/research/software-services-overtake-global-identity-intelligence-briefing-jan-1-31-2026</loc>
<lastmod>2026-04-06</lastmod>
</url>
<url>
<loc>https://www.threathunter.com/research/cross%E2%80%91border-exploitation-risk%3A-high%E2%80%91return-fraud-schemes-in-the-underground-economy</loc>
<lastmod>2026-04-06</lastmod>
</url>
<url>
<loc>https://www.threathunter.com/research/kyc-attacks-enter-the-era-of-industrialization%2C-threat-hunter-reveals-in-2025-risk-landscape-report</loc>
<lastmod>2026-03-06</lastmod>
</url>
<url>
<loc>https://www.threathunter.com/research/the-launch-of-darksphere</loc>
<lastmod>2026-03-06</lastmod>
</url>
<url>
<loc>https://www.threathunter.com/research/threat-hunter-to-exhibit-at-worldef-dubai-2026</loc>
<lastmod>2026-03-06</lastmod>
</url>
<url>
<loc>https://www.threathunter.com/research/fraud-signals-surged-226%25-in-2025-as-refund-abuse-evolves-into-a-service-business.</loc>
<lastmod>2026-03-06</lastmod>
</url>
<url>
<loc>https://www.threathunter.com/research/executive-briefing%3A-the-hidden-supply-chains-behind-counterfeit-and-substandard-goods-in-global-e-commerce</loc>
<lastmod>2026-04-06</lastmod>
</url>
<url>
<loc>https://www.threathunter.com/research/executive-briefing%3A-kyc-attack-risk-landscape-2025</loc>
<lastmod>2026-03-06</lastmod>
</url>
<url>
<loc>https://www.threathunter.com/research/executive-briefing%3A-global-e-commerce-fraud-risk-2025</loc>
<lastmod>2026-03-06</lastmod>
</url>
<url>
<loc>https://www.threathunter.com/research/malicious-mobile-numbers-pivot-to-landline-supply%3A-global-identity-intelligence-briefing-(nov-1%E2%80%9330%2C-2025)</loc>
<lastmod>2026-03-06</lastmod>
</url>
<url>
<loc>https://www.threathunter.com/research/sms-hijacking-via-low-end-devices-surges-globally%3A-monthly-global-identity-intelligence-briefing-(oct-1st-to-31st-2025)</loc>
<lastmod>2026-03-06</lastmod>
</url>
<url>
<loc>https://www.threathunter.com/research/underground-networks-intensify-sms-hijacking%3A-bi-weekly-global-identity-intelligence-briefing-(sep-1st-to-30th-2025)</loc>
<lastmod>2026-03-06</lastmod>
</url>
<url>
<loc>https://www.threathunter.com/research/escalation-in-mobile-number-abuse%3A-bi-weekly-global-identity-intelligence-briefing-(july-16th-to-31st%2C-2025)</loc>
<lastmod>2026-03-06</lastmod>
</url>
<url>
<loc>https://www.threathunter.com/research/mobile-number-fraud-surveillance%3A-bi-weekly-global-identity-intelligence-briefing-(july-1st-to-15th-2025)</loc>
<lastmod>2026-03-06</lastmod>
</url>
<url>
<loc>https://www.threathunter.com/research/panoramic-analysis-of-global-payment-card-leaks-and-fraud-ecosystem</loc>
<lastmod>2026-03-06</lastmod>
</url>
<url>
<loc>https://www.threathunter.com/research/synthetic-tracking-id-fraud%3A-the-silent-killer-of-cross-border-logistics</loc>
<lastmod>2026-03-06</lastmod>
</url>
<url>
<loc>https://www.threathunter.com/research/investigating-fraudulent-supply-chains-in-global-e-commerce</loc>
<lastmod>2026-03-06</lastmod>
</url>
<url>
<loc>https://www.threathunter.com/research/the-evolving-landscape-of-digital-payment-fraud</loc>
<lastmod>2026-03-06</lastmod>
</url>
<url>
<loc>https://www.threathunter.com/research/illicit-e-commerce-store-account-transactons-%26-associated-risks</loc>
<lastmod>2026-03-06</lastmod>
</url>
<url>
<loc>https://www.threathunter.com/research/global-underground-industry-intelligence-update</loc>
<lastmod>2026-03-06</lastmod>
</url>
<url>
<loc>https://www.threathunter.com/research/a-brief-analytics-on-unauthorized-brand-representation</loc>
<lastmod>2026-03-06</lastmod>
</url>
<url>
<loc>https://www.threathunter.com/research/bi-weekly-global-identity-intelligence-briefing%EF%BC%9Areal-time-risk-intelligence-on-mobile-access-fraud-(2025.05.16-05.30)</loc>
<lastmod>2026-03-06</lastmod>
</url>
<url>
<loc>https://www.threathunter.com/research/the-dark-side-of-digital-retail</loc>
<lastmod>2026-03-06</lastmod>
</url>
<url>
<loc>https://www.threathunter.com/research/forged-identities-the-dark-side-of-kyc-evasion</loc>
<lastmod>2026-03-06</lastmod>
</url>
<url>
<loc>https://www.threathunter.com/research/forged-identities%3A-the-dark-side-of-kyc-evasion</loc>
<lastmod>2026-03-06</lastmod>
</url>
<url>
<loc>https://www.threathunter.com/research/ai-powered-live-the-unmanned-revolution</loc>
<lastmod>2026-03-06</lastmod>
</url>
</urlset>