<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
  <url>
    <loc>https://jssec.com/</loc>
    <lastmod>2026-03-28</lastmod>
  </url>
  <url>
    <loc>https://jssec.com/pricing</loc>
    <lastmod>2026-03-29</lastmod>
  </url>
  <url>
    <loc>https://jssec.com/contact</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://jssec.com/careers</loc>
    <lastmod>2026-03-28</lastmod>
  </url>
  <url>
    <loc>https://jssec.com/about/company</loc>
    <lastmod>2026-03-28</lastmod>
  </url>
  <url>
    <loc>https://jssec.com/glossary</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://jssec.com/phishing-website-removal</loc>
    <lastmod>2026-03-29</lastmod>
  </url>
  <url>
    <loc>https://jssec.com/brand-protection-guide</loc>
    <lastmod>2026-03-29</lastmod>
  </url>
  <url>
    <loc>https://jssec.com/report</loc>
    <lastmod>2026-03-29</lastmod>
  </url>
  <url>
    <loc>https://jssec.com/support</loc>
    <lastmod>2026-03-28</lastmod>
  </url>
  <url>
    <loc>https://jssec.com/book-demo</loc>
    <lastmod>2026-03-29</lastmod>
  </url>
  <url>
    <loc>https://jssec.com/policies/cookie</loc>
    <lastmod>2026-03-28</lastmod>
  </url>
  <url>
    <loc>https://jssec.com/policies/privacy</loc>
    <lastmod>2026-03-28</lastmod>
  </url>
  <url>
    <loc>https://jssec.com/policies/tos</loc>
    <lastmod>2026-03-28</lastmod>
  </url>
  <url>
    <loc>https://jssec.com/solutions/takedowns</loc>
    <lastmod>2026-03-28</lastmod>
    <image:image>
      <image:loc>https://jssec.com/assets/img/illustrations/takedown_tools.svg</image:loc>
      <image:title>Phishing Takedown Service</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://jssec.com/solutions/website-monitoring</loc>
    <lastmod>2026-03-28</lastmod>
    <image:image>
      <image:loc>https://jssec.com/assets/img/illustrations/website_monitoring.svg</image:loc>
      <image:title>Website Malware Monitoring Service</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://jssec.com/solutions/dark-web-scanning</loc>
    <lastmod>2026-03-28</lastmod>
    <image:image>
      <image:loc>https://jssec.com/assets/img/illustrations/header.svg</image:loc>
      <image:title>Dark Web Monitoring Service</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://jssec.com/solutions/phishing-simulation</loc>
    <lastmod>2026-03-28</lastmod>
    <image:image>
      <image:loc>https://jssec.com/assets/img/illustrations/phishing_simulation.svg</image:loc>
      <image:title>Phishing Simulation Service</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://jssec.com/industry/gaming</loc>
    <lastmod>2026-03-27</lastmod>
    <image:image>
      <image:loc>https://jssec.com/assets/img/illustrations/gaming_tools.svg</image:loc>
      <image:title>Gaming Security and Platform Protection Services</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://jssec.com/industry/manufacturing</loc>
    <lastmod>2026-03-27</lastmod>
    <image:image>
      <image:loc>https://jssec.com/assets/img/illustrations/manufactering.svg</image:loc>
      <image:title>Manufacturing Security Services</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://jssec.com/industry/retail</loc>
    <lastmod>2026-03-27</lastmod>
    <image:image>
      <image:loc>https://jssec.com/assets/img/illustrations/retail.svg</image:loc>
      <image:title>Retail Security and Brand Protection Services</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://jssec.com/industry/financial</loc>
    <lastmod>2026-03-27</lastmod>
    <image:image>
      <image:loc>https://jssec.com/assets/img/illustrations/financial.svg</image:loc>
      <image:title>Financial Security Monitoring Services</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://jssec.com/newsletter/unsubscribe</loc>
    <lastmod>2026-03-28</lastmod>
  </url>
  <url>
    <loc>https://jssec.com/blog</loc>
    <lastmod>2026-03-28</lastmod>
  </url>
  <url>
    <loc>https://jssec.com/blog/brand-impersonation-detection-response-removal</loc>
    <lastmod>2026-03-26</lastmod>
    <image:image>
      <image:loc>https://jssec.com/assets/img/illustrations/takedown_tools.svg</image:loc>
      <image:title>Brand Impersonation: How to Detect, Respond, and Remove Fake Websites (2026 Guide)</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://jssec.com/blog/how-to-remove-a-phishing-website-quickly</loc>
    <lastmod>2026-03-26</lastmod>
    <image:image>
      <image:loc>https://jssec.com/assets/img/illustrations/takedown_tools.svg</image:loc>
      <image:title>How to Remove a Phishing Website Quickly (Step-by-Step Guide)</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://jssec.com/blog/how-long-phishing-takedown-takes</loc>
    <lastmod>2026-03-19</lastmod>
    <image:image>
      <image:loc>https://jssec.com/assets/img/illustrations/takedown_tools.svg</image:loc>
      <image:title>How Long Does a Phishing Takedown Take? Timelines Explained (2026)</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://jssec.com/blog/how-to-detect-phishing-websites</loc>
    <lastmod>2026-03-04</lastmod>
    <image:image>
      <image:loc>https://jssec.com/assets/img/illustrations/phishing_simulation.svg</image:loc>
      <image:title>How to Detect Phishing Websites: Common Tactics Used by Attackers (2026 Guide)</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://jssec.com/blog/report-malicious-website-step-by-step</loc>
    <lastmod>2026-03-06</lastmod>
    <image:image>
      <image:loc>https://jssec.com/assets/img/illustrations/website_monitoring.svg</image:loc>
      <image:title>How to report a malicious website (step-by-step)</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://jssec.com/blog/what-is-dark-web-monitoring</loc>
    <lastmod>2026-02-14</lastmod>
    <image:image>
      <image:loc>https://jssec.com/assets/img/illustrations/website_monitoring.svg</image:loc>
      <image:title>What Is Dark Web Monitoring? How It Works and Why It Matters for Businesses</image:title>
    </image:image>
  </url>
</urlset>
