<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://raven.io/terms-of-services</loc>
    </url>
    <url>
        <loc>https://raven.io/book-a-demo</loc>
    </url>
    <url>
        <loc>https://raven.io/privacy-policy</loc>
    </url>
    <url>
        <loc>https://raven.io/runtime-sca</loc>
    </url>
    <url>
        <loc>https://raven.io/company</loc>
    </url>
    <url>
        <loc>https://raven.io/use-cases/delay-a-fix-and-stay-protected</loc>
    </url>
    <url>
        <loc>https://raven.io/blog</loc>
    </url>
    <url>
        <loc>https://raven.io/runtime-prevention</loc>
    </url>
    <url>
        <loc>https://raven.io/runtime-adr</loc>
    </url>
    <url>
        <loc>https://raven.io/use-cases/cvss-10-with-no-risk</loc>
    </url>
    <url>
        <loc>https://raven.io/use-cases/stop-attack</loc>
    </url>
    <url>
        <loc>https://raven.io/use-cases/eliminate-the-exposure-window</loc>
    </url>
    <url>
        <loc>https://raven.io/use-cases/protect-third-party-applications-independently</loc>
    </url>
    <url>
        <loc>https://raven.io/terms-and-conditions</loc>
    </url>
    <url>
        <loc>https://raven.io/ninjas-landing-page</loc>
    </url>
    <url>
        <loc>https://raven.io/resources-center</loc>
    </url>
    <url>
        <loc>https://raven.io/scaisbroken</loc>
    </url>
    <url>
        <loc>https://raven.io/use-cases/protect-ai-and-llm-models</loc>
    </url>
    <url>
        <loc>https://raven.io/rsa25</loc>
    </url>
    <url>
        <loc>https://raven.io/gartner</loc>
    </url>
    <url>
        <loc>https://raven.io/use-cases/shift-left</loc>
    </url>
    <url>
        <loc>https://raven.io/use-cases/sbom-aibom</loc>
    </url>
    <url>
        <loc>https://raven.io/use-cases/vex</loc>
    </url>
    <url>
        <loc>https://raven.io/use-cases/transitive-dependencies</loc>
    </url>
    <url>
        <loc>https://raven.io/blackhat2025</loc>
    </url>
    <url>
        <loc>https://raven.io</loc>
    </url>
    <url>
        <loc>https://raven.io/runtime-ai-agents</loc>
    </url>
    <url>
        <loc>https://raven.io/runtime-gatekeeper</loc>
    </url>
    <url>
        <loc>https://raven.io/solutions/internet-facing-applications</loc>
    </url>
    <url>
        <loc>https://raven.io/solutions/database-protection</loc>
    </url>
    <url>
        <loc>https://raven.io/solutions/application-aware-cloud-threat-hunting</loc>
    </url>
    <url>
        <loc>https://raven.io/solutions/high-compliance-environments</loc>
    </url>
    <url>
        <loc>https://raven.io/rsac</loc>
    </url>
    <url>
        <loc>https://raven.io/ai-vs-waf</loc>
    </url>
    <url>
        <loc>https://raven.io/pricing</loc>
    </url>
    <url>
        <loc>https://raven.io/resources-center/cve-less-ebook</loc>
    </url>
    <url>
        <loc>https://raven.io/blog/7-reasons-why-attackers-shifted-towards-cloud-applications</loc>
    </url>
    <url>
        <loc>https://raven.io/blog/alice-in-java-land-an-adventure-with-loaders-the-classpath-and-whimsical-wisdom</loc>
    </url>
    <url>
        <loc>https://raven.io/blog/analyzing-python-rpc-py-rce-exploit-using-panda-step-by-step</loc>
    </url>
    <url>
        <loc>https://raven.io/blog/application-security-vs-product-security</loc>
    </url>
    <url>
        <loc>https://raven.io/blog/axios-wasnt-just-compromised-it-was-weaponized</loc>
    </url>
    <url>
        <loc>https://raven.io/blog/debugging-ebpf-verifier-best-practices-for-high-performance-kernel-programming</loc>
    </url>
    <url>
        <loc>https://raven.io/blog/ebpf-unleashed-the-future-of-runtime-application-security</loc>
    </url>
    <url>
        <loc>https://raven.io/blog/if-it-doesnt-execute-ignore-it</loc>
    </url>
    <url>
        <loc>https://raven.io/blog/next-gen-phishing-for-developers-the-rise-of-supply-chain-attacks-and-third-party-exploits-in-cloud-security</loc>
    </url>
    <url>
        <loc>https://raven.io/blog/raven-raises-20m-seed-round-to-protect-applications-at-runtime-even-without-signatures-or-cves</loc>
    </url>
    <url>
        <loc>https://raven.io/blog/reachability-re-imagined</loc>
    </url>
    <url>
        <loc>https://raven.io/blog/runtime-reachability-vs-static-reachability</loc>
    </url>
    <url>
        <loc>https://raven.io/blog/the-critical-need-for-cloud-runtime-application-security</loc>
    </url>
    <url>
        <loc>https://raven.io/blog/the-deepest-research-on-the-react2shell-cve-2025-55182-and-why-your-waf-rule-patch-leaves-you-exposed</loc>
    </url>
    <url>
        <loc>https://raven.io/blog/the-need-for-runtime-adr-if-your-app-is-a-black-box-your-security-strategy-is-too</loc>
    </url>
    <url>
        <loc>https://raven.io/blog/understanding-the-relationship-between-vulnerabilities-and-exploits</loc>
    </url>
    <url>
        <loc>https://raven.io/blog/what-are-cve-less-threats</loc>
    </url>
    <url>
        <loc>https://raven.io/blog/why-its-so-hard-to-triage-application-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://raven.io/blog/why-static-analysis-falls-short-in-dynamic-programming-languages</loc>
    </url>
</urlset>