<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.averlon.ai</loc>
    </url>
    <url>
        <loc>https://www.averlon.ai/terms-of-service</loc>
    </url>
    <url>
        <loc>https://www.averlon.ai/privacy-policy</loc>
    </url>
    <url>
        <loc>https://www.averlon.ai/demo</loc>
    </url>
    <url>
        <loc>https://www.averlon.ai/blog</loc>
    </url>
    <url>
        <loc>https://www.averlon.ai/platform</loc>
    </url>
    <url>
        <loc>https://www.averlon.ai/careers</loc>
    </url>
    <url>
        <loc>https://www.averlon.ai/contact</loc>
    </url>
    <url>
        <loc>https://www.averlon.ai/about</loc>
    </url>
    <url>
        <loc>https://www.averlon.ai/events-webinars</loc>
    </url>
    <url>
        <loc>https://www.averlon.ai/why-averlon</loc>
    </url>
    <url>
        <loc>https://www.averlon.ai/whitepapers</loc>
    </url>
    <url>
        <loc>https://www.averlon.ai/blog/ai-poisoning-attacks</loc>
    </url>
    <url>
        <loc>https://www.averlon.ai/blog/averlon-and-wiz-accelerate-remediation-and-reduce-exposure</loc>
    </url>
    <url>
        <loc>https://www.averlon.ai/blog/averlon-comes-out-of-stealth-mode-with-10m-in-funding-to-advance-ai-powered-cloud-security</loc>
    </url>
    <url>
        <loc>https://www.averlon.ai/blog/averlon-github-advanced-security</loc>
    </url>
    <url>
        <loc>https://www.averlon.ai/blog/averlon-precog-preventing-exposure-before-backlog</loc>
    </url>
    <url>
        <loc>https://www.averlon.ai/blog/close-remediation-gap-tenable-averlon</loc>
    </url>
    <url>
        <loc>https://www.averlon.ai/blog/cve-2024-50623-cleo-vulnerability</loc>
    </url>
    <url>
        <loc>https://www.averlon.ai/blog/cve-2026-33634-trivy-and-litellm-supply-chain-attacks</loc>
    </url>
    <url>
        <loc>https://www.averlon.ai/blog/eliminate-appsec-overload-snyk-averlon</loc>
    </url>
    <url>
        <loc>https://www.averlon.ai/blog/fedramp-rfc-0012</loc>
    </url>
    <url>
        <loc>https://www.averlon.ai/blog/float-like-an-ip-sting-like-a-bee-azures-floating-ip-feature-network-security-groups</loc>
    </url>
    <url>
        <loc>https://www.averlon.ai/blog/from-npm-backdoors-to-worms</loc>
    </url>
    <url>
        <loc>https://www.averlon.ai/blog/from-theory-to-practice-how-the-attack-chain-view-helps</loc>
    </url>
    <url>
        <loc>https://www.averlon.ai/blog/github-dependabot-integration-averlon</loc>
    </url>
    <url>
        <loc>https://www.averlon.ai/blog/ingressnightmare-golang-versioning-scanner-failure</loc>
    </url>
    <url>
        <loc>https://www.averlon.ai/blog/know-your-exposure-visibility-gaps</loc>
    </url>
    <url>
        <loc>https://www.averlon.ai/blog/kubernetes-ingressnightmare-nginx-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.averlon.ai/blog/kubernetes-resource-exhaustion-risks</loc>
    </url>
    <url>
        <loc>https://www.averlon.ai/blog/navigating-cloud-network-complexity</loc>
    </url>
    <url>
        <loc>https://www.averlon.ai/blog/nextjs-cve-2025-29927-header-injection</loc>
    </url>
    <url>
        <loc>https://www.averlon.ai/blog/patching-ec2-with-aws-ssm-patch-manager</loc>
    </url>
    <url>
        <loc>https://www.averlon.ai/blog/react2shell-cve-2025-55182-explained</loc>
    </url>
    <url>
        <loc>https://www.averlon.ai/blog/shrink-exposure-window-with-upwind-averlon</loc>
    </url>
    <url>
        <loc>https://www.averlon.ai/blog/the-quest-for-precision-in-cybersecurity-why-genai-must-adapt-to-win</loc>
    </url>
    <url>
        <loc>https://www.averlon.ai/blog/the-unbearable-weight-of-massive-cve-numbers</loc>
    </url>
    <url>
        <loc>https://www.averlon.ai/blog/vulnerability-age-filter-is-a-security-liability</loc>
    </url>
    <url>
        <loc>https://www.averlon.ai/blog/vulnerability-intelligence-brief-cve-2025-11953-react-native-metro-command-injection</loc>
    </url>
    <url>
        <loc>https://www.averlon.ai/blog/vulnerability-remediation-down-and-up-we-go</loc>
    </url>
    <url>
        <loc>https://www.averlon.ai/blog/what-the-vercel-context-ai-incident-means-for-you</loc>
    </url>
    <url>
        <loc>https://www.averlon.ai/blog/when-permissions-become-the-attack-surface</loc>
    </url>
    <url>
        <loc>https://www.averlon.ai/blog/why-agentic-ai-must-think-in-cohorts</loc>
    </url>
    <url>
        <loc>https://www.averlon.ai/whitepapers/6-smart-security-habits-for-startups</loc>
    </url>
    <url>
        <loc>https://www.averlon.ai/whitepapers/esg-automating-risk-reduction-ai-era</loc>
    </url>
    <url>
        <loc>https://www.averlon.ai/webinars/container-and-kubernetes-security-demo</loc>
    </url>
    <url>
        <loc>https://www.averlon.ai/webinars/governance-risk-and-remediation-in-the-age-of-ai</loc>
    </url>
    <url>
        <loc>https://www.averlon.ai/webinars/inside-uipath-redefining-security-ai-era</loc>
    </url>
    <url>
        <loc>https://www.averlon.ai/webinars/preventing-exploitable-risk-demo</loc>
    </url>
    <url>
        <loc>https://www.averlon.ai/webinars/remediation-ops-live-demo</loc>
    </url>
    <url>
        <loc>https://www.averlon.ai/webinars/vulnerabilities-in-mergers-acquisitions</loc>
    </url>
</urlset>