<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="sitemap.xsl"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:xhtml="http://www.w3.org/1999/xhtml">
<url>
    <loc>https://licelus.com/insights</loc>
    <lastmod>2024-03-04T08:33:46+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/052a983032-1707503308/droidcon-promo.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/71cbc072f1-1707503308/guide-promo.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/1032d23c24-1707503308/licel_og.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/protecting-tracking-apps-in-the-post-coronavirus-world</loc>
    <lastmod>2024-08-28T07:48:41+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/protecting-tracking-apps-in-the-post-coronavirus-world/662579e558-1707503308/friends.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/protecting-tracking-apps-in-the-post-coronavirus-world/3886fd09f0-1707503308/friends_landscape.png</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/why-its-so-important-that-we-protect-the-connected-car</loc>
    <lastmod>2024-08-28T07:48:41+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/why-its-so-important-that-we-protect-the-connected-car/97428cc968-1707503308/connected-car.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/why-its-so-important-that-we-protect-the-connected-car/c28ae19a2b-1707503308/connected-car_landscape.png</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/why-striking-a-balance-between-speed-and-security-is-key-to-iot-success</loc>
    <lastmod>2024-08-28T07:48:41+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/why-striking-a-balance-between-speed-and-security-is-key-to-iot-success/33fdae09f7-1707503308/fishtank.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/why-striking-a-balance-between-speed-and-security-is-key-to-iot-success/5cd0203d58-1707503308/fishtank_article.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/how-to-secure-a-safer-future-for-mobile-banking</loc>
    <lastmod>2024-08-28T07:48:41+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/how-to-secure-a-safer-future-for-mobile-banking/a35594e519-1707503308/mobile-baking.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/how-to-secure-a-safer-future-for-mobile-banking/f89b68a734-1707503308/mobile-banking_landscape.png</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/the-risks-that-threaten-the-success-of-track-and-trace-apps</loc>
    <lastmod>2024-08-28T07:48:41+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/the-risks-that-threaten-the-success-of-track-and-trace-apps/917fbce106-1707503308/map.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/the-risks-that-threaten-the-success-of-track-and-trace-apps/866344b0d0-1707503308/map_article.png</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/do-remote-critical-checks-offer-a-way-in-for-bad-actors</loc>
    <lastmod>2024-08-28T07:48:41+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/do-remote-critical-checks-offer-a-way-in-for-bad-actors/b4a8707404-1707503308/sending-message.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/do-remote-critical-checks-offer-a-way-in-for-bad-actors/48276ed670-1707503308/sending-message_thumbnail.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/how-to-counter-man-in-the-middle-attacks</loc>
    <lastmod>2024-08-28T07:48:41+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/how-to-counter-man-in-the-middle-attacks/54646a7a0b-1707503308/cafe.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/how-to-counter-man-in-the-middle-attacks/98140871c2-1707503308/cafe_landscape.png</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/the-iot-landscape-in-2020-and-the-need-to-keep-our-connected-devices-secure</loc>
    <lastmod>2024-11-27T07:57:47+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/the-iot-landscape-in-2020-and-the-need-to-keep-our-connected-devices-secure/4653717c3d-1707503308/home-speaker.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/the-iot-landscape-in-2020-and-the-need-to-keep-our-connected-devices-secure/64cd5affe7-1707503308/home-speaker_article.png</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/how-in-app-protection-can-help-you-to-build-trust</loc>
    <lastmod>2024-08-28T07:48:41+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/how-in-app-protection-can-help-you-to-build-trust/ed27692c23-1707503308/connected-car.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/how-in-app-protection-can-help-you-to-build-trust/518092796c-1707503308/connected-car_landscape.png</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/how-threat-intelligence-can-stop-the-spread-of-cyber-attacks</loc>
    <lastmod>2024-08-28T07:48:41+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/how-threat-intelligence-can-stop-the-spread-of-cyber-attacks/cd856b39ab-1707503308/banking.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/how-threat-intelligence-can-stop-the-spread-of-cyber-attacks/f779f28745-1707503308/banking_thumbnail.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/the-evolution-from-virtual-assistant-to-virtual-companion</loc>
    <lastmod>2024-08-28T07:48:41+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/the-evolution-from-virtual-assistant-to-virtual-companion/efbd5c4207-1707503308/assistant.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/the-evolution-from-virtual-assistant-to-virtual-companion/200cef7dc1-1707503308/assistant_thumbnail.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/what-the-transition-to-hybrid-apps-means-for-security</loc>
    <lastmod>2024-08-28T07:48:41+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/what-the-transition-to-hybrid-apps-means-for-security/83b04c199a-1707503308/shopping.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/what-the-transition-to-hybrid-apps-means-for-security/68f02a2201-1707503308/shopping_thumbnail.png</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/protecting-the-virtual-worlds-of-the-future</loc>
    <lastmod>2024-08-28T07:48:41+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/protecting-the-virtual-worlds-of-the-future/95a79386a8-1707503308/article.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/protecting-the-virtual-worlds-of-the-future/a3631cf730-1707503308/thumbnail.png</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/how-to-counter-the-dangers-posed-by-tampering</loc>
    <lastmod>2025-07-28T14:09:10+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/how-to-counter-the-dangers-posed-by-tampering/964d85bed7-1707503308/app-store.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/how-to-counter-the-dangers-posed-by-tampering/565ea665f1-1707503308/app-store_article.png</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/why-the-best-app-development-follows-security-by-design-principles</loc>
    <lastmod>2024-08-28T07:48:41+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/why-the-best-app-development-follows-security-by-design-principles/c743679ed5-1707503308/security-by-design.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/why-the-best-app-development-follows-security-by-design-principles/fa1b6fecbc-1707503308/thumbnail.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/celebrating-25-years-of-java-how-to-keep-java-based-apps-safe</loc>
    <lastmod>2024-08-28T07:48:41+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/celebrating-25-years-of-java-how-to-keep-java-based-apps-safe/7aaade3900-1707503308/java25.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/celebrating-25-years-of-java-how-to-keep-java-based-apps-safe/aa875c651a-1707503308/java25_thumb.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/mobile-security-in-a-zero-trust-world</loc>
    <lastmod>2024-08-28T07:48:41+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/mobile-security-in-a-zero-trust-world/b636176d6d-1707503308/man-in-cafe-on-phone.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/mobile-security-in-a-zero-trust-world/e7a02cbc3f-1707503308/man-in-cafe-on-phone_thumb.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/introducing-softpos-the-fast-tracked-financial-trend-ready-to-revolutionize-payments</loc>
    <lastmod>2024-08-28T07:48:41+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/introducing-softpos-the-fast-tracked-financial-trend-ready-to-revolutionize-payments/74bfc2814c-1707503308/softpos_article-1.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/introducing-softpos-the-fast-tracked-financial-trend-ready-to-revolutionize-payments/423fe53813-1707503308/softpos_thumbnail.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/the-problem-with-cloud-based-app-security</loc>
    <lastmod>2024-08-28T07:48:41+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/the-problem-with-cloud-based-app-security/4d922fc3fc-1707503308/clouds_article.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/the-problem-with-cloud-based-app-security/dacbe055fa-1707503308/clouds_thumbnail.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/how-encouraging-empathy-can-help-you-to-develop-safer-apps</loc>
    <lastmod>2024-08-28T07:48:41+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/how-encouraging-empathy-can-help-you-to-develop-safer-apps/dad3079b6a-1707503308/encouraging-empathy.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/how-encouraging-empathy-can-help-you-to-develop-safer-apps/99911d7c85-1707503308/encouraging-empathy_article.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/7-trends-that-will-impact-cybersecurity-in-2021</loc>
    <lastmod>2025-06-06T08:40:47+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/7-trends-that-will-impact-cybersecurity-in-2021/0ee4f52a1a-1707503308/customer-journey.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/7-trends-that-will-impact-cybersecurity-in-2021/03db0258ac-1707503308/cyber-security-trends-2021_article.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/7-trends-that-will-impact-cybersecurity-in-2021/b06cde1a5a-1707503308/cyber-security-trends-2021_thumbnail.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/7-trends-that-will-impact-cybersecurity-in-2021/c1b73a5c86-1707503308/dangers-of-social-engineering.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/7-trends-that-will-impact-cybersecurity-in-2021/b783fabf1b-1707503308/drive-to-digitize.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/7-trends-that-will-impact-cybersecurity-in-2021/6376e709cd-1707503308/machine-to-machine-communication.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/7-trends-that-will-impact-cybersecurity-in-2021/8801a8e73c-1707503308/optimized-woman-with-mask-and-phone.jpeg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/7-trends-that-will-impact-cybersecurity-in-2021/02f5160df2-1707503308/optimized-woman-with-mask-and-phone.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/7-trends-that-will-impact-cybersecurity-in-2021/aea601ba4d-1707503308/softpos.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/7-trends-that-will-impact-cybersecurity-in-2021/9eb655eb9f-1707503308/virtual-companions.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/7-trends-that-will-impact-cybersecurity-in-2021/4df9fee6c8-1707503308/zero-trust.png</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/how-to-protect-android-app-bundles-with-dexprotector</loc>
    <lastmod>2024-08-28T07:48:41+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/how-to-protect-android-app-bundles-with-dexprotector/e1f5254ac2-1707503308/app-bundle-article-1.jpeg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/how-to-protect-android-app-bundles-with-dexprotector/d1915be892-1707503308/app-bundle-article-1.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/how-to-protect-android-app-bundles-with-dexprotector/1d7dcb0b62-1707503308/app-bundle-thumbnail.png</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/the-delicate-balance-between-personalization-and-security</loc>
    <lastmod>2024-08-28T07:48:41+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/the-delicate-balance-between-personalization-and-security/9e58c8f649-1707503308/phishing_article.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/the-delicate-balance-between-personalization-and-security/6ed93eff72-1707503308/phishing_thumbnail.png</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/how-to-stop-the-surge-of-cyber-attacks-against-the-healthcare-sector</loc>
    <lastmod>2025-07-28T14:09:10+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/how-to-stop-the-surge-of-cyber-attacks-against-the-healthcare-sector/5e64656f0d-1707503308/health-app.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/how-to-stop-the-surge-of-cyber-attacks-against-the-healthcare-sector/b3118d043d-1707503308/healthtech_article.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/how-to-stop-the-surge-of-cyber-attacks-against-the-healthcare-sector/360efb4aea-1707503308/healthtech_thumbnail.png</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/9-app-security-best-practices-developers-should-follow</loc>
    <lastmod>2024-08-28T07:48:41+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/9-app-security-best-practices-developers-should-follow/f41aa17721-1707503308/coding_article.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/9-app-security-best-practices-developers-should-follow/8ceff0ce1f-1707503308/coding_thumbnail.png</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/why-we-need-to-understand-the-hacker</loc>
    <lastmod>2024-08-28T07:48:41+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/why-we-need-to-understand-the-hacker/7e61a8dd66-1707503308/screenshot-2021-05-18-at-15.10.02.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/why-we-need-to-understand-the-hacker/1b6dd3cfbb-1707503308/understand-the-hacker.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/why-we-need-to-understand-the-hacker/ebd9457ac2-1707503308/understand-the-hacker_thumbnail.png</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/3-trends-that-make-mobile-app-security-impossible-to-ignore</loc>
    <lastmod>2024-08-28T07:48:41+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/3-trends-that-make-mobile-app-security-impossible-to-ignore/9192569379-1707503308/impossible-to-ignore_article.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/3-trends-that-make-mobile-app-security-impossible-to-ignore/dbcbd03ba2-1707503308/impossible-to-ignore_thumbnail.png</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/why-our-emotions-make-us-more-vulnerable-to-cyber-attacks</loc>
    <lastmod>2024-08-28T07:48:41+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/why-our-emotions-make-us-more-vulnerable-to-cyber-attacks/13bae27851-1707503308/sms-phishing_article.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/why-our-emotions-make-us-more-vulnerable-to-cyber-attacks/a3f5b4c2e0-1707503308/sms-phishing_thumbnail.png</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/why-the-shift-to-making-android-app-bundles-mandatory-has-sparked-a-debate-about-trust</loc>
    <lastmod>2024-08-28T07:48:41+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/why-the-shift-to-making-android-app-bundles-mandatory-has-sparked-a-debate-about-trust/5fa2928ed8-1707503308/aab_article.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/why-the-shift-to-making-android-app-bundles-mandatory-has-sparked-a-debate-about-trust/1744688c0e-1707503308/aab_thumbnail.png</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/5-tips-for-securing-your-mobile-device-in-the-post-pandemic-world</loc>
    <lastmod>2024-04-17T16:44:28+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/5-tips-for-securing-your-mobile-device-in-the-post-pandemic-world/50a75b9463-1707503308/using-qr-code_article.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/5-tips-for-securing-your-mobile-device-in-the-post-pandemic-world/0483fe8abc-1707503308/using-qr-code_thumb.png</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/what-our-covid-19-smartphone-usage-means-for-cybersecurity</loc>
    <lastmod>2024-08-28T07:48:41+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/what-our-covid-19-smartphone-usage-means-for-cybersecurity/1e9914cc45-1707503308/using-phone-on-train_article.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/what-our-covid-19-smartphone-usage-means-for-cybersecurity/9601d24afe-1707503308/using-phone-on-train_thumb.png</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/securing-the-user-interfaces-of-the-future</loc>
    <lastmod>2025-04-23T01:24:39+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/securing-the-user-interfaces-of-the-future/71e35977c5-1707503308/trusted-ui_article.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/securing-the-user-interfaces-of-the-future/f02a18f415-1707503308/trusted-ui_thumbnail.png</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/5-bonus-tips-for-securing-your-smartphone</loc>
    <lastmod>2024-08-28T07:48:41+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/5-bonus-tips-for-securing-your-smartphone/0d5fea7689-1707503308/securing-your-smartphone_article.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/5-bonus-tips-for-securing-your-smartphone/52c1a5cb12-1707503308/securing-your-smartphone_thumb.png</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/how-to-stop-software-supply-chain-attacks</loc>
    <lastmod>2024-08-28T07:48:41+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/how-to-stop-software-supply-chain-attacks/20df437ca7-1707503308/article.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/how-to-stop-software-supply-chain-attacks/4c3269bba9-1707503308/thumbnail.png</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/the-ocean-s-eleven-scene-that-hints-at-the-need-for-strong-endpoint-security</loc>
    <lastmod>2024-08-28T07:48:41+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/the-ocean-s-eleven-scene-that-hints-at-the-need-for-strong-endpoint-security/9ee05371a9-1707503308/heist-article.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/the-ocean-s-eleven-scene-that-hints-at-the-need-for-strong-endpoint-security/0f90cbb685-1707503308/heist-thumb.png</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/are-qr-codes-safe</loc>
    <lastmod>2024-08-28T07:48:41+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/are-qr-codes-safe/f123330392-1709541226/default.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/are-qr-codes-safe/c97d34bc06-1707503308/scanning-qr-code_article.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/are-qr-codes-safe/b7b6b7db39-1707503308/scanning-qr-code_thumb.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/the-risks-of-letting-your-app-run-on-rooted-devices</loc>
    <lastmod>2024-08-28T07:48:41+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/the-risks-of-letting-your-app-run-on-rooted-devices/fcf2b3414f-1707503308/article.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/the-risks-of-letting-your-app-run-on-rooted-devices/0fd15e991f-1707503308/illo1.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/the-risks-of-letting-your-app-run-on-rooted-devices/25e5d29fbc-1707503308/illo2.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/the-risks-of-letting-your-app-run-on-rooted-devices/cd56932c05-1707503308/image.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/the-risks-of-letting-your-app-run-on-rooted-devices/99e6eb7fe9-1707503308/thumbnail.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/how-can-you-protect-yourself-from-social-engineering</loc>
    <lastmod>2026-02-12T12:37:40+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/how-can-you-protect-yourself-from-social-engineering/5bb31ae50d-1707503308/social-engineering_article.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/how-can-you-protect-yourself-from-social-engineering/2b1b2ebdda-1707503308/social-engineering_thumb.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/how-to-keep-integrity-control-when-publishing-apps-on-third-party-platforms</loc>
    <lastmod>2024-08-28T07:48:41+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/how-to-keep-integrity-control-when-publishing-apps-on-third-party-platforms/f42171178d-1707503308/illustration1.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/how-to-keep-integrity-control-when-publishing-apps-on-third-party-platforms/79afa86597-1707503308/illustration2.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/how-to-keep-integrity-control-when-publishing-apps-on-third-party-platforms/a06fdc895c-1707503308/integrity-control_article.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/how-to-keep-integrity-control-when-publishing-apps-on-third-party-platforms/2f18d281c5-1707503308/integrity-control_thumb.png</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/is-it-safe-to-combine-ci-cd-tools-with-external-cloud-mobile-app-protection-solutions</loc>
    <lastmod>2024-08-28T07:48:41+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/is-it-safe-to-combine-ci-cd-tools-with-external-cloud-mobile-app-protection-solutions/9874e8e49b-1707503308/cloud_article.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/is-it-safe-to-combine-ci-cd-tools-with-external-cloud-mobile-app-protection-solutions/603c886391-1707503308/cloud_thumbnail.png</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/the-secret-ingredient-of-end-user-security</loc>
    <lastmod>2024-08-28T07:48:41+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/the-secret-ingredient-of-end-user-security/a20138b38c-1707503308/end-user-security.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/the-secret-ingredient-of-end-user-security/2756aefa8f-1707503308/end-user-security_thumb.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/how-bad-actors-deliver-mobile-malware-into-your-device</loc>
    <lastmod>2024-10-18T15:20:05+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/how-bad-actors-deliver-mobile-malware-into-your-device/5ee7881ab3-1707503308/malware.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/how-bad-actors-deliver-mobile-malware-into-your-device/4027a6f92b-1707503308/malware_thumbnail.png</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/mobile-app-development-frameworks-a-security-guide</loc>
    <lastmod>2025-06-06T08:40:47+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/mobile-app-development-frameworks-a-security-guide/e26ae59609-1707503308/chart.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/mobile-app-development-frameworks-a-security-guide/7fbd83555b-1707503308/comparison-chart.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/mobile-app-development-frameworks-a-security-guide/a08e1a94c9-1707503308/flutter.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/mobile-app-development-frameworks-a-security-guide/8eb9d81e2d-1707503308/frameworks_article.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/mobile-app-development-frameworks-a-security-guide/272881224a-1707503308/frameworks_thumbnail.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/mobile-app-development-frameworks-a-security-guide/e2b388ca4d-1707503308/hybrid-frameworks.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/mobile-app-development-frameworks-a-security-guide/a7c3ec0659-1707503308/og_hybrid-frameworks.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/mobile-app-development-frameworks-a-security-guide/4447a148cc-1707503308/react-native.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/mobile-app-development-frameworks-a-security-guide/cfcaa98ce4-1707503308/swift-kotlin.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/mobile-app-development-frameworks-a-security-guide/30b59b103b-1707503308/swift-kotlin.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/mobile-app-development-frameworks-a-security-guide/44b4785e10-1707503308/web-based.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/mobile-app-development-frameworks-a-security-guide/0c4f6b0d42-1707503308/xamarin.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/ongoing-security-a-step-by-step-guide-to-a-secure-app-development-process</loc>
    <lastmod>2024-08-28T07:48:41+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/ongoing-security-a-step-by-step-guide-to-a-secure-app-development-process/3f8858d5bd-1724831321/app-development-lifecycle.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/ongoing-security-a-step-by-step-guide-to-a-secure-app-development-process/b124b23aef-1707503308/cs_articlee.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/ongoing-security-a-step-by-step-guide-to-a-secure-app-development-process/738ead2f1d-1707503308/cs_thumb.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/ongoing-security-a-step-by-step-guide-to-a-secure-app-development-process/a9756a0d8b-1707503308/og_cs_articlee.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/ongoing-security-a-step-by-step-guide-to-a-secure-app-development-process/cdaca7b551-1724831321/threat-modelling.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/why-you-should-see-mobile-app-security-as-a-unique-selling-point</loc>
    <lastmod>2024-10-18T15:20:05+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/why-you-should-see-mobile-app-security-as-a-unique-selling-point/97068304dd-1707503308/super-app.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/why-you-should-see-mobile-app-security-as-a-unique-selling-point/7593fcd219-1707503308/techuk_-licel-article.png</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/what-is-zero-trust-application-security</loc>
    <lastmod>2025-11-21T02:53:59+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/what-is-zero-trust-application-security/5aa97887d9-1763693639/what-is-zero-trust-application-security.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/what-is-zero-trust-application-security/7dc63c9b5d-1707503308/zero-trust_article.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/what-is-zero-trust-application-security/465daa7788-1707503308/zero-trust_thumnail.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/zero-day-attack-prevention-via-enhanced-mobile-app-security</loc>
    <lastmod>2025-11-21T02:53:59+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/zero-day-attack-prevention-via-enhanced-mobile-app-security/66aa2b70e2-1707503308/article_hero.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/zero-day-attack-prevention-via-enhanced-mobile-app-security/b528660653-1707503308/droidcon-promo.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/zero-day-attack-prevention-via-enhanced-mobile-app-security/030562304b-1763693639/zero-day-attack-prevention-via-enhanced-mobile-app-security.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/zero-day-attack-prevention-via-enhanced-mobile-app-security/09314ecb55-1707503308/zero-day_article.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/zero-day-attack-prevention-via-enhanced-mobile-app-security/556e9c7ff3-1707503308/zero-day_thumbnail.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/the-push-to-open-up-apple-s-walled-garden</loc>
    <lastmod>2024-10-18T15:20:05+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/the-push-to-open-up-apple-s-walled-garden/85add80a4c-1707503308/apple-opens-up_article.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/the-push-to-open-up-apple-s-walled-garden/83589d0428-1707503308/apple-opens-up_thumbnail.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/the-push-to-open-up-apple-s-walled-garden/e00723d4c0-1707503308/og_apple-opens-up_article-1.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/why-you-should-think-twice-about-creating-custom-security-solutions</loc>
    <lastmod>2024-10-18T15:20:05+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/why-you-should-think-twice-about-creating-custom-security-solutions/ef87482e21-1707503308/og_reinvent-the-wheel_article-1.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/why-you-should-think-twice-about-creating-custom-security-solutions/31e08ebe93-1707503308/reinvent-the-wheel_article.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/why-you-should-think-twice-about-creating-custom-security-solutions/1226778bd2-1707503308/reinvent-the-wheel_thumbnail.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/the-psychology-of-social-engineering</loc>
    <lastmod>2024-08-28T07:48:41+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/the-psychology-of-social-engineering/91558b7b93-1707503308/og_psychology-of-social-engineering.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/the-psychology-of-social-engineering/7b57f35b65-1707503308/psychology-of-social-engineering-thumb.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/the-psychology-of-social-engineering/e65ec01e65-1707503308/psychology-of-social-engineering.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/investigating-ios-security-vulnerabilities</loc>
    <lastmod>2025-11-21T02:53:59+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/investigating-ios-security-vulnerabilities/72d1121e66-1707503308/article-4.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/investigating-ios-security-vulnerabilities/9f14839c48-1707503308/hero_article-4.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/investigating-ios-security-vulnerabilities/be9c80ab94-1763693639/investigating-ios-security-vulnerabilities.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/investigating-ios-security-vulnerabilities/6ac51389fe-1707503308/thumbnail-4.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/balancing-security-and-usability</loc>
    <lastmod>2024-10-18T15:20:05+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/balancing-security-and-usability/da96be4816-1707503308/og_security-and-usability.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/balancing-security-and-usability/d5f88ffc5e-1707503308/security-and-usability-thumbnail.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/balancing-security-and-usability/9c93beec62-1707503308/security-and-usability.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/investigating-the-safety-of-mfa-methods-are-authenticator-apps-secure</loc>
    <lastmod>2024-10-18T15:20:05+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/investigating-the-safety-of-mfa-methods-are-authenticator-apps-secure/83ef719288-1707503308/authenticator-article-main-2-new.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/investigating-the-safety-of-mfa-methods-are-authenticator-apps-secure/eee7fd49c0-1707503308/authenticator-article-main.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/investigating-the-safety-of-mfa-methods-are-authenticator-apps-secure/271b56ad75-1709541226/authenticator-article-thumbnail-2.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/investigating-the-safety-of-mfa-methods-are-authenticator-apps-secure/00a149203b-1707503308/authenticator-article-thumbnail.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/investigating-the-safety-of-mfa-methods-are-authenticator-apps-secure/8c0e43ee89-1707503308/og_authenticator-article-main-2-new.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/the-seven-principles-of-social-engineering</loc>
    <lastmod>2025-11-21T02:53:59+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/the-seven-principles-of-social-engineering/b6a41eb188-1707503308/social-engineering-principles-article-2-2new.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/the-seven-principles-of-social-engineering/6da6b39dcb-1707503308/social-engineering-principles-article-2.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/the-seven-principles-of-social-engineering/0ad80d512b-1707503308/social-engineering-principles-thumbnail-2new.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/the-seven-principles-of-social-engineering/bc23036596-1707503308/social-engineering-principles-thumbnail.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/the-seven-principles-of-social-engineering/3bc811eafc-1709541226/the-seven-principles-of-social-engineering-thumbnail.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/the-seven-principles-of-social-engineering/3c0b5832fa-1763693639/the-seven-principles-of-social-engineering.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/creating-a-company-culture-for-security</loc>
    <lastmod>2024-08-28T07:48:41+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/creating-a-company-culture-for-security/7dae42479a-1707503308/company-culture_thumb.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/creating-a-company-culture-for-security/884da415cd-1707503308/creating-a-company-culture-for-security-thumbnail-illustration.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/creating-a-company-culture-for-security/2cf4988102-1707503308/creating-a-company-culture-for-security.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/creating-a-company-culture-for-security/e0530c399e-1707503308/og_creating-a-company-culture-for-security.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/how-to-boost-your-social-engineering-awareness</loc>
    <lastmod>2024-08-28T07:48:41+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/how-to-boost-your-social-engineering-awareness/c088051f4a-1707503308/hero_how-to-boost-your-social-engineering-awareness.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/how-to-boost-your-social-engineering-awareness/c8bb9e89f1-1707503308/og_hero_how-to-boost-your-social-engineering-awareness.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/how-to-boost-your-social-engineering-awareness/52666387d5-1707503308/thumbnail_how-to-boost-your-social-engineering-awareness.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/how-to-incorporate-mobile-app-security-testing-into-your-build-pipeline</loc>
    <lastmod>2024-08-28T07:48:41+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/how-to-incorporate-mobile-app-security-testing-into-your-build-pipeline/6bc5728dfd-1707503308/graph.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/how-to-incorporate-mobile-app-security-testing-into-your-build-pipeline/c52707fc75-1707503308/hero_how-to-incorporate-mobile-app-security-testing-into-your-build-pipeline.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/how-to-incorporate-mobile-app-security-testing-into-your-build-pipeline/10aa81d31c-1707503308/og_hero_how-to-incorporate-mobile-app-security-testing-into-your-build-pipeline.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/how-to-incorporate-mobile-app-security-testing-into-your-build-pipeline/55326cf451-1707503308/thumbnail_how-to-incorporate-mobile-app-security-testing-into-your-build-pipeline.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/the-interplay-between-threat-intelligence-and-fraud-scoring-systems</loc>
    <lastmod>2024-08-28T07:48:41+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/the-interplay-between-threat-intelligence-and-fraud-scoring-systems/741519d160-1707503308/hero_the-interplay-between-threat-intelligence-and-fraud-scoring-systems.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/the-interplay-between-threat-intelligence-and-fraud-scoring-systems/3581be7285-1707503308/og_hero_the-interplay-between-threat-intelligence-and-fraud-scoring-systems.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/the-interplay-between-threat-intelligence-and-fraud-scoring-systems/f73d8023a3-1707503308/thumbnail_the-interplay-between-threat-intelligence-and-fraud-scoring-systems.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/ai-and-social-engineering</loc>
    <lastmod>2024-08-28T07:48:41+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/ai-and-social-engineering/689df19e9d-1707503308/hero_ai-and-deep-fakes.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/ai-and-social-engineering/de6f022011-1729161307/hero_ai-and-deep-fakes.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/ai-and-social-engineering/5abe1c7063-1707503308/thumbnail_ai-and-deep-fakes-_tr@2x.png</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/beware-of-mental-traps</loc>
    <lastmod>2024-08-28T07:48:41+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/beware-of-mental-traps/a18eec3c61-1707503308/beware-of-mental-traps.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/beware-of-mental-traps/8c8ebae729-1707503308/hero_mental-traps.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/beware-of-mental-traps/5a56b7c9b4-1707503308/og_mental-traps.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/beware-of-mental-traps/320a556a5c-1707503308/thumbnail_mental-traps.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/why-cybersecurity-matters</loc>
    <lastmod>2025-07-28T14:09:10+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/why-cybersecurity-matters/8951e3ce4f-1709541226/hero_why-cybersecurity-matters.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/why-cybersecurity-matters/65e9d6b766-1709541226/og_why-cybersecurity-matters.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/why-cybersecurity-matters/e7f94b28be-1709541226/thumbnail_why-cybersecurity-matters.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/the-battle-against-mobile-banking-trojans</loc>
    <lastmod>2025-07-28T14:09:10+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/the-battle-against-mobile-banking-trojans/cd21c71cc1-1711640247/the-battle-against-mobile-banking-trojans-hero.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/the-battle-against-mobile-banking-trojans/b5e449873b-1711640247/the-battle-against-mobile-banking-trojans-og.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/the-battle-against-mobile-banking-trojans/ac49fb8be2-1711640247/the-battle-against-mobile-banking-trojans-thumbnail.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/the-battle-against-mobile-banking-trojans/521bac9999-1711640247/thumbnail_banking-trojan-threat.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/why-virtual-trusted-execution-environments-are-set-to-boost-mobile-payment-security</loc>
    <lastmod>2024-08-28T07:48:41+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/why-virtual-trusted-execution-environments-are-set-to-boost-mobile-payment-security/3b28279777-1719741883/hero_vtee.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/why-virtual-trusted-execution-environments-are-set-to-boost-mobile-payment-security/7d4b4180e5-1719741883/og_vtee.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/why-virtual-trusted-execution-environments-are-set-to-boost-mobile-payment-security/b2323c7a9a-1721655447/scema_richexecutionenvironmentandroid_ios.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/why-virtual-trusted-execution-environments-are-set-to-boost-mobile-payment-security/e067877bb4-1719741883/slot-vtee.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/why-virtual-trusted-execution-environments-are-set-to-boost-mobile-payment-security/b51083ee28-1719741883/thumbnail_vtee.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/how-to-tackle-the-growing-threat-of-ekyc-fraud</loc>
    <lastmod>2025-09-30T13:02:42+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/how-to-tackle-the-growing-threat-of-ekyc-fraud/a9fb5c8be4-1726157212/hero_vtee.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/how-to-tackle-the-growing-threat-of-ekyc-fraud/fe508fbdba-1726157212/og_vtee.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/how-to-tackle-the-growing-threat-of-ekyc-fraud/1680859e44-1726157212/thumbnail_vtee.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/malware-spread-india</loc>
    <lastmod>2024-12-17T12:40:15+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/malware-spread-india/1687c1feb2-1730366664/malware.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/malware-spread-india/828f13d163-1730366664/malware_pic1.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/malware-spread-india/53b9937ca5-1730366664/malware_pic2.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/malware-spread-india/f759f9aa69-1730366664/malware_pic3.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/malware-spread-india/9fc9cab5bc-1730366664/malware_pic4.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/malware-spread-india/a0cfce9b9a-1730366664/malwary_india.gif</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/malware-spread-india/81ddfaab74-1730366664/og_malware.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/malware-spread-india/97c26cfb09-1730366664/thumb_malware.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/what-is-a-trusted-application</loc>
    <lastmod>2025-01-22T12:36:58+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/what-is-a-trusted-application/1cc85567e6-1734439215/global-platform-tee-architecture.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/what-is-a-trusted-application/c8cdaa5168-1734439215/global-platform-tee-architecture_mobile.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/what-is-a-trusted-application/9c7c422c74-1734439215/hero_vtee.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/what-is-a-trusted-application/051eec58bb-1734439215/og_vtee.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/what-is-a-trusted-application/cf49f6ae20-1734439215/thumbnail_vtee.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/what-is-a-trusted-application/ead99dc438-1734439215/trusted.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/what-is-a-trusted-application/cf37fcd9dd-1734439215/trusted_world_concept_mobile.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/what-is-a-trusted-application/71fe7ee444-1734439215/vtee-architecture-licel-vtee-_mobile.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/what-is-a-trusted-application/d06448a970-1734439215/vtee-architecture-licel-vtee.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/mobile-banking-security-threats</loc>
    <lastmod>2026-02-27T11:51:40+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/mobile-banking-security-threats/4335cf9529-1741370896/ekyc.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/mobile-banking-security-threats/f611c9df8a-1741370896/future.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/mobile-banking-security-threats/6d8b43dee5-1741370896/og_security-theater.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/mobile-banking-security-threats/e54d6bfb0d-1741370896/og_security-theater.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/mobile-banking-security-threats/8abbad8ac8-1741370896/security-theater.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/mobile-banking-security-threats/3a1af4011c-1741370896/social.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/mobile-banking-security-threats/98a90802a3-1741370896/thumbnail_mobile.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/mobile-banking-security-threats/f765f74251-1741370896/trojan.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/asia-s-mobile-payment-revolution</loc>
    <lastmod>2025-06-10T10:57:24+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/asia-s-mobile-payment-revolution/d05eb2f7c2-1749199247/asian-market-1.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/asia-s-mobile-payment-revolution/8cfab7a04a-1749199247/asian-market3.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/asia-s-mobile-payment-revolution/3fe4bf6052-1749553044/og_asia-markets.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/asia-s-mobile-payment-revolution/093260d6a3-1749196862/thumbnail_asia.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/the-rise-of-nfc-proxy-malware-attacks</loc>
    <lastmod>2025-10-29T12:39:36+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/the-rise-of-nfc-proxy-malware-attacks/e47d02fb5d-1759237362/article-thumbnail-illustration_230x170.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/the-rise-of-nfc-proxy-malware-attacks/39b70a7134-1759237362/hero_nfc.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/the-rise-of-nfc-proxy-malware-attacks/ebf87c5f32-1759237362/nfc-proxy-malware-attacks-scheme.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/the-rise-of-nfc-proxy-malware-attacks/68c6f8c7ab-1759237362/nfc-proxy-malware-attacks-scheme_mobile.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/the-rise-of-nfc-proxy-malware-attacks/6838600b66-1761741576/og_the-rise-of-nfc-proxy-malware-attacks.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/why-trust-cannot-be-assumed-in-the-digital-id-era</loc>
    <lastmod>2025-11-21T02:53:59+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/why-trust-cannot-be-assumed-in-the-digital-id-era/048fdf534f-1761905984/a_tunnel_under_the_castle_walls_why_trust_cannot_be_assumed_in_the.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/why-trust-cannot-be-assumed-in-the-digital-id-era/022b9ebddc-1761905984/digital-id-era-og.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/why-trust-cannot-be-assumed-in-the-digital-id-era/c47575f31b-1761905984/thumbnail_a-tunnel-under-the-castle-walls.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/how-not-to-lose-your-identity-in-2035</loc>
    <lastmod>2025-12-17T15:11:20+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/how-not-to-lose-your-identity-in-2035/d6587992a6-1764321676/asian-market.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/how-not-to-lose-your-identity-in-2035/0bedcc6bd8-1764323776/concept.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/how-not-to-lose-your-identity-in-2035/b0d5ae69ac-1764321676/frame-922.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/how-not-to-lose-your-identity-in-2035/288d1c55bd-1764321676/frame-4593.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/how-not-to-lose-your-identity-in-2035/d9f5d9d055-1764321676/identity_og.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/how-not-to-lose-your-identity-in-2035/b9d8be91b9-1764321676/multi.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/how-not-to-lose-your-identity-in-2035/99f998f9da-1764323776/og.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/how-not-to-lose-your-identity-in-2035/a01090284b-1764321676/table.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/how-not-to-lose-your-identity-in-2035/94df853f30-1764321676/the_fifth_element_animated_spinoff.jpg-1.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/how-not-to-lose-your-identity-in-2035/b8b32b506f-1764321676/thumbnail_vtee.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/how-not-to-lose-your-identity-in-2035/32f17685e1-1764321676/vtee-architecture-licel-vtee-_mobile.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/how-not-to-lose-your-identity-in-2035/08e30e31a2-1764321676/vtee-architecture-licel-vtee-_mobile2.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/how-not-to-lose-your-identity-in-2035/b73074d39d-1764321676/vtee-architecture-licel-vtee.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/why-trusted-signals-are-the-key-to-closing-the-widening-mobile-trust-gap</loc>
    <lastmod>2026-01-30T12:30:51+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/why-trusted-signals-are-the-key-to-closing-the-widening-mobile-trust-gap/9177d215aa-1766147928/asian-market.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/why-trusted-signals-are-the-key-to-closing-the-widening-mobile-trust-gap/2e671968a3-1766147928/asian-market2.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/why-trusted-signals-are-the-key-to-closing-the-widening-mobile-trust-gap/07e672fd2a-1766147928/og_ekyc-fraud.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/why-trusted-signals-are-the-key-to-closing-the-widening-mobile-trust-gap/8d00b40670-1766147928/og_ekyc-fraud2.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/why-trusted-signals-are-the-key-to-closing-the-widening-mobile-trust-gap/237eff075c-1766147928/og_our-wildcard-trend_neurometric-trust.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/why-trusted-signals-are-the-key-to-closing-the-widening-mobile-trust-gap/5e5b14cb38-1766147928/og_security-theater.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/why-trusted-signals-are-the-key-to-closing-the-widening-mobile-trust-gap/94e96eb9fb-1766147928/og_security-theater2.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/why-trusted-signals-are-the-key-to-closing-the-widening-mobile-trust-gap/23c42689a7-1766147928/og_security-theater3.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/why-trusted-signals-are-the-key-to-closing-the-widening-mobile-trust-gap/33d0d82086-1766147928/og_why_trusted_signals_are_the_key_toclosing_the_widening_mobile.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/why-trusted-signals-are-the-key-to-closing-the-widening-mobile-trust-gap/667f8b4cd9-1766147928/thumbnail_vtee.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/api-protection-from-afterthought-to-necessity</loc>
    <lastmod>2026-01-16T08:08:38+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/api-protection-from-afterthought-to-necessity/a9701bd0d1-1766147928/hero_cybersafe.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/api-protection-from-afterthought-to-necessity/395dd4fb35-1766147928/hero_mobile-api-protection.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/api-protection-from-afterthought-to-necessity/109a2b428c-1766147928/necessity.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/api-protection-from-afterthought-to-necessity/dda9403029-1766147928/og_mobile-api-protection.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/api-protection-from-afterthought-to-necessity/8770b51733-1766147928/thumbnail_mobile-api-protection.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/the-mobile-authentication-illusion</loc>
    <lastmod>2026-01-30T12:30:51+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/the-mobile-authentication-illusion/95e339eda5-1769776251/hero_the-mobile-authentication-illusion.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/the-mobile-authentication-illusion/894059202c-1769776251/og_the-mobile-authentication-illusion.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/the-mobile-authentication-illusion/6b53d4ec97-1769776251/thumbnail_illusion.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/insights/when-trust-becomes-the-attack-surface</loc>
    <lastmod>2026-03-31T18:34:19+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/when-trust-becomes-the-attack-surface/6e61ba6ef0-1774958172/The Paradox of Virtue.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/when-trust-becomes-the-attack-surface/1cdc3baec0-1774982059/og_the-paradox-of-virtue.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/when-trust-becomes-the-attack-surface/7fc3e3d887-1774958172/the-paradox-of-virtue.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/insights/when-trust-becomes-the-attack-surface/34a6a532ef-1774958172/thumbnail_the-mobile-authentication-illusion.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com</loc>
    <lastmod>2025-10-08T10:11:01+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/home/a85a9967a8-1753695627/dynamic-attacks.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/home/151348cb0b-1753695627/home.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/home/2dcaac834f-1753695627/home_hero_mobile.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/home/9548a7b6a6-1753695627/network-based-attacks.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/home/f7ca569a24-1753695627/opengraph.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/home/95c77ff86c-1753695627/static-attacks.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/home/b131898415-1753695627/static-attacks.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/products</loc>
    <lastmod>2025-07-28T09:40:27+00:00</lastmod>
</url>
<url>
    <loc>https://licelus.com/products/dexprotector</loc>
    <lastmod>2025-07-28T09:40:27+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/40b109cf75-1753695627/application-integrity.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/f33b7e6e7f-1753695627/application-integrity_icon.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/232073ab19-1753695627/code-and-resource-hardening.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/57ce7cd711-1753695627/dexprotector.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/75cd20e256-1753695627/dexprotector.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/edd0ff6885-1753695627/dexprotector_mobile.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/384b270b25-1753695627/emvco-evaluated.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/7f9b920618-1753695627/emvco.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/addde33873-1753695627/flutter.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/646944cde5-1753695627/image-placeholder_small.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/f2e25b987b-1753695627/instant-integration.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/fecbbf2037-1753695627/js.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/8987c1a837-1753695627/network-communications_icon.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/9b23d7bc82-1753695627/on-premise.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/73ce540709-1753695627/react.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/9497a73c5a-1753695627/resource-hardening_icon.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/83547ef3fc-1753695627/runtime-environment_icon.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/73c5911376-1753695627/secuirty-without-lag.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/abd9d5d4bc-1753695627/secure-network-communications.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/0e6caea804-1753695627/secure-runtime-environment.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/9b6689055f-1753695627/xamarin.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/products/dexprotector/docs</loc>
    <lastmod>2025-07-28T09:40:27+00:00</lastmod>
</url>
<url>
    <loc>https://licelus.com/products/dexprotector/docs/android</loc>
    <lastmod>2025-07-28T09:40:27+00:00</lastmod>
</url>
<url>
    <loc>https://licelus.com/products/dexprotector/docs/android/introduction-to-dexprotector</loc>
    <lastmod>2025-10-29T12:39:36+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/android/introduction-to-dexprotector/3a47bf766d-1761741576/api-protection-scheme_5.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/android/introduction-to-dexprotector/342baa2953-1761741576/api-protection-scheme_mobile.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/android/introduction-to-dexprotector/c41b5ff888-1753695627/balance.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/android/introduction-to-dexprotector/ef8233a380-1753695627/dexprotector.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/products/dexprotector/docs/android/dexprotector-for-android</loc>
    <lastmod>2025-07-28T09:40:27+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/android/dexprotector-for-android/477147c501-1753695627/dexprotector.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/products/dexprotector/docs/android/getting-started</loc>
    <lastmod>2025-07-28T09:40:27+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/android/getting-started/80bfdffe57-1753695627/dexprotector.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/android/getting-started/062aad711a-1753695627/screen-3.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/android/getting-started/4553edbf3a-1753695627/screenshot-2021-11-18-151250.png</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/products/dexprotector/docs/android/configuring-dexprotector</loc>
    <lastmod>2025-12-17T15:11:20+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/android/configuring-dexprotector/20fda30291-1753695627/dexprotector.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/products/dexprotector/docs/android/implementations-and-integrations</loc>
    <lastmod>2025-12-17T15:11:20+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/android/implementations-and-integrations/476e368829-1753695627/dexprotector.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/products/dexprotector/docs/android/dexprotector-studio</loc>
    <lastmod>2025-07-28T09:40:27+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/android/dexprotector-studio/c686416abb-1753695627/dexprotector.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/products/dexprotector/docs/android/completing-the-dexprotector-process</loc>
    <lastmod>2025-07-28T09:40:27+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/android/completing-the-dexprotector-process/1fbedcd60b-1753695627/dexprotector.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/android/completing-the-dexprotector-process/1633888f36-1753695627/dexprotector_docs_android.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/android/completing-the-dexprotector-process/ce8fa2b091-1753695627/screen-9.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/android/completing-the-dexprotector-process/f6612d02f8-1753695627/studio-package-structure-screenshot.png</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/products/dexprotector/docs/android/alice-threat-reporting-and-telemetry</loc>
    <lastmod>2025-07-28T09:40:27+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/android/alice-threat-reporting-and-telemetry/18e87b3e18-1753695627/alice-dashboard.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/android/alice-threat-reporting-and-telemetry/cba7b6c14f-1753695627/dexprotector.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/android/alice-threat-reporting-and-telemetry/3135db1f2b-1753695627/dexprotector_docs_android.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/android/alice-threat-reporting-and-telemetry/b80c111854-1753695627/you-can-also-enable-alice-via-dexprotector-studio-by-specifying-your-api-key-and-if-desired-your-custom-method.png</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/products/dexprotector/docs/android/faqs</loc>
    <lastmod>2025-07-28T09:40:27+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/android/faqs/8ab3dc8e89-1753695627/dexprotector.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/products/dexprotector/docs/ios/introduction-to-dexprotector</loc>
    <lastmod>2025-10-29T12:39:36+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/ios/introduction-to-dexprotector/81597629a6-1761741576/api-protection-scheme_5.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/ios/introduction-to-dexprotector/29d3549610-1761741576/api-protection-scheme_mobile.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/ios/introduction-to-dexprotector/224aa5519e-1753695627/dexprotector.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/ios/introduction-to-dexprotector/ab9d2c6473-1753695627/open-graph.png</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/products/dexprotector/docs/ios/dexprotector-for-ios</loc>
    <lastmod>2025-07-28T09:40:27+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/ios/dexprotector-for-ios/5f032ac23b-1753695627/dexprotector.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/ios/dexprotector-for-ios/ceae10d0c6-1753695627/open-graph.png</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/products/dexprotector/docs/ios/getting-started</loc>
    <lastmod>2025-07-28T09:40:27+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/ios/getting-started/1f2e7c6586-1753695627/dexprotector.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/ios/getting-started/cd9ccbb24e-1753695627/open-graph.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/ios/getting-started/e126a0fb85-1753695627/screen-3.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/ios/getting-started/a2fafd1057-1753695627/screenshot-2021-11-18-151250.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/ios/getting-started/0b41cb19d6-1753695627/screenshot-2021-11-18-152440.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/ios/getting-started/15c55f4bf9-1753695627/screenshot-2021-11-18-152639-copy.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/ios/getting-started/e0a617bdc8-1753695627/screenshot-2021-11-18-152639.png</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/products/dexprotector/docs/ios/configuring-dexprotector</loc>
    <lastmod>2025-07-28T09:40:27+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/ios/configuring-dexprotector/45ef5586d9-1753695627/dexprotector.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/ios/configuring-dexprotector/e36db52851-1753695627/open-graph.png</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/products/dexprotector/docs/ios/dexprotecting-hybrid-and-cross-platform-applications</loc>
    <lastmod>2025-07-28T09:40:27+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/ios/dexprotecting-hybrid-and-cross-platform-applications/a49f2cd94f-1753695627/dexprotector.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/ios/dexprotecting-hybrid-and-cross-platform-applications/962f35a4d0-1753695627/open-graph.png</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/products/dexprotector/docs/ios/dexprotecting-ios-frameworks-and-xcframeworks</loc>
    <lastmod>2025-07-28T09:40:27+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/ios/dexprotecting-ios-frameworks-and-xcframeworks/b2bc4e41aa-1753695627/default.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/products/dexprotector/docs/ios/dexprotector-studio</loc>
    <lastmod>2025-07-28T09:40:27+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/ios/dexprotector-studio/674246dda6-1753695627/activate-license-offline.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/ios/dexprotector-studio/52e82855c8-1753695627/activate-license-online.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/ios/dexprotector-studio/7f090ff2cf-1753695627/afterwards-you-can-easily-view-the-the-protection-log-the-path-to-the-protected-package-and-an-overview-of-recent-protection-res.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/ios/dexprotector-studio/f739b21dce-1753695627/analyze-your-package-structure.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/ios/dexprotector-studio/6203a2c619-1753695627/and-when-you-are-finished-you-can-save-your-newly-created-configuration-profile-to-be-reused-or-adapted-later.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/ios/dexprotector-studio/f8d6f81dea-1753695627/apply-protection-mechanisms-directly-to-your-packages-and-classes.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/ios/dexprotector-studio/2360ba1f4d-1753695627/configuration-presets-and-load-application-file-for-protection-with-preview-of-configuration.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/ios/dexprotector-studio/5680289a60-1753695627/dexprotector-log-during-process.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/ios/dexprotector-studio/2159a80ff7-1753695627/dexprotector-welcome-screen.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/ios/dexprotector-studio/df37907386-1753695627/dexprotector.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/ios/dexprotector-studio/bb47783c0b-1753695627/frame-4454.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/ios/dexprotector-studio/bf8454a8eb-1753695627/frame-4455.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/ios/dexprotector-studio/19d5b0c410-1753695627/frame-4456.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/ios/dexprotector-studio/cab344c7cd-1753695627/frame-4457.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/ios/dexprotector-studio/9efc2ba5e4-1753695627/frame-4458.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/ios/dexprotector-studio/7ec6f85c96-1753695627/if-the-dexprotector-jar-file-is-not-in-the-same-directory-as-dexprotector-studio-you-will-have-to-specify-the-path-to-it.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/ios/dexprotector-studio/991fe17530-1753695627/license-info-where-you-can-set-a-path-to-the-version-of-dexprotector-you-wish-to-use-view-your-license-status-and-activate-your-.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/ios/dexprotector-studio/6a24b96518-1753695627/license-info-window-showing-license-status-activated.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/ios/dexprotector-studio/0046d58a86-1753695627/load-file-for-protection-select-configuration-file.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/ios/dexprotector-studio/49dd41a833-1753695627/load-your-chosen-configuration-file.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/ios/dexprotector-studio/2f738bd6ab-1753695627/open-graph.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/ios/dexprotector-studio/403a02e541-1753695627/or-edit-the-configuration-xml-manually.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/ios/dexprotector-studio/40e653f1bc-1753695627/or-manage-your-protection-mechanisms-and-apply-filters-through-the-protection-settings-window.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/ios/dexprotector-studio/1ca39bed86-1753695627/protection-settings-window.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/ios/dexprotector-studio/0759434f66-1753695627/save-the-newly-created-configuration-file.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/ios/dexprotector-studio/7bcc42b0a4-1753695627/screen-3.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/ios/dexprotector-studio/128a2ac41a-1753695627/screen-4.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/ios/dexprotector-studio/a39302eed9-1753695627/screen-5.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/ios/dexprotector-studio/514cf5a5b8-1753695627/screen-7.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/ios/dexprotector-studio/3d2f3820fe-1753695627/screen-10.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/ios/dexprotector-studio/c6669b2fc5-1753695627/then-click-run-protection-and-you-can-follow-the-dexprotector-process-as-it-happens.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/ios/dexprotector-studio/0ee69cf2fe-1753695627/when-you-are-satisfied-with-your-protection-configuration-you-can-see-an-overview-of-what-will-be-protected.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/ios/dexprotector-studio/0fab7ce590-1753695627/you-can-also-edit-the-configuration-xml-manually-through-studio.png</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/products/dexprotector/docs/ios/completing-the-dexprotector-process</loc>
    <lastmod>2025-07-28T09:40:27+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/ios/completing-the-dexprotector-process/0b622cf13f-1753695627/dexprotector-log-during-process.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/ios/completing-the-dexprotector-process/c2848911dd-1753695627/dexprotector.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/ios/completing-the-dexprotector-process/4038d36ef0-1753695627/frame-4457.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/ios/completing-the-dexprotector-process/863d0a0205-1753695627/open-graph.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/ios/completing-the-dexprotector-process/6241990489-1753695627/save-the-newly-created-configuration-file.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/ios/completing-the-dexprotector-process/21e10a02fe-1753695627/studio-package-structure-screenshot.png</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/products/dexprotector/docs/ios/alice</loc>
    <lastmod>2025-07-28T09:40:27+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/ios/alice/ff579384ce-1753695627/alice-dash.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/ios/alice/5563f688e0-1753695627/dexprotector.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/ios/alice/2165bb3ad4-1753695627/open-graph.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/ios/alice/91e53f2688-1753695627/screen-11.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/ios/alice/33cc49bf18-1753695627/you-can-also-enable-alice-via-dexprotector-studio-by-specifying-your-api-key-and-if-desired-your-custom-method.png</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/products/dexprotector/docs/ios/faqs</loc>
    <lastmod>2025-07-28T09:40:27+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/ios/faqs/f6b7418b86-1753695627/dexprotector.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/docs/ios/faqs/5435b011da-1753695627/open-graph.png</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/products/dexprotector/updates</loc>
    <lastmod>2025-07-28T09:40:27+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/updates/dbd0bcad8f-1753695627/dexprotector.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/products/dexprotector/updates/dexprotector-9-5</loc>
    <lastmod>2025-07-28T09:40:27+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/updates/dexprotector-9-5/f15d4ed615-1753695627/dexprotector_og.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/products/dexprotector/updates/dexprotector-9-7</loc>
    <lastmod>2025-07-28T09:40:27+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/updates/dexprotector-9-7/ef81bd56f2-1753695627/dexprotector_og.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/products/dexprotector/updates/dexprotector-studio-announcement</loc>
    <lastmod>2025-07-28T09:40:27+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/updates/dexprotector-studio-announcement/e70b530065-1753695627/dexprotector_og.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/products/dexprotector/updates/10-2</loc>
    <lastmod>2025-07-28T09:40:27+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/updates/10-2/d36fc17131-1753695627/dexprotector_og.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/products/dexprotector/updates/dexprotector-11-0</loc>
    <lastmod>2025-07-28T09:40:27+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/updates/dexprotector-11-0/89376d34ea-1753695627/dexprotector_og.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/products/dexprotector/updates/dexprotector-11-1</loc>
    <lastmod>2025-07-28T09:40:27+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/updates/dexprotector-11-1/e03e2674e5-1753695627/dexprotector_og.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/products/dexprotector/updates/dexprotector-12-0</loc>
    <lastmod>2025-07-28T09:40:27+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/updates/dexprotector-12-0/0c7be46d35-1753695627/dexprotector_og.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/products/dexprotector/updates/dexprotector-12-1</loc>
    <lastmod>2025-07-28T09:40:27+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/updates/dexprotector-12-1/5b284edc1d-1753695627/dexprotector_og.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/products/dexprotector/updates/dexprotector-12-3</loc>
    <lastmod>2025-07-28T09:40:27+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/updates/dexprotector-12-3/d924eed779-1753695627/dexprotector_og.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/products/dexprotector/updates/dexprotector-12-5</loc>
    <lastmod>2025-07-28T09:40:27+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/updates/dexprotector-12-5/ea94a3485c-1753695627/dexprotector_og.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/products/dexprotector/updates/dexprotector-12-7</loc>
    <lastmod>2025-07-28T09:40:27+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/updates/dexprotector-12-7/9ce0aec85e-1753695627/dexprotector_og.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/products/dexprotector/updates/dexprotector-12-9</loc>
    <lastmod>2025-07-28T09:40:27+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/updates/dexprotector-12-9/83a27f9ead-1753695627/dexprotector_og.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/products/dexprotector/updates/dexprotector-12-11</loc>
    <lastmod>2025-07-28T09:40:27+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/updates/dexprotector-12-11/9a086e4e45-1753695627/dexprotector_12-11.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/updates/dexprotector-12-11/4fa554ba29-1753695627/dexprotector_og.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/products/dexprotector/updates/proactive-malware-defense-from-dexprotector</loc>
    <lastmod>2025-07-28T09:40:27+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/updates/proactive-malware-defense-from-dexprotector/9610b12970-1753695627/dexprotector_og.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/products/dexprotector/updates/dexprotector-14-0</loc>
    <lastmod>2025-07-28T09:40:27+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/updates/dexprotector-14-0/96d6da5a3d-1753695627/dexprotector_og.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/products/dexprotector/updates/dexprotector-14-1</loc>
    <lastmod>2025-07-28T09:40:27+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/updates/dexprotector-14-1/a836b10354-1753695627/dexprotector.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/products/dexprotector/updates/dexprotector-15-0-1</loc>
    <lastmod>2025-08-29T08:57:26+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/updates/dexprotector-15-0-1/c98c22e79b-1756457846/dexprotector-15.0.1.png</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/products/dexprotector/updates/dexprotector-15-0-5</loc>
    <lastmod>2025-08-29T08:57:26+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/updates/dexprotector-15-0-5/89dec5d9e5-1756457846/dexprotector-15.0.5.png</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/products/dexprotector/updates/dexprotector-15-0-9</loc>
    <lastmod>2025-08-29T08:57:26+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/updates/dexprotector-15-0-9/d14b36b909-1756457846/dexprotector-15.0.9.png</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/products/dexprotector/updates/dexprotector-15-0-9-19</loc>
    <lastmod>2025-08-29T08:57:26+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/updates/dexprotector-15-0-9-19/0b13b71d77-1756457846/dexprotector-15.0.9.19.png</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/products/dexprotector/updates/dexprotector-15-0-9-25</loc>
    <lastmod>2025-08-29T08:57:26+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/updates/dexprotector-15-0-9-25/806680b1e8-1756457846/dexprotector-15.0.9.25.png</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/products/dexprotector/updates/dexprotector-15-0-9-37</loc>
    <lastmod>2025-08-29T08:57:26+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/updates/dexprotector-15-0-9-37/050d0a6156-1756457846/dexprotector-15.0.9.37.png</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/products/dexprotector/updates/dexprotector-15-0-9-63</loc>
    <lastmod>2025-08-29T08:57:26+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/updates/dexprotector-15-0-9-63/82d8fe83bc-1756457846/dexprotector-15.0.9.63.png</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/products/dexprotector/updates/dexprotector-15-0-9-79</loc>
    <lastmod>2025-10-29T12:39:36+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/updates/dexprotector-15-0-9-79/00b65276ab-1761741576/dexprotector-15.0.9.79_og.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/products/dexprotector/updates/dexprotector-15-0-9-86</loc>
    <lastmod>2025-10-29T12:39:36+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/updates/dexprotector-15-0-9-86/0576f3246f-1761741576/dexprotector-15.0.9.63-og.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/products/dexprotector/updates/dexprotector-16-1-9</loc>
    <lastmod>2026-01-30T12:30:51+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/updates/dexprotector-16-1-9/07a0fe836e-1769776251/dexprotector-16.1.9.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/products/dexprotector/updates/dexprotector-16-1-31</loc>
    <lastmod>2026-03-31T11:56:12+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/updates/dexprotector-16-1-31/62e85472e7-1774958172/dexprotector-15.0.9.63.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/products/dexprotector/cryptomodule</loc>
    <lastmod>2025-07-28T09:40:27+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/cryptomodule/3e1e6f58c8-1753695627/api-virtualisation.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/cryptomodule/d307b150b9-1753695627/crypto.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/cryptomodule/1ed443abb3-1753695627/crypto__hero_mobile.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/cryptomodule/68abb2e755-1753695627/cryptomodule_og.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/cryptomodule/1f931ff75c-1753695627/image-placeholder5.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/cryptomodule/4e7961d66a-1753695627/image-placeholder_small.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/cryptomodule/8da0b26f3b-1753695627/keys-and-tokens.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/cryptomodule/a7ac595888-1753695627/smart-card-mode.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/cryptomodule/a33e1fa490-1753695627/software-based-security-module.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/cryptomodule/0081d2fc9d-1753695627/software-based.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/cryptomodule/e9c632077d-1753695627/standards.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/cryptomodule/6e4548c86f-1753695627/updates-fast.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/cryptomodule/83cdf16397-1753695627/white-box-cryptography.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/dexprotector/cryptomodule/b305b0df13-1753695627/white-box.png</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/products/stringer-java-obfuscator</loc>
    <lastmod>2025-07-28T09:40:27+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/stringer-java-obfuscator/711918fc49-1753695627/application-integrity.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/stringer-java-obfuscator/73d90c8ccf-1753695627/application-integrity_icon.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/stringer-java-obfuscator/60c481a0b1-1753695627/application-servers.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/stringer-java-obfuscator/b6395a854c-1753695627/code-and-resource-hardening.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/stringer-java-obfuscator/4bb407652a-1753695627/image-placeholder_small.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/stringer-java-obfuscator/1620913d1d-1753695627/instant-integration.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/stringer-java-obfuscator/fd3262e0cd-1753695627/network-communications_icon.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/stringer-java-obfuscator/f69a99a576-1753695627/on-premise.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/stringer-java-obfuscator/3a4efb04a7-1753695627/platforms.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/stringer-java-obfuscator/af460cd35a-1753695627/resource-hardening_icon.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/stringer-java-obfuscator/7128107f38-1753695627/runtime-environment_icon.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/stringer-java-obfuscator/b4cbba8933-1753695627/secuirty-without-lag.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/stringer-java-obfuscator/46f7d734d5-1753695627/secuirty-without-lag_stringer.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/stringer-java-obfuscator/c24a5160e8-1753695627/secure-network-communications.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/stringer-java-obfuscator/c6afb68a4e-1753695627/secure-runtime-environment.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/stringer-java-obfuscator/5be0416b99-1753695627/stringer-hero.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/stringer-java-obfuscator/34abc719bf-1753695627/stringer.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/stringer-java-obfuscator/b51a0ac37d-1753695627/stringer_mobile.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/products/stringer-java-obfuscator/docs</loc>
    <lastmod>2025-07-28T09:40:27+00:00</lastmod>
</url>
<url>
    <loc>https://licelus.com/products/stringer-java-obfuscator/docs/introduction-to-stringer</loc>
    <lastmod>2025-07-28T09:40:27+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/stringer-java-obfuscator/docs/introduction-to-stringer/1cc7c7aa5f-1753695627/stringer.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/products/stringer-java-obfuscator/docs/getting-started</loc>
    <lastmod>2025-07-28T09:40:27+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/stringer-java-obfuscator/docs/getting-started/c0a6cf3da3-1753695627/enter_activation_code.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/stringer-java-obfuscator/docs/getting-started/04cd7c57ff-1753695627/enter_activation_response.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/stringer-java-obfuscator/docs/getting-started/28614a6879-1753695627/generate_activation_request.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/stringer-java-obfuscator/docs/getting-started/b3c9ed47f9-1753695627/not_activated.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/stringer-java-obfuscator/docs/getting-started/d78796b312-1753695627/stringer.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/products/stringer-java-obfuscator/docs/configuring-stringer-protection</loc>
    <lastmod>2025-07-28T09:40:27+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/stringer-java-obfuscator/docs/configuring-stringer-protection/ccc76fd431-1753695627/stringer.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/products/stringer-java-obfuscator/docs/implementing-stringer-protection</loc>
    <lastmod>2025-07-28T09:40:27+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/stringer-java-obfuscator/docs/implementing-stringer-protection/0a9ac80567-1753695627/keystore.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/stringer-java-obfuscator/docs/implementing-stringer-protection/6354c9400e-1753695627/main_screen.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/stringer-java-obfuscator/docs/implementing-stringer-protection/74a0ab7f69-1753695627/run_log.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/stringer-java-obfuscator/docs/implementing-stringer-protection/0f1d2c82a7-1753695627/stringer.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/products/stringer-java-obfuscator/updates</loc>
    <lastmod>2025-07-28T09:40:27+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/stringer-java-obfuscator/updates/ed68069b4b-1753695627/stringer.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/products/stringer-java-obfuscator/updates/stringer-2-1-3</loc>
    <lastmod>2025-07-28T09:40:27+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/stringer-java-obfuscator/updates/stringer-2-1-3/d7e793678f-1753695627/stringer.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/products/stringer-java-obfuscator/updates/stringer-3-0</loc>
    <lastmod>2025-07-28T09:40:27+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/stringer-java-obfuscator/updates/stringer-3-0/9878ae3f90-1753695627/stringer.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/products/stringer-java-obfuscator/updates/stringer-2-5-15</loc>
    <lastmod>2025-07-28T09:40:27+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/stringer-java-obfuscator/updates/stringer-2-5-15/232e6ceb58-1753695627/stringer.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/products/stringer-java-obfuscator/updates/stringer-9-0</loc>
    <lastmod>2025-07-28T09:40:27+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/stringer-java-obfuscator/updates/stringer-9-0/672098f667-1753695627/stringer.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/products/stringer-java-obfuscator/updates/stringer-9-3</loc>
    <lastmod>2025-07-28T09:40:27+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/stringer-java-obfuscator/updates/stringer-9-3/73a4cffd5a-1753695627/stringer.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/products/alice-threat-intelligence</loc>
    <lastmod>2025-11-21T02:53:59+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/alice-threat-intelligence/d79486dcab-1762330481/Frame 4110.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/alice-threat-intelligence/2aef9806a5-1762771119/alice.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/alice-threat-intelligence/c53e8bcf6a-1762330481/article-thumbnail-illustration-mobile.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/alice-threat-intelligence/357d345bbf-1762330481/article-thumbnail-illustration.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/alice-threat-intelligence/d933f55495-1762330481/device.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/alice-threat-intelligence/1c2baa8868-1762330481/frame-4110.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/alice-threat-intelligence/28c65e1f7e-1762330481/frame-4110.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/alice-threat-intelligence/b619b83f6f-1762330481/frame-4110_mobile.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/alice-threat-intelligence/443ac8aab8-1762330481/frame-4892.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/alice-threat-intelligence/33b2c0c734-1762330481/frame-4894.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/alice-threat-intelligence/8cc10d214e-1762330481/frame-4895.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/alice-threat-intelligence/52d79ca889-1762330481/frame-4896.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/alice-threat-intelligence/168338439b-1762330481/frame-4897.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/alice-threat-intelligence/1a2918c0ad-1762330493/globe.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/alice-threat-intelligence/b89f58d24a-1762330481/group-4532-mobile.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/alice-threat-intelligence/b9c447ce50-1762330481/group-4532.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/alice-threat-intelligence/41c6538f47-1762330481/icon.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/alice-threat-intelligence/9f6add1544-1762330481/icon3.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/alice-threat-intelligence/845e74289b-1762330481/image-section.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/alice-threat-intelligence/eec985b800-1762330481/stability-performance.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/alice-threat-intelligence/b36cdc91f8-1762330481/thumbnail_Why cybersecurity matters.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/alice-threat-intelligence/a3a899346b-1762330481/thumbnail_why-cybersecurity-matters-m.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/alice-threat-intelligence/d535529c80-1762330481/thumbnail_why-cybersecurity-matters-mobile.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/alice-threat-intelligence/ce18f82948-1762330481/thumbnail_why-cybersecurity-matters.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/alice-threat-intelligence/18d875a04e-1762330481/timeline-3-2.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/alice-threat-intelligence/af3629e581-1765984280/timeline-4.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/alice-threat-intelligence/6b4aaa87dc-1762330481/timeline_3_1-2.png</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/products/alice-threat-intelligence/updates</loc>
    <lastmod>2025-07-28T09:40:27+00:00</lastmod>
</url>
<url>
    <loc>https://licelus.com/products/jcardsim</loc>
    <lastmod>2025-07-28T09:40:27+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/jcardsim/d8feddd15c-1753695627/audi.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/jcardsim/a1169aa41c-1753695627/hp.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/jcardsim/134f96ea92-1753695627/idemia.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/jcardsim/4db5421a82-1753695627/image-placeholder.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/jcardsim/8fd2017288-1753695627/image-placeholder_small.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/jcardsim/168295acec-1753695627/infinion.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/jcardsim/3cace6fa6a-1753695627/jcardsim.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/jcardsim/7055d450fb-1753695627/jcardsim_gp.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/jcardsim/04eea82890-1753695627/jcardsim_hero_mobile.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/jcardsim/c90403c0c2-1753695627/jcardsim_mobile.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/jcardsim/58e4cbf172-1753695627/jcardsim_og.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/jcardsim/516c41c16b-1753695627/learning.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/jcardsim/f36302d5ba-1753695627/lightning-fast-app-testing.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/jcardsim/14e5ff2575-1753695627/sustainable.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/jcardsim/3bf5aedd15-1753695627/thales.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/jcardsim/b24bc0d78f-1753695627/time-and-money.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/jcardsim/9e584574dc-1753695627/yubico.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/products/vtee</loc>
    <lastmod>2025-11-10T10:38:39+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/vtee/3b9d6ea933-1753695627/crypto.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/vtee/3752d750f1-1753695627/emvco.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/vtee/71d30fe51a-1753695627/fast.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/vtee/ca2251ed9c-1753695627/image-emvco.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/vtee/a6c45f260d-1753695627/image-section.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/vtee/b87ad38b08-1753695627/image-section_mobile.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/vtee/0672397676-1753695627/og_vtee.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/vtee/8d0c5ce176-1753695627/pexels-quang-nguyen.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/vtee/06de130791-1762771119/scema_richexecutionenvironmentandroid_ios.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/vtee/1872ad3720-1762771119/scema_richexecutionenvironmentandroid_ios_mobile.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/vtee/9f9aaa796b-1753695627/sertificate2.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/vtee/e8eefa644f-1753695627/slot-mobile.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/vtee/c9ac813334-1753695627/slot.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/vtee/c077089799-1753695627/usecases_image.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/vtee/d4b557035b-1753695627/usecases_image2.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/vtee/bbf1cb72e1-1753695627/vtee-hero-mobile.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/products/vtee/69c9bfb845-1753695627/vtee-hero.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/products/stringer</loc>
    <lastmod>2025-07-28T09:40:27+00:00</lastmod>
</url>
<url>
    <loc>https://licelus.com/industries</loc>
    <lastmod>2025-07-28T09:40:28+00:00</lastmod>
</url>
<url>
    <loc>https://licelus.com/industries/banking-and-finance</loc>
    <lastmod>2025-07-28T09:40:27+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/industries/banking-and-finance/bb46c01e1d-1753695627/alice-threat-intelligence.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/industries/banking-and-finance/5c2759cc3d-1753695627/banking-and-finance_og.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/industries/banking-and-finance/f680be4d43-1753695627/finance_desktop.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/industries/banking-and-finance/f9905abe34-1753695627/finance_hero.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/industries/banking-and-finance/5a02d68eaf-1753695627/finance_hero_mobile.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/industries/banking-and-finance/a0a9234416-1753695627/regulations.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/industries/banking-and-finance/proven-protection-for-mobile-banking-and-payment-apps</loc>
    <lastmod>2025-07-28T09:40:27+00:00</lastmod>
</url>
<url>
    <loc>https://licelus.com/industries/healthcare</loc>
    <lastmod>2025-07-28T09:40:27+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/industries/healthcare/17ac26f976-1753695627/alice-threat-intelligence.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/industries/healthcare/704ed0c5fd-1753695627/finance_desktop.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/industries/healthcare/ac55c5ebdc-1753695627/healthcare.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/industries/healthcare/90cc4897f7-1753695628/healthcare_hero.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/industries/healthcare/540548ae79-1753695628/healthcare_hero_mobile.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/industries/healthcare/27cc7a6257-1753695628/healthcare_og.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/industries/healthcare/2e639d7b80-1753695628/regulations.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/industries/telecoms</loc>
    <lastmod>2025-07-28T09:40:28+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/industries/telecoms/b601f705b7-1753695628/alice-threat-intelligence.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/industries/telecoms/008c640e92-1753695628/regulations.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/industries/telecoms/15ed0e4d1b-1753695628/telecom_og.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/industries/telecoms/7a786b8b82-1753695628/telecoms_hero.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/industries/telecoms/cf9a8a929c-1753695628/telecoms_hero_mobile.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/industries/automotive</loc>
    <lastmod>2025-07-28T09:40:28+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/industries/automotive/eb361e6ade-1753695628/aerospace_mobile.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/industries/automotive/bd30d10a4e-1753695628/alice-threat-intelligence.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/industries/automotive/e7ba95567f-1753695628/automotive.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/industries/automotive/9d087514a5-1753695628/automotive_mobile.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/industries/automotive/8082cb62bb-1753695628/automotive_og.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/industries/automotive/a5238a4ecc-1753695628/standards.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/industries/aerospace</loc>
    <lastmod>2025-07-28T09:40:28+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/industries/aerospace/b9b4807a2c-1753695628/aerosopace_mobile.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/industries/aerospace/4c4784312f-1753695628/aerospace.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/industries/aerospace/38ee57de9f-1753695628/aerospace_hero.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/industries/aerospace/d4bac6aac1-1753695628/aerospace_hero_mobile.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/industries/aerospace/53e95c67ad-1753695628/aerospace_og.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/industries/aerospace/bedee8a47d-1753695628/alice-threat-intelligence.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/industries/aerospace/5221b4b6cb-1753695628/regulations.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/industries/public-sector</loc>
    <lastmod>2025-07-28T09:40:28+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/industries/public-sector/15e7dc593d-1753695628/alice-threat-intelligence.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/industries/public-sector/8b7fdee8d7-1753695628/finance_desktop.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/industries/public-sector/109e5b9cfa-1753695628/public-sector_hero.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/industries/public-sector/3c5a8ebd35-1753695628/public-sector_og.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/industries/public-sector/5635ce8915-1753695628/public_sector_hero_mobile.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/industries/public-sector/e0a40d36fd-1753695628/regulations.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/resources</loc>
    <lastmod>2025-07-28T09:40:28+00:00</lastmod>
</url>
<url>
    <loc>https://licelus.com/resources/guide-to-mobile-application-protection</loc>
    <lastmod>2025-07-28T09:40:28+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/guide-to-mobile-application-protection/8840ac4d7f-1753695628/introduction-home-new.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/guide-to-mobile-application-protection/d93a69822f-1753695628/pracrice-home-new.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/guide-to-mobile-application-protection/97b8ee62e7-1753695628/principles-home-new.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/guide-to-mobile-application-protection/2444556fd4-1753695628/share.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/guide-to-mobile-application-protection/bb86918dc8-1753695628/threats-home-new.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/resources/guide-to-mobile-application-protection/introduction</loc>
    <lastmod>2025-07-28T09:40:28+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/guide-to-mobile-application-protection/introduction/db6f8f408a-1753695628/intro-share.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/guide-to-mobile-application-protection/introduction/c9c76c522d-1753695628/introduction.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/resources/guide-to-mobile-application-protection/principles</loc>
    <lastmod>2025-07-28T09:40:28+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/guide-to-mobile-application-protection/principles/97622d7d97-1753695628/principles.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/guide-to-mobile-application-protection/principles/d40a3336f0-1753695628/principles.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/resources/guide-to-mobile-application-protection/principles/the-big-picture</loc>
    <lastmod>2025-07-28T09:40:28+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/guide-to-mobile-application-protection/principles/the-big-picture/f40ff86c1b-1753695628/big-picture.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/guide-to-mobile-application-protection/principles/the-big-picture/32c44dd4a5-1753695628/fubct.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/guide-to-mobile-application-protection/principles/the-big-picture/9702ce168e-1753695628/ip.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/guide-to-mobile-application-protection/principles/the-big-picture/095fb0eac3-1753695628/the-big-picture.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/guide-to-mobile-application-protection/principles/the-big-picture/63877240f8-1753695628/user_data.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/resources/guide-to-mobile-application-protection/principles/what-needs-protecting</loc>
    <lastmod>2025-07-28T09:40:28+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/guide-to-mobile-application-protection/principles/what-needs-protecting/6fbb9a2abb-1753695628/apk-contents.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/guide-to-mobile-application-protection/principles/what-needs-protecting/b534c0f3ae-1753695628/apk-decompiled.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/guide-to-mobile-application-protection/principles/what-needs-protecting/ea21b5b1c8-1753695628/ipa-contents.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/guide-to-mobile-application-protection/principles/what-needs-protecting/8a528dc7dd-1753695628/ipa-decompiled.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/guide-to-mobile-application-protection/principles/what-needs-protecting/403ef9d0f1-1753695628/package.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/guide-to-mobile-application-protection/principles/what-needs-protecting/9029f60a57-1753695628/project.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/guide-to-mobile-application-protection/principles/what-needs-protecting/fada4dae6a-1753695628/runtime.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/guide-to-mobile-application-protection/principles/what-needs-protecting/32890f1599-1753695628/runtime2.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/guide-to-mobile-application-protection/principles/what-needs-protecting/e38897c709-1753695628/studio-xcode.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/guide-to-mobile-application-protection/principles/what-needs-protecting/a086356ebb-1753695628/what-needs-protecting.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/guide-to-mobile-application-protection/principles/what-needs-protecting/2cf3b4b30a-1753695628/what-needs-protecting.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/resources/guide-to-mobile-application-protection/principles/develop-a-threat-model-for-your-application</loc>
    <lastmod>2025-07-28T09:40:28+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/guide-to-mobile-application-protection/principles/develop-a-threat-model-for-your-application/d17818e329-1753695628/threat-model.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/guide-to-mobile-application-protection/principles/develop-a-threat-model-for-your-application/e1654fb7bc-1753695628/threat-model.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/resources/guide-to-mobile-application-protection/principles/the-four-layers-of-mobile-application-protection</loc>
    <lastmod>2025-07-28T09:40:28+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/guide-to-mobile-application-protection/principles/the-four-layers-of-mobile-application-protection/5c4a1a21d3-1753695628/4-layers.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/guide-to-mobile-application-protection/principles/the-four-layers-of-mobile-application-protection/639796a1a1-1753695628/4-layers.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/guide-to-mobile-application-protection/principles/the-four-layers-of-mobile-application-protection/50853dab5f-1753695628/application-integrity.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/guide-to-mobile-application-protection/principles/the-four-layers-of-mobile-application-protection/ee57ab6ed7-1753695628/code-hardening.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/guide-to-mobile-application-protection/principles/the-four-layers-of-mobile-application-protection/63e6760c91-1753695628/hero-placeholder.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/guide-to-mobile-application-protection/principles/the-four-layers-of-mobile-application-protection/f848be61f7-1753695628/secure-network-connections.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/guide-to-mobile-application-protection/principles/the-four-layers-of-mobile-application-protection/5039facc90-1753695628/secure-runtime-environment.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/resources/guide-to-mobile-application-protection/threats</loc>
    <lastmod>2025-07-28T09:40:28+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/guide-to-mobile-application-protection/threats/340a197b97-1753695628/threats.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/guide-to-mobile-application-protection/threats/c4e5d44b18-1753695628/threats.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/resources/guide-to-mobile-application-protection/threats/decompilation-and-modification</loc>
    <lastmod>2025-07-28T09:40:28+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/guide-to-mobile-application-protection/threats/decompilation-and-modification/471a523a15-1753695628/android-build.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/guide-to-mobile-application-protection/threats/decompilation-and-modification/9cb58ba6ce-1753695628/apk.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/guide-to-mobile-application-protection/threats/decompilation-and-modification/7b1d2b9792-1753695628/decompilation.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/guide-to-mobile-application-protection/threats/decompilation-and-modification/c5db14d0bb-1753695628/decompiling-and-modifying.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/resources/guide-to-mobile-application-protection/threats/dynamic-analysis-and-tampering</loc>
    <lastmod>2025-07-28T09:40:28+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/guide-to-mobile-application-protection/threats/dynamic-analysis-and-tampering/bd2143e333-1753695628/dynamic-analysis-and-tampering.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/guide-to-mobile-application-protection/threats/dynamic-analysis-and-tampering/4d8189d103-1753695628/dynamic-analysis.png</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/resources/guide-to-mobile-application-protection/threats/emulators-and-virtualization-apps</loc>
    <lastmod>2025-07-28T09:40:28+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/guide-to-mobile-application-protection/threats/emulators-and-virtualization-apps/0390532ce7-1753695628/emulators.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/guide-to-mobile-application-protection/threats/emulators-and-virtualization-apps/2719e8702f-1753695628/virtualized-environments.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/resources/guide-to-mobile-application-protection/threats/malware</loc>
    <lastmod>2025-07-28T09:40:28+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/guide-to-mobile-application-protection/threats/malware/d42865464d-1753695628/malware.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/guide-to-mobile-application-protection/threats/malware/e61c2401d2-1753695628/malware.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/resources/guide-to-mobile-application-protection/threats/network-communications-interception</loc>
    <lastmod>2025-07-28T09:40:28+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/guide-to-mobile-application-protection/threats/network-communications-interception/a9beab72fe-1753695628/network-communications-interception.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/guide-to-mobile-application-protection/threats/network-communications-interception/b0ceab324a-1753695628/network-communications-interceptions.png</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/resources/guide-to-mobile-application-protection/threats/mobile-app-fraud</loc>
    <lastmod>2025-07-28T09:40:28+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/guide-to-mobile-application-protection/threats/mobile-app-fraud/3b37c1d55e-1753695628/mobile-app-fraud.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/guide-to-mobile-application-protection/threats/mobile-app-fraud/6f667a67c6-1753695628/mobile-app-fraud.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/resources/guide-to-mobile-application-protection/practice</loc>
    <lastmod>2025-07-28T09:40:28+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/guide-to-mobile-application-protection/practice/9c3ee14fa5-1753695628/practice.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/guide-to-mobile-application-protection/practice/6bb181de92-1753695628/practice.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/resources/guide-to-mobile-application-protection/practice/mobile-app-protection-checklist</loc>
    <lastmod>2025-07-28T09:40:28+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/guide-to-mobile-application-protection/practice/mobile-app-protection-checklist/4810cedb4a-1753695628/checklist.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/guide-to-mobile-application-protection/practice/mobile-app-protection-checklist/094c08e50a-1753695628/mobile-application-checklist.png</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/resources/guide-to-mobile-application-protection/practice/continuous-security</loc>
    <lastmod>2025-07-28T09:40:28+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/guide-to-mobile-application-protection/practice/continuous-security/ba8e827314-1753695628/continous-security.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/guide-to-mobile-application-protection/practice/continuous-security/d833e2fb81-1753695628/continuous-security.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/guide-to-mobile-application-protection/practice/continuous-security/9f9eb05b0a-1753695628/threat-modelling.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/resources/guide-to-mobile-application-protection/summary</loc>
    <lastmod>2025-07-28T09:40:28+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/guide-to-mobile-application-protection/summary/7bee8b8d6d-1753695628/dexprotector.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/guide-to-mobile-application-protection/summary/bd477d89c8-1753695628/summary.png</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/resources/security-by-design</loc>
    <lastmod>2025-11-21T02:53:59+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/security-by-design/6f83fe1f34-1753695628/balance.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/security-by-design/8a7d8801ad-1753695628/clear.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/security-by-design/0ba87ceda8-1763693639/design-for-a-zero-trust-world.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/security-by-design/6cd9f99dc5-1753695628/home.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/security-by-design/f088899b0d-1753695628/layers.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/security-by-design/bd06ee300a-1753695628/process.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/security-by-design/66718be58d-1753695628/responsibility.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/security-by-design/223412986d-1753695628/whell.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/security-by-design/9d69dc706a-1753695628/zero-trust.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/security-by-design/b13913d78d-1753695628/zero.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/resources/security-by-design/design-for-a-zero-trust-world</loc>
    <lastmod>2025-11-21T02:53:59+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/security-by-design/design-for-a-zero-trust-world/b5532d2330-1763693639/design-for-a-zero-trust-world.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/security-by-design/design-for-a-zero-trust-world/ffd59f0532-1753695628/home.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/security-by-design/design-for-a-zero-trust-world/70c951021b-1753695628/person-on-phone-in-cafe.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/security-by-design/design-for-a-zero-trust-world/2a4481c017-1753695628/zero-trust-world.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/resources/security-by-design/security-should-be-a-continuous-process</loc>
    <lastmod>2025-11-21T02:53:59+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/security-by-design/security-should-be-a-continuous-process/9e597154f0-1753695628/continous-process.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/security-by-design/security-should-be-a-continuous-process/1305f87dd9-1753695628/home.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/security-by-design/security-should-be-a-continuous-process/9b185b20b8-1753695628/phone-and-laptop.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/security-by-design/security-should-be-a-continuous-process/b8424f6328-1763693639/security-should-be-a-continuous-process.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/resources/security-by-design/security-is-everybody-s-responsibility</loc>
    <lastmod>2025-11-21T02:53:59+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/security-by-design/security-is-everybody-s-responsibility/c572b97afa-1753695628/everyones-responsibility.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/security-by-design/security-is-everybody-s-responsibility/bc3a9640e3-1753695628/home.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/security-by-design/security-is-everybody-s-responsibility/a33cb59537-1753695628/product-team.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/security-by-design/security-is-everybody-s-responsibility/d28ea5c693-1763693639/security-is-everybody-s-responsibility.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/resources/security-by-design/there-s-a-fine-balance-between-security-and-usability</loc>
    <lastmod>2025-11-21T02:53:59+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/security-by-design/there-s-a-fine-balance-between-security-and-usability/bf00dfef15-1753695628/balance.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/security-by-design/there-s-a-fine-balance-between-security-and-usability/9e5683d60a-1753695628/home.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/security-by-design/there-s-a-fine-balance-between-security-and-usability/66568a86a3-1753695628/password.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/security-by-design/there-s-a-fine-balance-between-security-and-usability/d10b34174f-1763693639/theres-a-fine-balance-between-security-and-usability.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/resources/security-by-design/dont-reinvent-the-wheel</loc>
    <lastmod>2025-11-21T02:53:59+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/security-by-design/dont-reinvent-the-wheel/f70a940608-1763693639/don-t-reinvent-the-wheel.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/security-by-design/dont-reinvent-the-wheel/4c32d8ba84-1753695628/home.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/security-by-design/dont-reinvent-the-wheel/4cb414b3fc-1753695628/task-list.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/security-by-design/dont-reinvent-the-wheel/c99ae3a6d8-1753695628/the-wheel.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/resources/security-by-design/keep-things-clear-and-simple</loc>
    <lastmod>2025-11-21T02:53:59+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/security-by-design/keep-things-clear-and-simple/ea46cb9af3-1753695628/clear-and-simple.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/security-by-design/keep-things-clear-and-simple/2efc6e1e43-1753695628/home.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/security-by-design/keep-things-clear-and-simple/90bf456fdf-1763693639/keep-things-clear-and-simple.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/security-by-design/keep-things-clear-and-simple/5bd9aaf710-1753695628/planning.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/resources/security-by-design/add-layers-to-create-depth-of-security</loc>
    <lastmod>2025-11-21T02:53:59+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/security-by-design/add-layers-to-create-depth-of-security/72742b894a-1763693639/add-layers-to-create-depth-of-security.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/security-by-design/add-layers-to-create-depth-of-security/e1aec42526-1753695628/coding.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/security-by-design/add-layers-to-create-depth-of-security/2ce67fbda9-1753695628/home.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/security-by-design/add-layers-to-create-depth-of-security/03ec3aca87-1753695628/layers-of-security.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/resources/state-of-mobile-app-security</loc>
    <lastmod>2025-07-28T09:40:28+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/state-of-mobile-app-security/bdf8417a85-1753695628/android.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/state-of-mobile-app-security/2949ad6438-1753695628/android_studio_icon_3.6-1.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/state-of-mobile-app-security/d380d3edb0-1753695628/android_studio_icon_3.6-1.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/state-of-mobile-app-security/25330cce71-1753695628/app_store_-ios-1.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/state-of-mobile-app-security/4bcf076d3b-1753695628/article-thumbnail-illustration.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/state-of-mobile-app-security/c3e30bb352-1753695628/dynamic-analysis-and-tampering.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/state-of-mobile-app-security/b367e2fb04-1753695628/firebase-icon-1.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/state-of-mobile-app-security/7c9b9bdc55-1753695628/frame-4098.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/state-of-mobile-app-security/9e8cf802b5-1753695628/frame-4110.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/state-of-mobile-app-security/82b73d27bb-1753695628/frame-4111.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/state-of-mobile-app-security/838aee1c25-1753695628/frame-4121.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/state-of-mobile-app-security/7e5d22e036-1753695628/frame.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/state-of-mobile-app-security/730a4d043a-1753695628/group-915.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/state-of-mobile-app-security/ebf8d284f1-1753695628/group-4045.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/state-of-mobile-app-security/60ec42bc8d-1753695628/group-4046.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/state-of-mobile-app-security/87dec46588-1753695628/group-4047.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/state-of-mobile-app-security/dd2cd8da2a-1753695628/group-4049.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/state-of-mobile-app-security/70286d1400-1753695628/group-4050.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/state-of-mobile-app-security/fb30e5f7dc-1753695628/icon-1.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/state-of-mobile-app-security/5fd14a9d5c-1753695628/icon-2.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/state-of-mobile-app-security/f595a3b714-1753695628/icon__email-chart-1.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/state-of-mobile-app-security/0c9a3b1f7b-1753695628/image-section.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/state-of-mobile-app-security/2aa6949309-1753695628/image-section2.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/state-of-mobile-app-security/3d8161cfb1-1753695628/image-section4.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/state-of-mobile-app-security/542c223f2e-1753695628/ios.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/state-of-mobile-app-security/5e5c43b999-1753695628/og_thestateofmobileappsecurity-2.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/state-of-mobile-app-security/a1a4d763e8-1753695628/opengraph.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/state-of-mobile-app-security/2cbbdaa2bd-1753695628/pexels-photo-8088495-2.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/state-of-mobile-app-security/e51444738f-1753695628/pexels-quang-nguyen-vinh-2159074-1.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/state-of-mobile-app-security/0c11bf6236-1753695628/pexels-quang-nguyen-vinh-2159074-8.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/state-of-mobile-app-security/61bdbad370-1753695628/pexels-quang-nguyen-vinh-2159074-9.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/state-of-mobile-app-security/a70e8e7c56-1753695628/pexels-quang-nguyen-vinh-2159074-10.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/state-of-mobile-app-security/8be6d8bcf8-1753695628/pexels-quang-nguyen-vinh-2159074-11.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/state-of-mobile-app-security/c0c7c12f68-1753695628/pexels-quang-nguyen-vinh-2159074-12.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/state-of-mobile-app-security/d256a631bf-1753695628/platform-layers-1.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/state-of-mobile-app-security/870b5a54f6-1753695628/qr.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/state-of-mobile-app-security/264fcbc735-1753695628/shared.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/state-of-mobile-app-security/4d8260ebe9-1753695628/shared2.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/state-of-mobile-app-security/7c06251df2-1753695628/state-of-mobile-app-security.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/state-of-mobile-app-security/a399840a78-1753695628/swift-ar21-1.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/state-of-mobile-app-security/5c7e6df088-1753695628/thumbnail_how-to-boost-your-social-engineering-awareness.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/state-of-mobile-app-security/7bac96b20d-1753695628/thumbnail_mental-traps.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/state-of-mobile-app-security/a2940d582c-1753695628/thumbnail_why-cybersecurity-matters.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/state-of-mobile-app-security/737906d657-1753695628/tracking.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/state-of-mobile-app-security/ef839192a7-1753695628/visa.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/state-of-mobile-app-security/27d64736c8-1753695628/warning.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/resources/knowledge_hub</loc>
    <lastmod>2025-11-21T02:53:59+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/f62cd3838b-1753695628/guide-promo.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/86561e095f-1763693639/knowledge-hub.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/resources/knowledge_hub/mobile-app-malware-protection</loc>
    <lastmod>2026-03-11T04:24:01+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/mobile-app-malware-protection/6e2e4dad05-1772193100/alice.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/mobile-app-malware-protection/5c031bd696-1772193100/backend-fraud.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/mobile-app-malware-protection/dc498392e3-1772193100/check-1.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/mobile-app-malware-protection/fb40243705-1772193100/compliance.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/mobile-app-malware-protection/3ba45fcc74-1772193100/guide_signpost.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/mobile-app-malware-protection/1b32920d00-1772193100/mobile-api-protection_mobile.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/mobile-app-malware-protection/f4842f0383-1772193100/mobile-banking-mobile.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/mobile-app-malware-protection/5651c72aef-1772193100/mobile-banking.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/mobile-app-malware-protection/7be296a673-1772193100/og_mobile_app_malware.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/mobile-app-malware-protection/f72f9edd6a-1772193100/thumb.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/mobile-app-malware-protection/186dca1e1d-1772193100/vtee.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/resources/knowledge_hub/ekyc-fraud</loc>
    <lastmod>2026-02-27T11:51:40+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/ekyc-fraud/107dfb2e9b-1772193100/alice_hero_mobile.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/ekyc-fraud/1add6adb2e-1772193100/alice_icon.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/ekyc-fraud/4573ee0d5c-1772193100/check-1.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/ekyc-fraud/c0c667524e-1772193100/dexp_post.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/ekyc-fraud/f0bfc0a859-1772193100/dexprotector_icon.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/ekyc-fraud/fd5c98123c-1772193100/ekyc-fraud-prevention-scheme_2.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/ekyc-fraud/4ec6105f7e-1772193100/ekyc-mobile.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/ekyc-fraud/251acf8a90-1772193100/ekyc_fraud.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/ekyc-fraud/c1acbd29a0-1772193100/ekyc_fraud_thumb.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/ekyc-fraud/bf169228ed-1772193100/ekyc_hero.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/ekyc-fraud/f5036a971c-1772193100/og_ekyc-fraud-2.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/ekyc-fraud/b2ac56c06b-1772193100/vtee_card.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/ekyc-fraud/45b785ec31-1772193100/vtee_icon.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/resources/knowledge_hub/emvco-sbmp-security-requirements</loc>
    <lastmod>2026-02-27T11:51:40+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/emvco-sbmp-security-requirements/5636931f1c-1772193100/alice.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/emvco-sbmp-security-requirements/d1c554719b-1772193100/certificates-2.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/emvco-sbmp-security-requirements/08dd559681-1772193100/certificates_mobile-2.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/emvco-sbmp-security-requirements/ca1e163d6d-1772193100/check.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/emvco-sbmp-security-requirements/ea6f72fd6e-1772193100/dexprotector.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/emvco-sbmp-security-requirements/d483c5784e-1772193100/guide_signpost.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/emvco-sbmp-security-requirements/25ab2350f3-1772193100/image-desktop.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/emvco-sbmp-security-requirements/ed923afccd-1772193100/mobile.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/emvco-sbmp-security-requirements/4f2dd397dc-1772193100/og_emvco.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/emvco-sbmp-security-requirements/2c72488804-1772193100/thumbnail.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/emvco-sbmp-security-requirements/68159f5a72-1772193100/vtee.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/resources/knowledge_hub/mobile-api-protection</loc>
    <lastmod>2026-02-27T11:51:40+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/mobile-api-protection/35a42665c1-1772193100/alice.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/mobile-api-protection/de1f6c3f61-1772193100/api-protection-scheme_5.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/mobile-api-protection/7ce8d62387-1772193100/api-protection-scheme_mobile.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/mobile-api-protection/80c74932de-1772193100/check.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/mobile-api-protection/76b9c9282a-1772193100/dexprotector.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/mobile-api-protection/c04690ea22-1772193100/licel-section.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/mobile-api-protection/b5ff00d63d-1772193100/mobile-api-protection.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/mobile-api-protection/88a41b1d78-1772193100/mobile-api-protection_desktop_500.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/mobile-api-protection/277ac589f9-1772193100/mobile-api-protection_mobile.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/mobile-api-protection/ea32d7863c-1772193100/og_-api-protection.png</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/resources/knowledge_hub/mobile_banking</loc>
    <lastmod>2026-02-27T11:51:40+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/mobile_banking/5eeafc6c87-1772193100/address.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/mobile_banking/2e7ae6d4c9-1772193100/alice.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/mobile_banking/1a536289b6-1772193100/dexprotector.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/mobile_banking/18861fbcfd-1772193100/hero_mobilebankingappsecurity_mobile.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/mobile_banking/fb75f7876f-1772193100/icon.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/mobile_banking/d0db196ff1-1772193100/icon2.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/mobile_banking/c72485fc24-1772193100/mobile_banking_hero.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/mobile_banking/7fb964b679-1772193100/mobile_thumb.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/mobile_banking/f4fa52924d-1772193100/og_mobilebankingappsecurity.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/mobile_banking/2410cd0d0b-1772193100/stability-performance.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/resources/knowledge_hub/pci-mpoc</loc>
    <lastmod>2026-02-27T11:51:40+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/pci-mpoc/479680970d-1772193100/alice.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/pci-mpoc/0b41304b44-1772193100/check.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/pci-mpoc/ee2a11ae79-1772193100/compliance.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/pci-mpoc/835cdb7c46-1772193100/dexprotector2.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/pci-mpoc/c6647687db-1772193100/how.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/pci-mpoc/e92564feea-1772193100/og_pci_mpoc.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/pci-mpoc/83ba4755e4-1772193100/pci.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/pci-mpoc/afccaf621e-1772193100/pci_mpoc_hero_500.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/pci-mpoc/139afbc3c4-1772193100/pci_mpoc_hero_mobile.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/pci-mpoc/a0d9bf63cb-1772193100/pci_mpoc_thumb.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/pci-mpoc/3c51b1af5e-1772193100/pipeline_trsp.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/pci-mpoc/d39911fc88-1772193100/vtee.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/resources/knowledge_hub/threat-modelling</loc>
    <lastmod>2025-07-28T09:40:28+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/threat-modelling/0c9b7b7058-1753695628/og_treatmodeling_image.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/threat-modelling/fe1af592fa-1753695628/threat_modelling_small.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/threat-modelling/53392548e9-1753695628/threat_modelling_small.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/threat-modelling/c85272da63-1753695628/treatmodeling_image.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/threat-modelling/322610f68a-1753695628/what-needs-protecting.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/knowledge_hub/threat-modelling/5a45fe6216-1753695628/what-needs-protecting_thumb.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/resources/use-cases</loc>
    <lastmod>2025-11-21T02:53:59+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/d34ed56495-1756114118/banking.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/5406f6d02e-1756114118/default.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/162931f718-1761741576/hero_digital-id-protection.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/159b63725b-1756114118/hero_softpos.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/f86ce61260-1756114118/hero_wallet.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/eaf78c89f1-1756114118/protecting_shopping_app.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/d2590db9b0-1763693639/use-cases.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/resources/use-cases/softpos</loc>
    <lastmod>2026-02-27T11:51:40+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/softpos/66c4322fef-1756114118/alice.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/softpos/30c04bc5d6-1756114118/check.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/softpos/888addbd77-1756114118/crypto.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/softpos/0223f2bc03-1756114118/dexprotector2.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/softpos/8af33f78dc-1769776251/group-4207.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/softpos/1e8f1a4702-1756114118/help.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/softpos/c33557c207-1756114118/hero_softpos.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/softpos/c869d6e330-1756114118/image-section.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/softpos/19a1f61c14-1756114118/og_securing-your-softpos-solution.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/softpos/9c2d827b69-1756114118/pci.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/softpos/c0079137d8-1756114118/slot1.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/softpos/3df31d3e0f-1756114118/soft_apple.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/softpos/eb86f6a19c-1756114118/soft_pin.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/softpos/c622ae8b6a-1756114118/softpos.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/softpos/dd09817678-1756114118/softpos2_hero_mobile.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/softpos/cea3d628e3-1756114118/softpos_hero_mobile1.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/softpos/e08272353a-1756114118/solution.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/softpos/c52e3df065-1769776251/srt-mobile.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/softpos/42e5f61b95-1759415673/usecases_image.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/softpos/3646764ba2-1756114118/vtee.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/softpos/3c07cc3053-1756114118/why-cybersecurity-matters.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/softpos/7a936e4370-1756114118/why-cybersecurity-matters2.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/softpos/428f4d3fcb-1756114118/why-cybersecurity-matters3.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/softpos/ff039f75ba-1756114118/why-cybersecurity-matters4.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/softpos/1a402a85c2-1756114118/why-cybersecurity-matters5.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/softpos/e93992a1f6-1756114118/why-cybersecurity-matters6.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/resources/use-cases/mobile-wallet</loc>
    <lastmod>2026-02-12T12:37:40+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/mobile-wallet/d512e0f568-1756114118/alice.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/mobile-wallet/d6b1097267-1756114118/banking.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/mobile-wallet/1c64e2cd2f-1756114118/check.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/mobile-wallet/27cd5c7ea3-1756114118/crypto.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/mobile-wallet/11ea24bc79-1756114118/dexprotector2.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/mobile-wallet/4b3d966526-1769776251/group-4207.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/mobile-wallet/bbcd9d618b-1756114118/help.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/mobile-wallet/788d8ec99c-1756114118/image-emvco.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/mobile-wallet/1342955900-1756114118/image-section.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/mobile-wallet/f67fcb78eb-1756114118/mobile-wallet_hero_mobile-1.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/mobile-wallet/b9b4aec9ba-1756114118/mobile-wallet_hero_mobile.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/mobile-wallet/6a0be13bdc-1756114118/mobile_wallet.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/mobile-wallet/5c74551465-1756114118/og_mobile-wallet-security.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/mobile-wallet/0bc7ee17d7-1756114118/slot1.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/mobile-wallet/86fc2c6449-1756114118/soft_apple.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/mobile-wallet/89008d0e0d-1756114118/softpos.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/mobile-wallet/d8d9436862-1756114118/softpos_hero_mobile.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/mobile-wallet/f3adf9bae7-1769776251/srt-mobile.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/mobile-wallet/aff9d485ee-1756114118/vtee.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/mobile-wallet/b18b906a75-1756114118/vtee_icon.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/mobile-wallet/f56b0784f1-1759415673/wallet_image.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/mobile-wallet/6c8c9302fa-1756114118/wallet_mobile.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/mobile-wallet/9479f68fce-1756114118/wallet_mobile2.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/mobile-wallet/2e0b63bdfb-1756114118/why-cybersecurity-matters.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/mobile-wallet/8e572a8bd4-1756114118/why-cybersecurity-matters2.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/mobile-wallet/b5e3e838e9-1756114118/why-cybersecurity-matters3.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/mobile-wallet/0c92915160-1756114118/why-cybersecurity-matters4.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/mobile-wallet/ea6ea2ce7a-1756114118/why-cybersecurity-matters5.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/mobile-wallet/de2979823a-1756114118/why-cybersecurity-matters6.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/resources/use-cases/mobile-banking</loc>
    <lastmod>2026-02-12T12:37:40+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/mobile-banking/924cc881f1-1756114118/alice.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/mobile-banking/e72b376038-1756114118/dexprotector.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/mobile-banking/b39b4b1ee0-1756114118/dubai.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/mobile-banking/a10935486a-1756114118/group-943.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/mobile-banking/283181733c-1769776251/group-4207.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/mobile-banking/056dd44c11-1756114118/im_icon.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/mobile-banking/aab2d33b67-1756114118/im_icon2.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/mobile-banking/907ec794df-1756114118/im_icon3.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/mobile-banking/00e479b8f1-1756114118/image-section.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/mobile-banking/d9dd45b8c1-1756114118/industry.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/mobile-banking/eaca4e3099-1756114118/layers-protection.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/mobile-banking/3e345fffc1-1756114118/mobile-banking-hero.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/mobile-banking/092938ee9f-1756114118/mobile-banking-mob.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/mobile-banking/ba631402a2-1756114118/og_mobile-banking-protection.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/mobile-banking/a9983fa861-1756114118/srt-mobile.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/mobile-banking/f21b781ee6-1756114118/trusted_protection.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/mobile-banking/9df806c942-1756114118/vtee.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/resources/use-cases/digital-id-protection</loc>
    <lastmod>2025-11-04T12:23:56+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/digital-id-protection/0d50be7ce9-1761741576/alice.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/digital-id-protection/6efc0e85b9-1761741576/dexp_signpost.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/digital-id-protection/0952a315c2-1761741576/digital-id-protection_hero.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/digital-id-protection/b4b049738f-1761741576/digital-id-protection_hero_mobile.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/digital-id-protection/5a092cb280-1761741576/hero_digital-id-protection.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/digital-id-protection/09d2100f97-1761741576/id-image.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/digital-id-protection/4ccb085c1a-1761741576/og_securing-your-softpos-solution.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/digital-id-protection/c6cc8d63bd-1761741576/risk-image.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/digital-id-protection/f6e2fe4aae-1761741576/vtee.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/use-cases/digital-id-protection/bdda267e90-1761741576/vtee_icon.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/resources/glossary</loc>
    <lastmod>2025-08-29T08:57:26+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/glossary/83989be406-1756377852/glossary_signpost.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/resources/glossary/761ab48588-1756457846/mobile-application-securityglossary.png</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/resources/glossary/account-takeovers-ato</loc>
    <lastmod>2025-08-28T10:44:12+00:00</lastmod>
</url>
<url>
    <loc>https://licelus.com/resources/glossary/anti-malware</loc>
    <lastmod>2025-08-28T10:44:12+00:00</lastmod>
</url>
<url>
    <loc>https://licelus.com/resources/glossary/binary-modification-and-patching</loc>
    <lastmod>2025-08-28T10:44:12+00:00</lastmod>
</url>
<url>
    <loc>https://licelus.com/resources/glossary/code-and-resource-encryption</loc>
    <lastmod>2025-08-28T10:44:12+00:00</lastmod>
</url>
<url>
    <loc>https://licelus.com/resources/glossary/code-injection</loc>
    <lastmod>2025-08-28T10:44:12+00:00</lastmod>
</url>
<url>
    <loc>https://licelus.com/resources/glossary/credential-stuffing-brute-force-attacks</loc>
    <lastmod>2025-08-28T10:44:12+00:00</lastmod>
</url>
<url>
    <loc>https://licelus.com/resources/glossary/debugging</loc>
    <lastmod>2025-08-28T10:44:12+00:00</lastmod>
</url>
<url>
    <loc>https://licelus.com/resources/glossary/decompilation</loc>
    <lastmod>2025-08-28T10:44:12+00:00</lastmod>
</url>
<url>
    <loc>https://licelus.com/resources/glossary/device-attestation</loc>
    <lastmod>2025-08-28T10:44:12+00:00</lastmod>
</url>
<url>
    <loc>https://licelus.com/resources/glossary/device-binding</loc>
    <lastmod>2025-08-28T10:44:12+00:00</lastmod>
</url>
<url>
    <loc>https://licelus.com/resources/glossary/device-intelligence</loc>
    <lastmod>2025-08-28T10:44:12+00:00</lastmod>
</url>
<url>
    <loc>https://licelus.com/resources/glossary/digital-identity-platforms</loc>
    <lastmod>2025-11-10T10:38:39+00:00</lastmod>
</url>
<url>
    <loc>https://licelus.com/resources/glossary/dynamic-analysis</loc>
    <lastmod>2025-08-28T10:44:12+00:00</lastmod>
</url>
<url>
    <loc>https://licelus.com/resources/glossary/dynamic-binary-instrumentation</loc>
    <lastmod>2025-08-28T10:44:12+00:00</lastmod>
</url>
<url>
    <loc>https://licelus.com/resources/glossary/ekyc-fraud</loc>
    <lastmod>2025-09-30T13:02:42+00:00</lastmod>
</url>
<url>
    <loc>https://licelus.com/resources/glossary/ekyc-sdks</loc>
    <lastmod>2025-08-29T08:57:26+00:00</lastmod>
</url>
<url>
    <loc>https://licelus.com/resources/glossary/emulation-and-virtualization</loc>
    <lastmod>2025-08-28T10:44:12+00:00</lastmod>
</url>
<url>
    <loc>https://licelus.com/resources/glossary/fraud-via-banking-trojans</loc>
    <lastmod>2025-08-28T10:44:12+00:00</lastmod>
</url>
<url>
    <loc>https://licelus.com/resources/glossary/hooking</loc>
    <lastmod>2025-08-28T10:44:12+00:00</lastmod>
</url>
<url>
    <loc>https://licelus.com/resources/glossary/interference-from-auto-clicker-applications</loc>
    <lastmod>2025-08-28T10:44:12+00:00</lastmod>
</url>
<url>
    <loc>https://licelus.com/resources/glossary/interference-from-virtual-camera-apps</loc>
    <lastmod>2025-08-28T10:44:12+00:00</lastmod>
</url>
<url>
    <loc>https://licelus.com/resources/glossary/malware-infected-devices</loc>
    <lastmod>2025-08-28T10:44:12+00:00</lastmod>
</url>
<url>
    <loc>https://licelus.com/resources/glossary/man-in-the-middle-mitm-attacks</loc>
    <lastmod>2025-08-28T10:44:12+00:00</lastmod>
</url>
<url>
    <loc>https://licelus.com/resources/glossary/memory-dumping</loc>
    <lastmod>2025-08-28T10:44:12+00:00</lastmod>
</url>
<url>
    <loc>https://licelus.com/resources/glossary/mobile-api-protection</loc>
    <lastmod>2025-08-29T08:57:26+00:00</lastmod>
</url>
<url>
    <loc>https://licelus.com/resources/glossary/mobile-banking-applications</loc>
    <lastmod>2025-08-28T10:44:12+00:00</lastmod>
</url>
<url>
    <loc>https://licelus.com/resources/glossary/mobile-payment-ecosystems</loc>
    <lastmod>2025-08-28T10:44:12+00:00</lastmod>
</url>
<url>
    <loc>https://licelus.com/resources/glossary/mobile-wallet-applications</loc>
    <lastmod>2025-08-28T10:44:12+00:00</lastmod>
</url>
<url>
    <loc>https://licelus.com/resources/glossary/obfuscation</loc>
    <lastmod>2025-08-28T10:44:12+00:00</lastmod>
</url>
<url>
    <loc>https://licelus.com/resources/glossary/overlay-attacks-and-fake-interfaces</loc>
    <lastmod>2025-08-28T10:44:12+00:00</lastmod>
</url>
<url>
    <loc>https://licelus.com/resources/glossary/repackaging-and-cloning</loc>
    <lastmod>2025-08-28T10:44:12+00:00</lastmod>
</url>
<url>
    <loc>https://licelus.com/resources/glossary/reverse-engineering</loc>
    <lastmod>2025-08-28T10:44:12+00:00</lastmod>
</url>
<url>
    <loc>https://licelus.com/resources/glossary/rooted-and-jailbroken-devices</loc>
    <lastmod>2025-08-28T10:44:12+00:00</lastmod>
</url>
<url>
    <loc>https://licelus.com/resources/glossary/runtime-application-self-protection-rasp</loc>
    <lastmod>2025-08-28T10:44:12+00:00</lastmod>
</url>
<url>
    <loc>https://licelus.com/resources/glossary/runtime-integrity-checks</loc>
    <lastmod>2025-08-28T10:44:12+00:00</lastmod>
</url>
<url>
    <loc>https://licelus.com/resources/glossary/screen-capture</loc>
    <lastmod>2025-08-28T10:44:12+00:00</lastmod>
</url>
<url>
    <loc>https://licelus.com/resources/glossary/secure-storage</loc>
    <lastmod>2025-08-28T10:44:12+00:00</lastmod>
</url>
<url>
    <loc>https://licelus.com/resources/glossary/softpos-solutions</loc>
    <lastmod>2025-08-28T10:44:12+00:00</lastmod>
</url>
<url>
    <loc>https://licelus.com/resources/glossary/software-protected-cryptography</loc>
    <lastmod>2025-08-28T10:44:12+00:00</lastmod>
</url>
<url>
    <loc>https://licelus.com/resources/glossary/static-analysis</loc>
    <lastmod>2025-08-28T10:44:12+00:00</lastmod>
</url>
<url>
    <loc>https://licelus.com/resources/glossary/tampering</loc>
    <lastmod>2025-08-28T10:44:12+00:00</lastmod>
</url>
<url>
    <loc>https://licelus.com/resources/glossary/threat-intelligence</loc>
    <lastmod>2025-08-28T10:44:12+00:00</lastmod>
</url>
<url>
    <loc>https://licelus.com/resources/glossary/unauthorized-api-clients</loc>
    <lastmod>2025-08-28T10:44:12+00:00</lastmod>
</url>
<url>
    <loc>https://licelus.com/resources/glossary/virtualization-on-device</loc>
    <lastmod>2025-08-28T10:44:12+00:00</lastmod>
</url>
<url>
    <loc>https://licelus.com/resources/glossary/virtualization-protection</loc>
    <lastmod>2025-08-28T10:44:12+00:00</lastmod>
</url>
<url>
    <loc>https://licelus.com/resources/glossary/vtee</loc>
    <lastmod>2025-08-29T08:57:26+00:00</lastmod>
</url>
<url>
    <loc>https://licelus.com/resources/glossary/white-box-cryptography</loc>
    <lastmod>2025-08-28T10:44:12+00:00</lastmod>
</url>
<url>
    <loc>https://licelus.com/company</loc>
    <lastmod>2025-07-28T09:40:28+00:00</lastmod>
</url>
<url>
    <loc>https://licelus.com/company/about</loc>
    <lastmod>2025-07-28T09:40:28+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/about/132663510f-1753695628/about-us-desktop_500.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/about/b2c3f7fb94-1753695628/about-us-mobile.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/about/03ca7d11c1-1753695628/aibp.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/about/157a3df2e2-1753695628/emvco.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/about/d2b3f52137-1753695628/expertise.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/about/43afc98ef2-1753695628/expertise2.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/about/92bc068ab0-1753695628/expertise3.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/about/c3b66d85aa-1753695628/global-reach.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/about/d0169ac30e-1753695628/global.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/about/d3556e03ba-1753695628/if_logo.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/about/2ee4a397ea-1753695628/licel_og.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/about/a61b1e0136-1753695628/sg-tech.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/about/95810b7484-1753695628/sgtech.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/about/20cb3a24cf-1753695628/tech-uk.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/about/53a2a867ec-1753695628/technation.png</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/company/contact</loc>
    <lastmod>2025-08-28T10:44:12+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/contact/3b101064cd-1753695628/licel_og.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/contact/22ebb7861d-1753695628/uk.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/contact/5b62348ee5-1753695628/us.png</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/company/news</loc>
    <lastmod>2025-07-28T09:40:28+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/news/654ca2a334-1753695628/droidcon-promo.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/news/6eaea53334-1753695628/licel_og.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/company/news/introducing-alice</loc>
    <lastmod>2026-01-16T08:08:38+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/news/introducing-alice/6a29f00651-1768550918/introducing-alice.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/company/news/dexprotector-certified-by-emvco-to-secure-the-growing-world-of-mobile-payment-apps</loc>
    <lastmod>2026-01-16T08:08:38+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/news/dexprotector-certified-by-emvco-to-secure-the-growing-world-of-mobile-payment-apps/46f818fe63-1768550918/dexprotector_certified_by_emco_to_secure_the_growing_world_of_mobile.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/company/news/strategic-advisors-help-to-drive-licel-s-ambitious-growth-targets</loc>
    <lastmod>2026-01-16T08:08:38+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/news/strategic-advisors-help-to-drive-licel-s-ambitious-growth-targets/e7b64d37ec-1768550918/strategic_advisors_help_to_drive_licel_s_ambitious_growth_targets.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/company/news/dexprotector-s-arrival-on-bitrise-a-vital-step-toward-safer-mobile-apps</loc>
    <lastmod>2026-01-16T08:08:38+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/news/dexprotector-s-arrival-on-bitrise-a-vital-step-toward-safer-mobile-apps/0f5b8d3b64-1768550918/dexprotector_s_arrival_on_bitrise_a_vital_step_toward_safer_mobile.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/company/news/dexprotector-s-ios-certification-a-timely-boost-for-the-security-of-mobile-applications</loc>
    <lastmod>2026-01-16T08:08:38+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/news/dexprotector-s-ios-certification-a-timely-boost-for-the-security-of-mobile-applications/f9a35ca566-1768550918/dexprotector_certified_by_emco_to_secure_the_growing_world_of_mobile.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/company/news/new-report-reveals-app-security-isn-t-being-taken-seriously-enough</loc>
    <lastmod>2026-01-16T08:08:38+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/news/new-report-reveals-app-security-isn-t-being-taken-seriously-enough/7517b88eba-1768550918/the-state-of-mobile_app-security.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/company/news/emvco-extends-dexprotector-s-app-security-certification</loc>
    <lastmod>2026-01-16T08:08:38+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/news/emvco-extends-dexprotector-s-app-security-certification/b0299eb1d2-1768550918/dexprotector_certified_by_emco_to_secure_the_growing_world_of_mobile.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/company/news/licel-becomes-a-member-of-techuk</loc>
    <lastmod>2026-01-16T08:08:38+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/news/licel-becomes-a-member-of-techuk/958cce2be1-1768550918/licel-becomes-a-member-of-techuk.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/company/news/what-bitcode-deprecation-means-for-dexprotector</loc>
    <lastmod>2026-01-16T08:08:38+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/news/what-bitcode-deprecation-means-for-dexprotector/3c28160697-1753695628/default.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/company/news/the-uk-government-code-of-practice-to-encourage-app-security</loc>
    <lastmod>2025-07-28T09:40:28+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/news/the-uk-government-code-of-practice-to-encourage-app-security/9f067dd003-1753695628/default.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/company/news/licel-release-their-guide-to-mobile-application-protection</loc>
    <lastmod>2026-01-16T08:08:38+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/news/licel-release-their-guide-to-mobile-application-protection/67eed7288b-1768550918/licel-release-their-guide-to-mobile-application-protection.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/company/news/alice-threat-intelligence-data-insights-september-2023</loc>
    <lastmod>2026-01-16T08:08:38+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/news/alice-threat-intelligence-data-insights-september-2023/650d09c22d-1763693639/alice-threat-intelligence-1.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/news/alice-threat-intelligence-data-insights-september-2023/1759f6f297-1768550918/alice-threat-intelligence-data-insights.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/news/alice-threat-intelligence-data-insights-september-2023/97ea6ea6ee-1753695628/alice-threat-intelligence.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/company/news/licel-joins-the-grow-london-global-programme-to-unlock-growth-opportunities</loc>
    <lastmod>2026-01-16T08:08:38+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/news/licel-joins-the-grow-london-global-programme-to-unlock-growth-opportunities/ede8740f62-1753695628/glg_linkedin-sharecard.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/news/licel-joins-the-grow-london-global-programme-to-unlock-growth-opportunities/1e44c763d0-1768550918/licel-joins-the-grow-london-global-programme-to-unlock-growth-opportunities.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/company/news/dexprotector-achieves-emvco-certification-for-landmark-fourth-consecutive-year</loc>
    <lastmod>2026-01-16T08:08:38+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/news/dexprotector-achieves-emvco-certification-for-landmark-fourth-consecutive-year/4e904628a0-1768550918/dexprotector-achieves-emvco-certification-for-landmark-fourth-consecutive-year.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/news/dexprotector-achieves-emvco-certification-for-landmark-fourth-consecutive-year/e15eff5049-1753695628/emvco-cert-thumbnail-1.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/news/dexprotector-achieves-emvco-certification-for-landmark-fourth-consecutive-year/320c8a7a72-1753695628/hero_emvco-certification-press-release.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/news/dexprotector-achieves-emvco-certification-for-landmark-fourth-consecutive-year/1d86868390-1753695628/og_emvco-certification-press-release.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/company/news/licel-s-vtee-achieves-emvco-security-evaluation-certificate</loc>
    <lastmod>2026-01-16T08:08:38+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/news/licel-s-vtee-achieves-emvco-security-evaluation-certificate/2652c99f8e-1753695628/hero_vtee.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/news/licel-s-vtee-achieves-emvco-security-evaluation-certificate/0962189518-1768550918/licels-vtee-achieves-emvco-security-evaluation-certificate.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/news/licel-s-vtee-achieves-emvco-security-evaluation-certificate/8a11cb79c7-1753695628/og_vtee.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/news/licel-s-vtee-achieves-emvco-security-evaluation-certificate/bf4e40155f-1753695628/thumbnail_vtee.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/company/news/licel-vtee-achieves-emvco-approval-for-android-and-ios</loc>
    <lastmod>2026-01-16T08:08:38+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/news/licel-vtee-achieves-emvco-approval-for-android-and-ios/aa74d30eb1-1753695628/hero_vtee.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/news/licel-vtee-achieves-emvco-approval-for-android-and-ios/61c4a928c7-1768550918/licel-vtee-achieves-emvco-approval-for-android-and-ios-2.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/company/news/dexprotector-achieves-emvco-approval-for-5th-consecutive-year</loc>
    <lastmod>2026-02-12T12:37:40+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/news/dexprotector-achieves-emvco-approval-for-5th-consecutive-year/6a0017f5c8-1768550918/dexprotector-achieves-emvco-approval-for-5th-consecutive-year.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/news/dexprotector-achieves-emvco-approval-for-5th-consecutive-year/7c3815daef-1753695628/hero_emvco_certification_press_release.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/company/news/licel-partners-with-pci-security-standards-council</loc>
    <lastmod>2026-01-16T08:08:38+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/news/licel-partners-with-pci-security-standards-council/8645cccf43-1768550918/licel-partners-with-pci-security-standards-council-to-help-make-global-payment-data-secure.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/news/licel-partners-with-pci-security-standards-council/d6f5a7b5a2-1753695628/pci.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/news/licel-partners-with-pci-security-standards-council/51562ab23d-1753695628/pci_ssc.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/news/licel-partners-with-pci-security-standards-council/c32b79cbfe-1753695628/pci_ssc.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/news/licel-partners-with-pci-security-standards-council/df568c6afe-1753695628/pci_ssc_2.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/news/licel-partners-with-pci-security-standards-council/ea2045a6a5-1753695628/pci_ssc_3.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/company/news/licel-joins-globalplatform-to-support-digital-security-standards-development</loc>
    <lastmod>2026-01-16T08:08:38+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/news/licel-joins-globalplatform-to-support-digital-security-standards-development/1d09bcc170-1753695628/hero_global-platform2.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/news/licel-joins-globalplatform-to-support-digital-security-standards-development/bd04cbc55e-1768550918/licel-joins-globalplatform-to-support-digital-security-standards-development.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/company/news/licel-vtee-celebrates-emvco-sbmp-tee-evaluation-and-approval-once-again</loc>
    <lastmod>2026-01-16T08:08:38+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/news/licel-vtee-celebrates-emvco-sbmp-tee-evaluation-and-approval-once-again/8a83032f03-1753695628/hero_emvco-certification-press-release.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/news/licel-vtee-celebrates-emvco-sbmp-tee-evaluation-and-approval-once-again/7a05d010ed-1768550918/licel-vtee-celebrates-emvco-sbmp-tee-evaluation-and-approval-once-again.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/company/news/licel-is-iso-iec-27001-2022-compliant</loc>
    <lastmod>2026-01-16T08:08:38+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/news/licel-is-iso-iec-27001-2022-compliant/56895cddd7-1756114118/certificate.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/news/licel-is-iso-iec-27001-2022-compliant/871e5fe137-1756114118/certificate_mobile.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/news/licel-is-iso-iec-27001-2022-compliant/46818d5070-1756114118/hero_iso.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/news/licel-is-iso-iec-27001-2022-compliant/88aaf582e4-1768550918/licel-is-iso-iec-27001-2022-compliant.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/company/news/licel-awarded-the-highest-tier-of-csa-s-cyber-trust-mark-certification-for-its-mobile-security-solutions</loc>
    <lastmod>2026-01-16T08:08:38+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/news/licel-awarded-the-highest-tier-of-csa-s-cyber-trust-mark-certification-for-its-mobile-security-solutions/1c3ecc05e9-1763693639/hero_cybersafe-copy.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/news/licel-awarded-the-highest-tier-of-csa-s-cyber-trust-mark-certification-for-its-mobile-security-solutions/1fe56c9728-1763693639/hero_cybersafe.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/news/licel-awarded-the-highest-tier-of-csa-s-cyber-trust-mark-certification-for-its-mobile-security-solutions/cc29185090-1768550918/licel-awarded-the-highest-tier-of-csas-cyber-trust.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/news/licel-awarded-the-highest-tier-of-csa-s-cyber-trust-mark-certification-for-its-mobile-security-solutions/860117af31-1763693639/og_cybersafe.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/company/news/the-licel-vtee-earns-second-consecutive-emvco-security-approval-for-ios</loc>
    <lastmod>2026-01-16T08:08:38+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/news/the-licel-vtee-earns-second-consecutive-emvco-security-approval-for-ios/cb815384ba-1763693639/hero_vtee.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/news/the-licel-vtee-earns-second-consecutive-emvco-security-approval-for-ios/e25d1fc361-1763693639/og_emvcofor-ios.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/news/the-licel-vtee-earns-second-consecutive-emvco-security-approval-for-ios/e03698deab-1763693639/og_emvcofor-ios.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/news/the-licel-vtee-earns-second-consecutive-emvco-security-approval-for-ios/a7f4747927-1768550918/the-licel-vtee-earns-second-consecutive-emvco-security-approval-for-ios.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/company/news/dexprotector-evaluated-and-approved-by-emvco-for-sixth-consecutive-year</loc>
    <lastmod>2026-02-12T12:37:40+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/news/dexprotector-evaluated-and-approved-by-emvco-for-sixth-consecutive-year/91d0b9a612-1770636408/dexprotector-achieves-emvco-approval-for-6th-consecutive-year.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/company/news/dexprotector-evaluated-and-approved-by-emvco-for-sixth-consecutive-year/2c6effc06f-1770899860/dexprotector_achieves_emvco_approval_for_5th_consecutive_year.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/info/cookies</loc>
    <lastmod>2025-08-28T10:44:12+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/info/cookies/e5403e849f-1753695628/default.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/info/eula</loc>
    <lastmod>2025-07-28T09:40:28+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/info/eula/b676fbac07-1753695628/default.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/info/privacy</loc>
    <lastmod>2025-07-28T09:40:28+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/info/privacy/2225d6f9e1-1753695628/default.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/info/terms</loc>
    <lastmod>2025-08-28T10:44:12+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/info/terms/e3cd60e6e5-1753695628/default.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/emvco-evaluated</loc>
    <lastmod>2026-02-12T12:37:40+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/emvco-evaluated/ae875283ab-1719470319/check.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/emvco-evaluated/d0b9018a23-1719470319/emvco_hero.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/emvco-evaluated/c5e01a86b1-1719470319/emvco_hero_mobile.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/emvco-evaluated/b9f36eb5da-1719470319/how.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/emvco-evaluated/57146a4f8d-1721655447/og_emvco_evaluated.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/emvco-evaluated/795aabe0fe-1769776251/sertificate1.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/emvco-evaluated/364ae041af-1745371479/sertificate2.png</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/frameworks-technologies/hybrid-frameworks</loc>
    <lastmod>2024-02-09T18:28:28+00:00</lastmod>
</url>
<url>
    <loc>https://licelus.com/frameworks-technologies/hybrid-frameworks/flutter</loc>
    <lastmod>2024-06-01T18:31:12+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/frameworks-technologies/hybrid-frameworks/flutter/9e0d264cc2-1709541226/dexprotector.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/frameworks-technologies/hybrid-frameworks/flutter/15d8ab310b-1707503308/flutter-icon.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/frameworks-technologies/hybrid-frameworks/flutter/2d1e8b7ce9-1707503308/flutter.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/frameworks-technologies/hybrid-frameworks/flutter/2c5551d15f-1707503308/flutter_hero_mobile.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/frameworks-technologies/hybrid-frameworks/flutter/0ac784a41b-1707503308/image-placeholder.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/frameworks-technologies/hybrid-frameworks/flutter/8f81a57eb5-1707503308/image-placeholder_small.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/frameworks-technologies/hybrid-frameworks/flutter/e4ebe3c998-1707503308/instant-integration.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/frameworks-technologies/hybrid-frameworks/flutter/d19ff8f803-1707503308/instant_integration.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/frameworks-technologies/hybrid-frameworks/flutter/b2894d547b-1707503308/on-premise-1.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/frameworks-technologies/hybrid-frameworks/flutter/d849fbf084-1707503308/security-without-lag.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/frameworks-technologies/hybrid-frameworks/react-native</loc>
    <lastmod>2024-06-01T18:31:12+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/frameworks-technologies/hybrid-frameworks/react-native/aed91f61f8-1709541226/dexprotector.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/frameworks-technologies/hybrid-frameworks/react-native/877eb34f1a-1707503308/image-placeholder.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/frameworks-technologies/hybrid-frameworks/react-native/4202170d26-1707503308/image-placeholder_small.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/frameworks-technologies/hybrid-frameworks/react-native/c23c269655-1707503308/instant_integration.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/frameworks-technologies/hybrid-frameworks/react-native/decd2ea6dc-1707503308/on-premise-1.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/frameworks-technologies/hybrid-frameworks/react-native/32a04fd636-1707503308/react-nativa_hero_mobile.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/frameworks-technologies/hybrid-frameworks/react-native/1d79acae68-1707503308/react-native.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/frameworks-technologies/hybrid-frameworks/react-native/25f9f1c963-1707503308/react-native_hero.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/frameworks-technologies/hybrid-frameworks/react-native/578181dcf4-1707503308/security-without-lag.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/frameworks-technologies/hybrid-frameworks/react-native/27b878fd38-1707503308/xamarin.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/frameworks-technologies/hybrid-frameworks/xamarin</loc>
    <lastmod>2024-06-01T18:31:12+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/frameworks-technologies/hybrid-frameworks/xamarin/d23d53e44f-1709541226/dexprotector.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/frameworks-technologies/hybrid-frameworks/xamarin/5b3b32cfc9-1707503308/image-placeholder.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/frameworks-technologies/hybrid-frameworks/xamarin/ce94695223-1707503308/image-placeholder_small.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/frameworks-technologies/hybrid-frameworks/xamarin/3cda77869f-1707503308/instant_integration.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/frameworks-technologies/hybrid-frameworks/xamarin/0dc0407bc0-1707503308/on-premise-1.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/frameworks-technologies/hybrid-frameworks/xamarin/8ad53a641d-1707503308/security-without-lag.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/frameworks-technologies/hybrid-frameworks/xamarin/0c110807df-1707503308/xamarin.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/frameworks-technologies/hybrid-frameworks/xamarin/d3547fe9ec-1707503308/xamarin_hero.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/frameworks-technologies/hybrid-frameworks/xamarin/d3d4adc528-1707503308/xamarin_mobile.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/frameworks-technologies/hybrid-frameworks/web-based</loc>
    <lastmod>2024-06-01T18:31:12+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/frameworks-technologies/hybrid-frameworks/web-based/4c02233531-1709541226/dexprotector.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/frameworks-technologies/hybrid-frameworks/web-based/a01ca0f859-1707503308/image-placeholder.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/frameworks-technologies/hybrid-frameworks/web-based/a6ac2e3e9a-1707503308/image-placeholder_small.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/frameworks-technologies/hybrid-frameworks/web-based/1a0b52d411-1707503308/instant_integration.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/frameworks-technologies/hybrid-frameworks/web-based/8093db7247-1707503308/js-icon.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/frameworks-technologies/hybrid-frameworks/web-based/f5ff98d038-1707503308/on-premise-1.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/frameworks-technologies/hybrid-frameworks/web-based/5e1f5c812f-1707503308/react-native.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/frameworks-technologies/hybrid-frameworks/web-based/fd15f1d186-1707503308/security-without-lag.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/frameworks-technologies/hybrid-frameworks/web-based/35bf110a18-1707503308/web-based.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/frameworks-technologies/hybrid-frameworks/web-based/39ef0e3511-1707503308/web-based_hero_mobile.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/frameworks-technologies/hybrid-frameworks/web-based/6e9ad4d276-1707503308/xamarin.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/get-a-free-trial</loc>
    <lastmod>2025-08-28T10:44:12+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/get-a-free-trial/5f7e1574f9-1709541226/get-a-trial-og.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/get-a-free-trial-success</loc>
    <lastmod>2025-08-28T10:44:12+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/get-a-free-trial-success/2d07bdeb9f-1709541226/licel_og.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/go</loc>
    <lastmod>2025-12-17T15:11:20+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/go/c0651d66b1-1765984280/asia.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/go/790230e59a-1765984280/droidcon.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/go/1555bb0f7b-1765984280/london-2025.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/go/3e1990fe9c-1765984280/open-graph_go.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/go/droidcon-london-2025</loc>
    <lastmod>2025-12-17T15:11:20+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/go/droidcon-london-2025/b501d439d5-1765984280/droidcon_images.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/go/droidcon-london-2025/4ebfeacc12-1761741576/droidcon_og.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/go/droidcon-london-2025/ee8b7ce8c0-1761741576/event_mobile.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/go/droidcon-london-2025/272c42c192-1761741576/frame-4877.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/go/droidcon-london-2025/a1a0314d47-1761741576/group-4236.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/go/droidcon-london-2025/fd3939192e-1761741576/group-4262.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/go/droidcon-london-2025/4fca8eab0d-1761741576/hero_event.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/go/droidcon-london-2025/fe49541026-1761756307/multi.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/go/pci-ssc-bangkok-2025</loc>
    <lastmod>2026-02-12T12:37:40+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/go/pci-ssc-bangkok-2025/be593360b6-1761741576/2025_pci_ssc.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/go/pci-ssc-bangkok-2025/3333e0112d-1761741576/alice.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/go/pci-ssc-bangkok-2025/a6c252759c-1761741576/dexp.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/go/pci-ssc-bangkok-2025/468068096c-1761741576/mobile_2025_pci_ssc.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/go/pci-ssc-bangkok-2025/1e98cc54c5-1761741576/og_event.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/go/pci-ssc-bangkok-2025/119754d328-1761741576/pci-1.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/go/pci-ssc-bangkok-2025/bc7dacdea3-1761741576/vtee.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/layers-bulletin</loc>
    <lastmod>2025-10-02T14:34:33+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/30287b2fad-1759415673/bulletin_intro.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/f8f044ccf2-1759415673/bulletin_signpost.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/0547e65a14-1759415673/og_bulletin.jpg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/layers-bulletin/layers-bulletin-september-2025</loc>
    <lastmod>2025-10-29T12:39:36+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/layers-bulletin-september-2025/334ba767d0-1759415673/frame-908.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/layers-bulletin-september-2025/103245ec47-1759415673/frame-4811.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/layers-bulletin-september-2025/d679106615-1759415673/frame-4813.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/layers-bulletin-september-2025/3edc260ec6-1759415673/frame-4855.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/layers-bulletin-september-2025/010e70b785-1759415673/glossary.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/layers-bulletin-september-2025/eec5813c4a-1759415673/map.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/layers-bulletin-september-2025/81e1bb4765-1759415673/mobile-application-securityglossary-mobile.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/layers-bulletin-september-2025/604b39e1e5-1759415673/mobile-application-securityglossary.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/layers-bulletin-september-2025/3ed2b8c530-1759415673/nfc-proxy-malware-attacks-scheme.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/layers-bulletin-september-2025/d3e8d4ff1d-1759415673/og_bulletin.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/layers-bulletin-september-2025/0a8bfca1fb-1759415673/what-s-new-with-licel-s-solutions-mobile.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/layers-bulletin-september-2025/0d044f05d8-1759415673/what-s-new-with-licel-s-solutions.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/layers-bulletin/layers-bulletin-october-2025</loc>
    <lastmod>2025-10-31T10:19:44+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/layers-bulletin-october-2025/5ab5674b2e-1761744275/alice-screen.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/layers-bulletin-october-2025/66574324bd-1761744275/digital-id-protection-bg.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/layers-bulletin-october-2025/cfc56f56e9-1761744275/digital-id-protection-mobile.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/layers-bulletin-october-2025/6d6cd050d8-1761744275/droidcon-2025-and-pci-event-mobile.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/layers-bulletin-october-2025/bec2f2d389-1761744275/droidcon-2025-and-pci-event.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/layers-bulletin-october-2025/384c2979a3-1761744275/frame-908.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/layers-bulletin-october-2025/59c932f725-1761744275/frame-4811.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/layers-bulletin-october-2025/24f5579a7f-1761744275/ip_protrctions_thumb.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/layers-bulletin-october-2025/e7a39bdd66-1761744275/mobile-application-securityglossary-mobile.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/layers-bulletin-october-2025/7bb810b142-1761744275/mobile-application-securityglossary.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/layers-bulletin-october-2025/62ddb5a133-1761744275/og_bulletin.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/layers-bulletin-october-2025/57ce5481aa-1761744275/what-s-new-with-licel-s-solutions-mobile.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/layers-bulletin-october-2025/f0fd420532-1761744275/what-s-new-with-licel-s-solutions.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/layers-bulletin/layers-bulletin-november-2025</loc>
    <lastmod>2025-11-28T09:56:16+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/layers-bulletin-november-2025/f6ad834a31-1764321676/alice.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/layers-bulletin-november-2025/c30acde385-1764321676/alice.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/layers-bulletin-november-2025/4dde647293-1764321676/alice_mobile.png</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/layers-bulletin-november-2025/12ed3a3488-1764321676/alice_mobile.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/layers-bulletin-november-2025/59342b45f7-1764321676/attack.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/layers-bulletin-november-2025/4a5185b412-1764321676/attack_mobile.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/layers-bulletin-november-2025/cc8ffaf3b3-1764321676/group-4547.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/layers-bulletin-november-2025/ede8c3e1ea-1764321676/licel-s-solutions-mobile.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/layers-bulletin-november-2025/4ea720457b-1764323776/og_bulletin.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/layers-bulletin-november-2025/21d038b9f0-1764321676/what-s-new-with-licel-s-solutions.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/layers-bulletin/layers-bulletin-december-2025</loc>
    <lastmod>2025-12-19T12:38:48+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/layers-bulletin-december-2025/060c788bd9-1766147928/article_thumbnail.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/layers-bulletin-december-2025/ac58104c50-1766147928/attack.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/layers-bulletin-december-2025/856f60bdcc-1766147928/attack_mobile.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/layers-bulletin-december-2025/56ad34df57-1766147928/licel-s-solutions-mobile.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/layers-bulletin-december-2025/d89416cd12-1766147928/og_bulletin.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/layers-bulletin-december-2025/03daee6f11-1766147928/thumbnail1.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/layers-bulletin-december-2025/131cf8c22c-1766147928/thumbnail2.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/layers-bulletin-december-2025/7303780910-1766147928/thumbnail_mobile-api-protection.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/layers-bulletin-december-2025/413e7859f2-1766147928/thumbnail_vtee.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/layers-bulletin-december-2025/5871f4adf9-1766147928/what-s-new-with-licel-s-solutions.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/layers-bulletin/layers-bulletin-january-2026</loc>
    <lastmod>2026-01-30T12:30:51+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/layers-bulletin-january-2026/7a986df128-1769776251/attack.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/layers-bulletin-january-2026/da0319aa0d-1769776251/attack_mobile.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/layers-bulletin-january-2026/247cfc52d9-1769776251/frame-4819.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/layers-bulletin-january-2026/42eb2851d6-1769776251/licel-s-solutions-mobile.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/layers-bulletin-january-2026/25b1d80054-1769776251/og_bulletin.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/layers-bulletin-january-2026/69b5eeeff5-1769776251/what-s-new-with-licel-s-solutions.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/layers-bulletin/layers-bulletin-february-2026</loc>
    <lastmod>2026-02-27T11:51:40+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/layers-bulletin-february-2026/b59d16fe04-1772193100/attack.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/layers-bulletin-february-2026/d2bbfc0573-1772193100/attack_mobile.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/layers-bulletin-february-2026/4c7f4a4756-1772193100/frame-4819.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/layers-bulletin-february-2026/e8724c0d16-1772193100/licel-s-solutions-mobile.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/layers-bulletin-february-2026/2003526b0e-1772193100/og_bulletin.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/layers-bulletin-february-2026/e7c3cccdfd-1772193100/what-s-new-with-licel-s-solutions.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/layers-bulletin/layers-bulletin-march-2026</loc>
    <lastmod>2026-03-31T11:56:12+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/layers-bulletin-march-2026/0f30bc9987-1774958172/alice.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/layers-bulletin-march-2026/1edd7d9d39-1774958172/alice_mobile.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/layers-bulletin-march-2026/53442e5562-1774958172/article_thumbnail.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/layers-bulletin-march-2026/1f9c7eaed6-1774958172/attack.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/layers-bulletin-march-2026/a63786b1c3-1774958172/attack_mobile.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/layers-bulletin-march-2026/73e72ca6f9-1774958172/licel-s-solutions-mobile.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/layers-bulletin-march-2026/cf097a42b6-1774958172/og_bulletin.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/layers-bulletin-march-2026/b9d75d2b53-1774958172/os_distribution_heatmap-2.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/layers-bulletin-march-2026/61e298c88a-1774958172/os_distribution_heatmap-6.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/layers-bulletin-march-2026/954dbfa4a8-1774958172/os_distribution_heatmap.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/layers-bulletin-march-2026/7efb5b4b7b-1774958172/thumbnail_mobile-api-protection.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/layers-bulletin/layers-bulletin-march-2026/fcfca0ae98-1774958172/what-s-new-with-licel-s-solutions.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/licel-droidcon-hackathon</loc>
    <lastmod>2024-10-31T09:24:24+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/licel-droidcon-hackathon/961886fdb3-1728389132/hackathon-hero.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/licel-droidcon-hackathon/db8a2cb932-1728389132/hackathot_hero_mobile.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/licel-droidcon-hackathon/e1f26263e7-1728389132/image-section-mobile.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/licel-droidcon-hackathon/5b6fed2984-1728389132/image-section.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/licel-droidcon-hackathon/ad5869fc1f-1728389132/macbook.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/licel-droidcon-hackathon/82414db55d-1728389132/og_hackathon.jpg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/licel-droidcon-hackathon/779ea46f18-1728389132/pixel.svg</image:loc>
    </image:image>
    <image:image>
        <image:loc>https://licelus.com/media/pages/licel-droidcon-hackathon/43419b31c6-1728389132/watch.svg</image:loc>
    </image:image>
</url>
<url>
    <loc>https://licelus.com/llms-content</loc>
    <lastmod>2025-09-15T07:41:22+00:00</lastmod>
</url>
<url>
    <loc>https://licelus.com/protection-measures</loc>
    <lastmod>2024-02-09T18:28:28+00:00</lastmod>
</url>
<url>
    <loc>https://licelus.com/talk-to-us</loc>
    <lastmod>2025-08-28T10:44:12+00:00</lastmod>
    <image:image>
        <image:loc>https://licelus.com/media/pages/talk-to-us/db13f7476b-1709541226/licel_og.jpg</image:loc>
    </image:image>
</url>
</urlset>
<!-- Sitemap generated using https://gitlab.com/cre8ivclick/sitemapper -->
