<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet type='text/xsl' href='https://www.securitynewspaper.com/snnews_pl/google-sitemap-generator/sitemap.xsl'?><!-- sitemap-generator-url='http://www.arnebrachhold.de' sitemap-generator-version='4.1.23' -->
<!-- generated-on='April 4, 2026 8:28 am' -->
<urlset xmlns:xsi='http://www.w3.org/2001/XMLSchema-instance' xsi:schemaLocation='http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd' xmlns='http://www.sitemaps.org/schemas/sitemap/0.9'>	<url>
		<loc>https://www.securitynewspaper.com/2016/12/09/facebook-spam-campaign-uses-chrome-extension-spread-nude-celebrity-pdfs/</loc>
		<lastmod>2016-12-09T03:11:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/09/hash-crack-password-cracking-manual/</loc>
		<lastmod>2016-12-09T04:06:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/09/banking-trojan-uses-gmail-popup-extend-infection-victims-android-phone/</loc>
		<lastmod>2016-12-09T15:27:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/09/flaw-yahoo-email-service-allowed-hackers-access-targets-emails/</loc>
		<lastmod>2016-12-09T15:51:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/09/hacker-claims-army-3-2m-home-routers-seized-via-malicious-firmware-update/</loc>
		<lastmod>2016-12-09T16:55:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/10/new-exo-android-trojan-sold-hacking-forums-dark-web/</loc>
		<lastmod>2016-12-10T04:17:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/10/no-theres-no-evidence-yet-feds-tried-hack-georgias-voter-database/</loc>
		<lastmod>2016-12-10T06:19:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/10/cert-warns-users-stop-using-two-netgear-router-models-due-security-flaw/</loc>
		<lastmod>2016-12-10T11:03:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/10/lax-cybersecurity-nuclear-facilities-recipe-widespread-disaster/</loc>
		<lastmod>2016-12-10T11:48:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/10/three-serious-linux-kernel-security-holes-patched/</loc>
		<lastmod>2016-12-10T15:38:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/12/microsoft-powershell-becomes-popular-malware-spreading-tool/</loc>
		<lastmod>2016-12-12T02:53:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/12/president-obama-orders-full-review-alleged-russian-hacking-us-election/</loc>
		<lastmod>2016-12-12T03:12:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/12/critical-flaw-pricewaterhousecoopers-sap-security-tool-pwc-tries-downplay/</loc>
		<lastmod>2016-12-12T10:59:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/12/zcash-cryptocurrency-new-opportunity-cyber-criminals/</loc>
		<lastmod>2016-12-12T13:00:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/12/first-version-sandboxed-tor-browser-available/</loc>
		<lastmod>2016-12-12T16:18:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/13/samas-ransomware-group-made-least-450000/</loc>
		<lastmod>2016-12-13T03:12:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/13/loki-trojan-infects-android-libraries-system-process-get-root-privileges/</loc>
		<lastmod>2016-12-13T14:46:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/13/rise-telebots-analyzing-disruptive-killdisk-attacks/</loc>
		<lastmod>2016-12-13T18:19:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/13/vulnerabilities-found-linux-security-software-can-give-hackers-root-access/</loc>
		<lastmod>2016-12-13T18:21:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/14/dnc-keeps-watergate-file-cabinet-next-server-hacked-russia/</loc>
		<lastmod>2016-12-14T03:07:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/14/old-skype-mac-api-doubles-backdoor/</loc>
		<lastmod>2016-12-14T03:16:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/14/affordable-android-phones-coming-malware-injected-stock-firmware/</loc>
		<lastmod>2016-12-14T14:34:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/14/cerber-ransomware-spreads-via-fake-credit-card-email-reports/</loc>
		<lastmod>2016-12-14T14:48:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/14/vulnerability-joomla-allows-attackers-reset-passwords-take-sites/</loc>
		<lastmod>2016-12-14T15:40:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/15/hacked-cheating-site-ashley-madison-will-pay-1-6-million-ftc-breach/</loc>
		<lastmod>2016-12-15T02:51:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/15/yahoo-one-billion-accounts-hacked/</loc>
		<lastmod>2016-12-15T03:14:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/15/originull-bug-allows-hackers-read-facebook-messenger-chats/</loc>
		<lastmod>2016-12-15T13:17:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/15/bluetooth-enabled-safe-lock-popped-attackers-win-pins/</loc>
		<lastmod>2016-12-15T15:13:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/15/newly-uncovered-site-suggests-nsa-exploits-direct-sale/</loc>
		<lastmod>2016-12-15T16:29:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/16/0-days-hitting-fedora-ubuntu-open-desktops-world-hurt/</loc>
		<lastmod>2016-12-16T03:29:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/16/300-device-can-steal-mac-filevault2-passwords/</loc>
		<lastmod>2016-12-16T04:00:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/16/tordow-android-trojan-roots-devices-steals-photos-contacts-chrome-database/</loc>
		<lastmod>2016-12-16T15:55:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/16/hacking-ubuntu-linux-distro-exploiting-crashdb-code-injection-issue/</loc>
		<lastmod>2016-12-16T16:13:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/17/home-routers-attack-ongoing-malvertisement-blitz/</loc>
		<lastmod>2016-12-17T03:22:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/17/security-firms-almost-brought-massive-mirai-botnet/</loc>
		<lastmod>2016-12-17T04:46:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/17/nagios-core-patches-root-rce-vulnerabilities/</loc>
		<lastmod>2016-12-17T05:06:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/17/department-defense-warns-contractors-iran-linked-malware/</loc>
		<lastmod>2016-12-17T09:19:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/17/microsoft-patches-publicly-disclosed-ie-edge-vulnerabilities/</loc>
		<lastmod>2016-12-17T10:36:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/19/hack-write-code/</loc>
		<lastmod>2016-12-19T04:38:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/19/fbi-arrests-customer-xtreme-stresser-ddos-hire-service/</loc>
		<lastmod>2016-12-19T05:00:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/19/indian-institute-technology-kharagpur-hacked-cryptolulz666/</loc>
		<lastmod>2016-12-19T16:03:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/19/now-commonplace-android-banking-trojans-include-ransomware-features/</loc>
		<lastmod>2016-12-19T16:15:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/19/bettercap-capturing-ntlm-hashes/</loc>
		<lastmod>2016-12-19T17:35:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/20/ransomfree-latest-app-tries-stop-ransomware-infections-windows/</loc>
		<lastmod>2016-12-20T02:58:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/20/inside-leakedsource-database-3-billion-hacked-accounts/</loc>
		<lastmod>2016-12-20T06:20:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/20/cyber-attack-causes-second-power-grid-outage-ukraine-past-year/</loc>
		<lastmod>2016-12-20T13:29:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/20/ethereum-cryptocurrency-forum-suffers-data-breach/</loc>
		<lastmod>2016-12-20T13:43:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/20/new-linuxrakos-threat-devices-servers-ssh-scan/</loc>
		<lastmod>2016-12-20T15:08:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/21/russian-methbot-operation-makes-5-million-per-day-click-fraud/</loc>
		<lastmod>2016-12-21T03:57:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/21/flight-hacking-system/</loc>
		<lastmod>2016-12-21T04:16:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/21/netflix-us-twitter-account-hacked/</loc>
		<lastmod>2016-12-21T17:25:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/21/malware-disguises-installer-windows-save-dialog-box/</loc>
		<lastmod>2016-12-21T17:43:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/22/hotbed-cybercrime-activity-tracked-isp-ukrainian-region-russian-control/</loc>
		<lastmod>2016-12-22T02:40:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/22/google-bangladesh-hacked-pakistani-hackers/</loc>
		<lastmod>2016-12-22T02:54:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/22/russian-cyber-espionage-group-tracked-ukrainian-military-using-android-malware/</loc>
		<lastmod>2016-12-22T16:01:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/22/kapustkiy-hacked-website-costa-rica-embassy-china/</loc>
		<lastmod>2016-12-22T16:47:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/22/dont-pay-decrypt-cure-found-cryptxxx-ransomware/</loc>
		<lastmod>2016-12-22T17:55:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/23/protect-harden-computer-ransomware/</loc>
		<lastmod>2016-12-23T03:39:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/23/rapid7-named-common-vulnerability-exposure-numbering-authority/</loc>
		<lastmod>2016-12-23T04:58:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/23/bitcoin-price-surges-phishing-attacks-cryptocurrency-wallets-intensify/</loc>
		<lastmod>2016-12-23T15:20:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/23/leaked-documents-show-breadth-iphone-data-accessible-cellebrite-forensic-tool/</loc>
		<lastmod>2016-12-23T15:44:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/23/flaw-cisco-cloudcenter-orchestrator-exploited-hackers-wild/</loc>
		<lastmod>2016-12-23T16:44:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/24/steam-phantom-squad-ddos-steam-servers-bring-christmas/</loc>
		<lastmod>2016-12-24T03:57:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/24/phishing-actors-take-cue-malware-distributing-brethren/</loc>
		<lastmod>2016-12-24T07:43:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/24/hackers-threaten-take-psn-xbox-live-christmas-day/</loc>
		<lastmod>2016-12-24T11:22:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/24/alice-bank-atm-malware-discovered-around-two-years/</loc>
		<lastmod>2016-12-24T12:29:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/24/clever-facebook-hack-reveals-private-email-address-user/</loc>
		<lastmod>2016-12-24T13:03:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/26/cryptolulz666-hacked-dutch-chamber-commerce-hk/</loc>
		<lastmod>2016-12-26T03:08:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/26/top-10-famous-computer-bugs-cost-millions-dollars/</loc>
		<lastmod>2016-12-26T03:48:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/26/new-derialock-ransomware-active-christmas-includes-unlock-command/</loc>
		<lastmod>2016-12-26T14:57:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/26/pentesting-windows-environments-remote-delivery-powershell-payloads/</loc>
		<lastmod>2016-12-26T15:51:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/26/zyxel-netgear-fail-patch-seven-security-flaws-affecting-routers/</loc>
		<lastmod>2016-12-26T16:31:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/27/us-state-police-spent-millions-israeli-phone-cracking-tech/</loc>
		<lastmod>2016-12-27T03:18:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/27/millions-websites-vulnerable-due-security-bug-popular-php-script/</loc>
		<lastmod>2016-12-27T13:19:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/27/cert-switzerland-temporarily-cripples-tofsee-botnet/</loc>
		<lastmod>2016-12-27T14:08:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/27/automated-ettercap-tcpip-hijacking-tool-morpheus/</loc>
		<lastmod>2016-12-27T14:29:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/28/adups-backdoor-found-latest-barnes-noble-nook-tablet/</loc>
		<lastmod>2016-12-28T03:26:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/28/cyanogen-inc-shuts-cyanogenmod-christmas-bloodbath/</loc>
		<lastmod>2016-12-28T04:03:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/28/switcher-android-joins-attack-router-club/</loc>
		<lastmod>2016-12-28T14:38:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/28/ransim-test-ransomware-attacks-windows-pc/</loc>
		<lastmod>2016-12-28T15:15:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/28/android-ransomware-infects-lg-smart-tv/</loc>
		<lastmod>2016-12-28T15:53:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/29/congress-report-rules-encryption-backdoors/</loc>
		<lastmod>2016-12-29T04:45:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/29/kaspersky-discovered-one-stop-shop-hacking-goods/</loc>
		<lastmod>2016-12-29T15:12:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/29/sql-attack-constraint-based/</loc>
		<lastmod>2016-12-29T15:59:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/29/disable-system-integrity-protection-shouldnt/</loc>
		<lastmod>2016-12-29T16:37:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/30/three-chinese-charged-hacking-law-firms-stealing-insider-trading-data/</loc>
		<lastmod>2016-12-30T03:45:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/30/steganography-popular-exploit-kits-sudden/</loc>
		<lastmod>2016-12-30T04:26:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/30/unpatched-vulnerability-affecting-php-7-servers/</loc>
		<lastmod>2016-12-30T13:35:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/30/microsoft-tests-new-green-screen-death-latest-windows-10-builds/</loc>
		<lastmod>2016-12-30T14:45:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/30/best-hacking-tools-2017-windows-linux-os-x/</loc>
		<lastmod>2019-12-16T14:06:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/31/another-misguided-teen-arrested-ddosing-high-school-network/</loc>
		<lastmod>2016-12-31T05:38:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/31/white-house-fails-make-case-russian-hackers-tampered-election/</loc>
		<lastmod>2016-12-31T06:06:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/31/researcher-found-severe-flaw-monyog-monitoring-tool/</loc>
		<lastmod>2016-12-31T07:36:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/31/google-releases-two-chrome-extensions-xss-discovery-mitigation/</loc>
		<lastmod>2016-12-31T09:04:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2016/12/31/facebook-live-wants-users-cost-even-porn-piracy-polling/</loc>
		<lastmod>2016-12-31T09:43:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/02/beware-single-malicious-text-message-can-crash-iphone-video/</loc>
		<lastmod>2017-01-02T03:42:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/02/google-fixes-user-tracking-issue-pixel-smartphones/</loc>
		<lastmod>2017-01-02T14:06:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/02/33c3-changing-travelers-flight-bookings-really-easy-hackers/</loc>
		<lastmod>2017-01-02T15:55:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/02/use-andosid-hacking-app-android-smartphone/</loc>
		<lastmod>2017-01-02T16:03:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/02/digging-windows-kernel-privilege-escalation-vulnerability-cve-2016-7255/</loc>
		<lastmod>2017-01-02T17:50:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/03/protect-company-potential-encryption-backdoor-policy/</loc>
		<lastmod>2017-01-03T03:34:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/03/mongodb-databases-held-ransom-mysterious-attacker/</loc>
		<lastmod>2017-01-03T13:40:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/03/attacks-phones-bitcoin-moguls-continue-recent-keepkey-security-breach/</loc>
		<lastmod>2017-01-03T13:53:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/03/snowden-document-suggests-nsa-proof-russian-hack/</loc>
		<lastmod>2017-01-03T15:06:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/03/critical-rce-vulnerabilities-affect-swiftmailer-phpmailer-zendmail/</loc>
		<lastmod>2017-01-03T15:22:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/04/real-world-fsociety-malware-giving-mr-robot-bad-name/</loc>
		<lastmod>2017-01-04T03:44:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/04/ultrasound-tracking-used-deanonymize-tor-users/</loc>
		<lastmod>2017-01-04T04:02:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/04/merry-christmas-ransomware-dev-comodosecurity-not-bringing-holiday-cheer/</loc>
		<lastmod>2017-01-04T15:19:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/04/pseudo-darkleech-actors-behind-large-chunk-ransomware-attacks-2016/</loc>
		<lastmod>2017-01-04T15:34:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/04/google-brazil-hacked-google-com-br-unavailable-brazilians/</loc>
		<lastmod>2017-01-04T17:36:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/05/firecrypt-ransomware-comes-ddos-component/</loc>
		<lastmod>2017-01-05T03:42:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/05/fbi-website-hacked-cyberzeist-data-leaked-online/</loc>
		<lastmod>2017-01-05T04:05:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/05/new-california-law-makes-ransomware-standalone-crime/</loc>
		<lastmod>2017-01-05T14:24:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/05/researchers-work-save-trusted-computing-apps-keyloggers/</loc>
		<lastmod>2017-01-05T15:46:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/05/mm-core-memory-backdoor-returns-bigboss-sillygoose/</loc>
		<lastmod>2017-01-05T17:30:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/06/killdisk-ransomware-now-targets-linux-prevents-boot-faulty-encryption/</loc>
		<lastmod>2017-01-06T03:39:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/06/number-hijacked-mongodb-databases-going-hackers-flocking/</loc>
		<lastmod>2017-01-06T03:56:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/06/ftc-files-lawsuit-d-link-router-camera-security-flaws/</loc>
		<lastmod>2017-01-06T15:13:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/06/new-mac-malware-freezes-computer-email-drafts/</loc>
		<lastmod>2017-01-06T16:25:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/06/stolen-passwords-fuel-cardless-atm-fraud/</loc>
		<lastmod>2017-01-06T16:54:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/07/browser-autofill-profiles-can-abused-phishing-attacks/</loc>
		<lastmod>2017-01-07T05:08:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/07/analyzing-variant-gm-bot-android-malware/</loc>
		<lastmod>2017-01-07T05:22:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/07/fake-super-mario-run-android-serving-marcher-banking-trojan/</loc>
		<lastmod>2017-01-07T07:33:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/07/china-linked-dragonok-apt-group-continues-updating-tools-tactics/</loc>
		<lastmod>2017-01-07T12:44:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/07/verizon-second-thoughts-yahoo-deal-1-billion-account-hack/</loc>
		<lastmod>2017-01-07T16:07:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/09/iranian-group-oilrig-back-delivers-digitally-signed-malware/</loc>
		<lastmod>2017-01-09T03:49:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/09/crooks-cold-calling-uk-schools-tricking-staff-installing-ransomware/</loc>
		<lastmod>2017-01-09T14:58:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/09/wordpress-joomla-magento-continue-hacked-cmss/</loc>
		<lastmod>2017-01-09T15:09:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/09/google-plugs-severe-android-vulnerability-exposed-devices-spying/</loc>
		<lastmod>2017-01-09T16:09:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/09/connected-car-hacking-whos-blame/</loc>
		<lastmod>2017-01-09T16:52:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/10/merry-christmas-ransomware-now-steals-user-private-data-via-diamondfox-malware/</loc>
		<lastmod>2017-01-10T02:43:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/10/mongodb-apocalypse-professional-ransomware-group-gets-involved-infections-reach-28k-servers/</loc>
		<lastmod>2017-01-10T03:01:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/10/new-poorly-made-terror-exploit-kit-drops-monero-cryptocurrency-miner/</loc>
		<lastmod>2017-01-10T15:04:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/10/los-angeles-community-college-district-paid-28000-ransom-decrypt-files/</loc>
		<lastmod>2017-01-10T15:56:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/10/cracking-12-character-passwords/</loc>
		<lastmod>2017-01-10T17:39:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/11/spora-ransomware-works-offline-sophisticated-payment-site-yet/</loc>
		<lastmod>2017-01-11T03:30:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/11/shamoon-disk-wiping-attackers-can-now-destroy-virtual-desktops/</loc>
		<lastmod>2017-01-11T12:12:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/11/juniper-srx-firewalls-open-root-level-account-due-flaw/</loc>
		<lastmod>2017-01-11T13:11:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/11/malware-dubbed-nuke-put-sale-dark-web-alleged-russian-hacker/</loc>
		<lastmod>2017-01-11T13:34:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/12/shadowbrokers-offers-sale-stolen-nsa-windows-hacking-tools/</loc>
		<lastmod>2017-01-12T03:52:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/12/attacking-uefi-runtime-services-linux/</loc>
		<lastmod>2017-01-12T04:00:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/12/watch-tech-support-scam-take-browser-via-facebook-ads/</loc>
		<lastmod>2017-01-12T15:22:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/12/adobe-microsoft-push-critical-security-fixes/</loc>
		<lastmod>2017-01-12T16:37:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/12/hacker-steals-900-gb-cellebrite-data/</loc>
		<lastmod>2017-01-12T17:02:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/13/marlboro-ransomware-defeated-one-day/</loc>
		<lastmod>2017-01-13T03:26:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/13/cellebrite-sold-phone-hacking-tech-repressive-regimes-data-suggests/</loc>
		<lastmod>2017-01-13T03:47:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/13/airport-boarding-gate-display-leaks-booking-codes-puts-passenger-data-risk/</loc>
		<lastmod>2017-01-13T12:13:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/13/japanese-researchers-peace-sign-selfies-putting-risk/</loc>
		<lastmod>2017-01-13T12:23:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/13/whatsapp-backdoor-allows-snooping-encrypted-messages/</loc>
		<lastmod>2017-01-13T16:33:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/14/misconfigured-server-gives-insight-cerber-ransomware-operation/</loc>
		<lastmod>2017-01-14T03:40:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/14/detroit-car-makers-allegedly-hacked-names-social-security-numbers-stolen/</loc>
		<lastmod>2017-01-14T04:00:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/14/author-limitless-keylogger-faces-10-years-prison/</loc>
		<lastmod>2017-01-14T12:53:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/14/wordpress-4-7-1-released-patches-eight-vulnerabilities-62-bugs/</loc>
		<lastmod>2017-01-14T14:01:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/16/internet-archive-launches-chrome-extension-replaces-404-pages-archived-copies/</loc>
		<lastmod>2017-01-16T03:20:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/16/intelligence-report-claims-kremlin-cracked-telegram-service/</loc>
		<lastmod>2017-01-16T04:00:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/16/stealing-passwords-mcdonalds-users/</loc>
		<lastmod>2017-01-16T15:22:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/16/insidious-phishing-attack-leverages-fake-attachments-steal-gmail-credentials/</loc>
		<lastmod>2017-01-16T15:54:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/16/france-takes-steps-prevent-election-hack-attack/</loc>
		<lastmod>2017-01-16T17:49:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/17/phishing-email-uses-unexpected-trick-infect-pcs-keylogger-malware/</loc>
		<lastmod>2017-01-17T04:11:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/17/hackers-demonstrate-hack-samsung-smartcam/</loc>
		<lastmod>2017-01-17T14:42:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/17/hackers-steal-forum-accounts-clash-clans-creator-supercell/</loc>
		<lastmod>2017-01-17T15:09:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/17/watch-hackers-can-listen-facebook-messenger-chats/</loc>
		<lastmod>2017-01-17T15:19:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/17/opera-presto-source-code-leaks-online/</loc>
		<lastmod>2017-01-17T16:16:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/18/new-ghostadmin-malware-used-data-theft-exfiltration/</loc>
		<lastmod>2017-01-18T03:41:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/18/secret-tokens-found-hard-coded-hundreds-android-apps/</loc>
		<lastmod>2017-01-18T04:18:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/18/dutch-coder-built-backdoors-thousands-websites/</loc>
		<lastmod>2017-01-18T09:46:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/18/hacker-found-way-hack-facebook-exploiting-imagemagick-flaw/</loc>
		<lastmod>2017-01-18T11:50:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/19/database-ransom-attacks-hit-couchdb-hadoop-servers/</loc>
		<lastmod>2017-01-19T03:46:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/19/new-mac-backdoor-using-antiquated-code/</loc>
		<lastmod>2017-01-19T04:19:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/19/docker-patches-container-escape-vulnerability/</loc>
		<lastmod>2017-01-19T15:02:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/19/us-state-police-spent-millions-israeli-phone-cracking-tech-2/</loc>
		<lastmod>2017-01-19T16:32:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/19/new-intel-cpus-can-hacked-using-usb-port-hardware-feature/</loc>
		<lastmod>2017-01-19T16:40:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/20/android-ransomware-locks-phone-asks-credit-card-number/</loc>
		<lastmod>2017-01-20T03:07:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/20/encrypted-email-service-protonmail-opens-door-tor-users/</loc>
		<lastmod>2017-01-20T03:25:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/20/android-trojan-hijacks-google-play-store-covertly-downloads-purchases-apps/</loc>
		<lastmod>2017-01-20T13:44:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/20/satan-ransomware-service-starts-trading-dark-web/</loc>
		<lastmod>2017-01-20T15:05:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/20/bitcoin-exchange-employee-pleads-guilty-u-s-case-tied-hacking/</loc>
		<lastmod>2017-01-20T15:36:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/21/crypto-experts-say-discussed-whatsapp-feature-not-backdoor/</loc>
		<lastmod>2017-01-21T04:46:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/21/supercell-clash-clans-authors-hacked-1-million-accounts-compromised/</loc>
		<lastmod>2017-01-21T08:43:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/21/lavabit-snowden-recommended-encrypted-email-service-back/</loc>
		<lastmod>2017-01-21T10:57:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/21/general-electrics-plays-industrial-control-plant-vulnerabilities/</loc>
		<lastmod>2017-01-21T11:05:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/23/hijacking-whatsapp-accounts-using-whatsapp-web/</loc>
		<lastmod>2019-09-04T03:36:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/23/hack-furby-rickroll-friends-creepy-eyeball-menu/</loc>
		<lastmod>2017-01-23T03:50:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/23/bankbot-android-malware-based-source-code-leaked-online/</loc>
		<lastmod>2017-01-23T14:07:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/23/lloyds-bank-services-hit-denial-service-attack/</loc>
		<lastmod>2017-01-23T14:49:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/23/expert-hacks-internal-dod-network-via-army-website/</loc>
		<lastmod>2017-01-23T15:37:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/24/widely-used-webex-plugin-chrome-will-execute-attack-code-patch-now/</loc>
		<lastmod>2017-01-24T02:46:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/24/php-melody-2-7-multiple-vulnerabilities/</loc>
		<lastmod>2017-01-24T03:21:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/24/new-loophole-allowed-expert-delete-video-facebook/</loc>
		<lastmod>2017-01-24T14:26:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/24/china-cracks-unauthorized-vpns/</loc>
		<lastmod>2017-01-24T14:43:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/24/apps-carrying-hummingbad-variant-booted-google-play/</loc>
		<lastmod>2017-01-24T15:16:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/25/benevolent-hacker-warning-owners-unsecured-cassandra-databases/</loc>
		<lastmod>2017-01-25T02:39:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/25/linux-systemd-flaw-gives-attackers-root-access/</loc>
		<lastmod>2017-01-25T03:20:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/25/alphabay-dark-web-marketplace-hacked-private-messages-leaked/</loc>
		<lastmod>2017-01-25T11:47:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/25/firefox-bares-teeth-attacks-sites-collect-personal-data/</loc>
		<lastmod>2017-01-25T12:05:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/25/sage-2-0-ransomware-spreading-demands-2000-ransom/</loc>
		<lastmod>2017-01-25T12:43:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/26/trojan-transforms-linux-devices-proxies-malicious-traffic/</loc>
		<lastmod>2017-01-26T03:09:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/26/androids-pattern-lock-can-cracked-just-5-attempts/</loc>
		<lastmod>2017-01-26T03:37:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/27/virlocker-ransomware-returns-just-virulent-ever/</loc>
		<lastmod>2017-01-27T11:16:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/27/site-sold-access-3-1-billion-passwords-vanishes-reported-raid/</loc>
		<lastmod>2017-01-27T11:33:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/27/strange-case-hacked-dark-web-child-porn-site-just-got-stranger/</loc>
		<lastmod>2017-01-27T11:59:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/27/expect-renewed-push-encryption-backdoors-trump-administration/</loc>
		<lastmod>2017-01-27T13:05:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/28/texas-cops-lose-evidence-going-back-eight-years-ransomware-attack/</loc>
		<lastmod>2017-01-28T04:19:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/28/organised-cybercrime-gang-members-arrested-atm-attacks/</loc>
		<lastmod>2017-01-28T04:33:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/28/dridex-banking-trojan-returns-leverages-new-uac-bypass-method/</loc>
		<lastmod>2017-01-28T06:47:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/28/wordpress-4-7-2-update-fixes-xss-sql-injection-bugs/</loc>
		<lastmod>2017-01-28T08:38:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/28/greenbug-cyberespionage-group-targeting-middle-east-possible-links-shamoon/</loc>
		<lastmod>2017-01-28T11:20:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/30/ransomware-infects-electronic-door-locking-system-austrian-hotel/</loc>
		<lastmod>2017-01-30T03:27:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/30/uber-pays-9000-bug-bounty-payoff-partner-firms-vulnerability/</loc>
		<lastmod>2017-01-30T03:59:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/30/svg-image-format-set-wider-adoption-malware-distribution/</loc>
		<lastmod>2017-01-30T12:40:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/30/hackers-hit-d-c-police-closed-circuit-camera-network-city-officials-disclose/</loc>
		<lastmod>2017-01-30T13:03:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/30/examples-vulnerable-code-find/</loc>
		<lastmod>2017-01-30T14:21:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/31/wtf-problem-netgear-another-hijack-hole-found-routers/</loc>
		<lastmod>2017-01-31T04:04:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/31/emsisoft-website-hit-ddos-attack-company-releases-ransomware-decrypter/</loc>
		<lastmod>2017-01-31T04:25:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/31/facebook-designs-new-account-recovery-system-thats-actually-pretty-clever/</loc>
		<lastmod>2017-01-31T13:20:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/31/iphone-lock-hackers-drive-apple-kill-icloud-activation-checker/</loc>
		<lastmod>2017-01-31T13:49:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/01/31/flaws-popular-printers-can-let-hackers-easily-steal-printed-documents/</loc>
		<lastmod>2017-01-31T14:01:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/01/not-distant-future-brain-hackers-steal-deepest-secrets/</loc>
		<lastmod>2017-02-01T03:52:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/01/hackers-set-trap-security-researchers-probing-malware/</loc>
		<lastmod>2017-02-01T04:26:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/01/2-5-million-xbox-360-psp-iso-forum-accounts-breached/</loc>
		<lastmod>2017-02-01T10:46:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/01/hacking-printers-exploiting-cross-site-printing-xsp-attacks/</loc>
		<lastmod>2017-02-01T12:06:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/01/mobile-security-firm-wants-buy-expired-zero-days/</loc>
		<lastmod>2017-02-01T13:30:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/02/latest-ubuntu-update-includes-openssl-fixes/</loc>
		<lastmod>2017-02-02T03:41:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/02/pentagon-servers-flawed-easy-hack/</loc>
		<lastmod>2017-02-02T04:06:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/02/windows-drm-files-used-decloak-tor-browser-users/</loc>
		<lastmod>2017-02-02T14:03:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/02/twitter-verify-account-phishing-scam-steals-credentials-credit-card-data/</loc>
		<lastmod>2017-02-02T14:17:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/02/content-injection-vulnerability-wordpress/</loc>
		<lastmod>2017-02-06T18:33:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/03/russian-cyber-espionage-group-turla-leverages-new-javascript-malware/</loc>
		<lastmod>2017-02-03T02:53:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/03/hacker-dumps-ios-cracking-tools-allegedly-stolen-cellebrite/</loc>
		<lastmod>2017-02-03T03:13:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/03/popular-hacking-toolkit-metasploit-adds-hardware-testing-capabilities/</loc>
		<lastmod>2017-02-06T18:28:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/03/australian-particle-accelerator-hacked-passwords-email-addresses-stolen/</loc>
		<lastmod>2017-02-03T14:52:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/03/ransomware-incident-shuts-countys-government-infrastructure/</loc>
		<lastmod>2017-02-03T14:59:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/04/hacked-police-forum-accounts-sale-dark-web/</loc>
		<lastmod>2017-02-04T06:26:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/04/radio-stations-ignored-major-vulnerability-start-playing-anti-trump-song/</loc>
		<lastmod>2017-02-04T10:33:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/04/android-ad-malware-google-play-combines-three-deception-techniques/</loc>
		<lastmod>2017-02-04T13:20:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/06/anonymous-hacks-takes-10613-dark-web-portals/</loc>
		<lastmod>2017-02-06T03:31:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/06/slammer-worm-slithers-back-online-attack-ancient-sql-servers/</loc>
		<lastmod>2017-02-06T04:03:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/06/important-kernel-updates-patch-7-vulnerabilities-supported-ubuntu-oses/</loc>
		<lastmod>2017-02-06T05:09:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/06/denuvo-forgets-secure-server-leaks-years-messages-game-makers/</loc>
		<lastmod>2017-02-06T13:52:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/06/several-polish-banks-hacked-information-stolen-unknown-attackers/</loc>
		<lastmod>2017-02-06T14:27:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/06/court-orders-review-target-security-breach-settlement/</loc>
		<lastmod>2017-02-06T20:37:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/07/vizio-smart-tvs-tracked-viewers-around-clock-without-consent/</loc>
		<lastmod>2017-02-07T03:18:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/07/android-ransomware-borrows-one-trick-desktop-counterparts/</loc>
		<lastmod>2017-02-07T03:28:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/07/new-bsod-devil-comes-internet-crashes-windows-10-8-7-xp/</loc>
		<lastmod>2017-02-07T05:36:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/08/high-end-phishing-kit-automates-attacks-paypal-accounts/</loc>
		<lastmod>2017-02-08T04:13:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/08/erebus-ransomware-utilizes-uac-bypass-request-90-ransom-payment/</loc>
		<lastmod>2017-02-08T05:11:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/08/iranian-hackers-back-macdownloader-mac-malware/</loc>
		<lastmod>2017-02-08T15:11:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/08/rash-invisible-fileless-malware-infecting-banks-around-globe/</loc>
		<lastmod>2017-02-08T15:40:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/08/attackers-capitalizing-unpatched-wordpress-sites/</loc>
		<lastmod>2017-02-08T16:16:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/09/valve-going-fix-serious-vulnerability-steam-online-gaming-platform/</loc>
		<lastmod>2017-02-09T03:25:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/09/detailed-threat-analysis-shamoon-2-0-malware/</loc>
		<lastmod>2017-02-09T03:51:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/09/windows-10-cloud-already-hacked-run-win32-programs/</loc>
		<lastmod>2017-02-09T15:23:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/09/fileless-attacks-enterprise-networks/</loc>
		<lastmod>2017-02-09T15:59:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/09/owning-locked-oneplus-33t-bootloader-vulnerabilities/</loc>
		<lastmod>2017-02-09T16:14:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/10/dyna-crypt-not-encrypts-files-also-steals-info/</loc>
		<lastmod>2017-02-10T02:49:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/10/ticketbleed-flaw-f5-networks-big-ip-appliances-exposed-remote-attacks/</loc>
		<lastmod>2017-02-10T03:05:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/10/every-website-uses-jquery-mobile-open-redirect-vulnerable-xss/</loc>
		<lastmod>2017-02-10T11:49:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/10/next-generation-cyber-attacks-pdos-tdos-others/</loc>
		<lastmod>2017-02-10T13:07:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/10/quickly-add-onion-url-site-enterprise-onion-toolkit-eotk/</loc>
		<lastmod>2017-02-10T14:29:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/11/whatsapp-brings-two-step-verification-1-2-billion-users-heres-enable/</loc>
		<lastmod>2017-02-11T04:06:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/11/2-thoughts-code-execution-sql-server-via-fileless-clr-based-custom-stored-procedures/</loc>
		<lastmod>2017-02-11T04:36:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/11/hacker-hijacked-150000-printers/</loc>
		<lastmod>2017-02-11T09:40:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/11/run-april-update-azure-set-sqlthreat_detection-generally-available/</loc>
		<lastmod>2017-02-11T10:02:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/11/high-severity-bind-vulnerability-can-lead-crash/</loc>
		<lastmod>2017-02-11T16:13:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/13/ultranationalist-developer-behind-serbransom-ransomware/</loc>
		<lastmod>2017-02-13T02:36:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/13/indian-ministry-home-affairs-website-hacked-authorities-take/</loc>
		<lastmod>2017-02-13T03:09:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/13/new-tool-takes-mere-minutes-create-dark-web-version-site/</loc>
		<lastmod>2017-02-13T13:05:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/13/android-banking-trojan-marcher-targets-dozens-apps-bypasses-antivirus/</loc>
		<lastmod>2017-02-13T13:25:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/13/tcp-monitor-plus-portable-network-toolkit/</loc>
		<lastmod>2017-02-13T14:41:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/14/now-sites-can-fingerprint-online-even-use-multiple-browsers/</loc>
		<lastmod>2017-02-14T03:43:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/14/updated-firmware-due-serious-tp-link-router-vulnerabilities/</loc>
		<lastmod>2017-02-14T04:02:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/14/simulation-shows-ransomware-hack-plcs-water-treatment-plant/</loc>
		<lastmod>2017-02-14T13:41:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/14/windows-10-mobile-bug-exposes-personal-photos-locked-devices/</loc>
		<lastmod>2017-02-14T14:22:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/14/new-android-trojan-mimics-user-clicks-download-dangerous-malware/</loc>
		<lastmod>2017-02-14T15:59:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/15/new-mac-malware-pinned-russian-group-blamed-election-hacks/</loc>
		<lastmod>2017-02-15T03:19:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/15/aslr-security-busting-javascript-hack-demod-university-boffins/</loc>
		<lastmod>2017-02-15T03:42:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/15/researchers-discover-self-healing-malware-targets-magento-stores/</loc>
		<lastmod>2017-02-15T15:45:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/15/attackers-target-dozens-global-banks-new-malware/</loc>
		<lastmod>2017-02-15T16:04:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/15/somebody-hacked-mexicos-soda-tax-advocates-spyware/</loc>
		<lastmod>2017-02-15T17:12:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/16/attacking-javascript-web-service-proxies-burp/</loc>
		<lastmod>2017-02-16T02:31:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/16/vpn-protects-public-wi-fi/</loc>
		<lastmod>2019-09-11T00:00:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/16/xen-project-asks-limit-security-vulnerability-advisories/</loc>
		<lastmod>2017-02-16T14:53:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/16/isis-supporters-targeted-android-omnirat-malware/</loc>
		<lastmod>2017-02-16T15:40:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/16/phwning-boardroom-hacking-android-conference-phone/</loc>
		<lastmod>2017-02-16T16:44:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/17/unexpected-journey-2-taking-entire-domain-using-vulnerabilities-siem-product/</loc>
		<lastmod>2017-02-17T03:02:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/17/researchers-create-new-system-makes-bitcoin-transactions-harder-track/</loc>
		<lastmod>2017-02-17T04:00:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/17/usb-killer-now-lets-fry-lightning-usb-c-devices-55/</loc>
		<lastmod>2017-02-17T14:42:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/17/hermes-ransomware-decrypted-live-video-emsisofts-fabian-wosar/</loc>
		<lastmod>2017-02-17T14:53:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/17/hackers-using-android-malware-spy-israeli-soldiers/</loc>
		<lastmod>2017-02-17T15:55:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/18/8-things-know-spyware/</loc>
		<lastmod>2017-02-18T03:18:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/18/mobile-apps-stealing-connected-car/</loc>
		<lastmod>2017-02-18T03:23:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/18/german-parents-told-destroy-cayla-dolls-hacking-fears/</loc>
		<lastmod>2017-02-18T09:27:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/18/android-work-security-containers-bypassed-relative-ease/</loc>
		<lastmod>2017-02-18T14:10:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/20/rsa-conference-2017-attendees-hacked-rogue-access-points/</loc>
		<lastmod>2017-02-20T03:28:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/20/implementation-bug-zerocoin-helped-hackers-steal-zcoins-worth-585000/</loc>
		<lastmod>2017-02-20T03:54:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/20/group-iraqi-hackers-called-pro_mast3r-defaced-trump-website/</loc>
		<lastmod>2017-02-20T14:27:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/20/new-teamspy-malware-campaign-turns-teamviewer-spy-tool/</loc>
		<lastmod>2017-02-20T14:43:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/20/malware-used-attack-polish-banks-contained-false-flags-blaming-russian-hackers/</loc>
		<lastmod>2017-02-20T16:45:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/21/hackers-took-control-pc-microphones-siphon-600-gb-70-targets/</loc>
		<lastmod>2017-02-21T03:56:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/21/java-python-unpatched-firewall-crossing-ftp-snafu/</loc>
		<lastmod>2017-02-21T04:28:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/21/operation-bugdrop-hackers-siphoned-600gb-taking-control-pc-microphones/</loc>
		<lastmod>2017-02-21T15:53:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/21/rtm-stealthy-group-targeting-remote-banking-system/</loc>
		<lastmod>2017-02-21T16:23:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/21/hacks-time-engineers-recently-found-yahoo-systems-remained-compromised/</loc>
		<lastmod>2017-02-21T17:07:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/22/unstoppable-javascript-attack-helps-ad-fraud-tech-support-scams-0-day-attacks/</loc>
		<lastmod>2017-02-22T03:17:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/22/revisiting-windows-security-hardening-kernel-address-protection/</loc>
		<lastmod>2017-02-22T03:26:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/22/website-uses-add-extension-leave-popups-infect-chrome-users/</loc>
		<lastmod>2017-02-22T15:47:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/22/transferring-backdoor-payloads-dns-aaaa-records-ipv6-address/</loc>
		<lastmod>2017-02-22T16:36:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/22/domainmonster-mash-hundreds-websites-vandalized-brit-web-host-server-hacked/</loc>
		<lastmod>2017-02-22T16:42:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/23/cve-2017-6074-new-11-year-old-linux-kernel-flaw-discovered/</loc>
		<lastmod>2017-02-23T03:22:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/23/new-macos-patcher-ransomware-locks-data-good-no-way-recover-files/</loc>
		<lastmod>2017-02-23T03:28:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/23/released-android-malware-source-code-used-run-banking-botnet/</loc>
		<lastmod>2017-02-23T14:11:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/23/malware-uses-blinking-hard-drive-leds-transmit-data-nearby-cameras/</loc>
		<lastmod>2017-02-23T14:23:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/23/threat-spotlight-disttrack-malware/</loc>
		<lastmod>2017-02-23T15:53:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/24/google-announces-first-ever-sha1-collision-attack/</loc>
		<lastmod>2017-02-24T04:01:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/24/serious-cloudflare-bug-exposed-potpourri-secret-customer-data/</loc>
		<lastmod>2017-02-24T04:11:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/24/system-admin-used-vpn-hack-cause-1-1-million-loss-ex-employer-caught/</loc>
		<lastmod>2017-02-24T14:10:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/24/british-man-arrested-900000-broadband-routers-knocked-offline-germany/</loc>
		<lastmod>2017-02-24T14:21:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/24/android-ransomware-requires-victim-speak-unlock-code/</loc>
		<lastmod>2017-02-24T16:00:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/25/gmail-accounts-lockout-users-glitch-hack-mystery/</loc>
		<lastmod>2017-02-25T04:31:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/25/google-goes-public-unpatched-microsoft-edge-ie-vulnerability/</loc>
		<lastmod>2017-02-25T05:25:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/25/iphone-robbers-try-iphish-victims/</loc>
		<lastmod>2017-02-25T05:47:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/25/database-ransom-attacks-now-hit-mysql-servers/</loc>
		<lastmod>2017-02-25T10:06:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/25/vulnerability-deep-dive-ichitaro-office-excel-file-code-execution-vulnerability/</loc>
		<lastmod>2017-02-25T15:41:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/27/roberts-hawaii-tour-company-hacked-credit-card-personal-info-exposed/</loc>
		<lastmod>2017-02-27T02:55:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/27/new-raas-portal-preparing-spread-unlock26-ransomware/</loc>
		<lastmod>2017-02-27T03:23:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/27/google-sends-e2email-encrypted-email-code-open-source/</loc>
		<lastmod>2017-02-27T13:19:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/27/stolen-ehr-data-flooding-criminal-underground-communities-deep-web/</loc>
		<lastmod>2017-02-27T14:41:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/27/dns-attacks-try-direct-fake-pages/</loc>
		<lastmod>2017-02-27T16:37:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/28/necurs-botnet-evolving-now-includes-ddos-module/</loc>
		<lastmod>2017-02-28T02:58:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/28/web-cache-deception-attack/</loc>
		<lastmod>2017-02-28T03:41:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/28/critical-sql-injection-vulnerability-found-nextgen-gallery-wordpress-plugin/</loc>
		<lastmod>2017-02-28T14:19:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/02/28/stuffed-toys-database-left-personal-data-exposed-says-security-expert/</loc>
		<lastmod>2017-02-28T16:33:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/01/eset-antivirus-cracks-opens-apple-macs-remote-root-execution-via-man-middle-diddle/</loc>
		<lastmod>2017-03-01T03:52:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/01/dridex-trojan-gets-major-atombombing-update/</loc>
		<lastmod>2017-03-01T03:59:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/01/xss-flaws-zscaler-cloud-management-software-allow-logged-attackers-hack-coworkers/</loc>
		<lastmod>2017-03-01T15:16:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/01/massive-necurs-spam-botnet-now-equipped-launch-ddos-attacks/</loc>
		<lastmod>2017-03-01T16:00:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/01/two-new-mac-backdoors-discovered/</loc>
		<lastmod>2017-03-01T18:14:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/02/yahoo-cookie-hacks-affected-32-million-accounts-ceo-forgoes-bonus/</loc>
		<lastmod>2017-03-02T03:44:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/02/online-shops-plundered-bank-card-stealing-malware-bungling-backend-aptos-hacked/</loc>
		<lastmod>2017-03-02T04:15:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/02/blackarch-linux-2017-03-01-hacking-distro-released-50-new-tools-kernel-4-9-11/</loc>
		<lastmod>2017-03-02T14:51:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/02/hidden-backdoor-discovered-chinese-iot-devices/</loc>
		<lastmod>2017-03-02T16:28:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/03/researchers-uncover-powershell-trojan-uses-dns-queries-get-orders/</loc>
		<lastmod>2017-03-03T03:07:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/03/exploiting-android-s-boot-getting-arbitrary-code-exec-samsung-bootloader-12/</loc>
		<lastmod>2017-03-03T03:28:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/03/mike-pence-used-aol-e-mail-account-state-business-got-hacked/</loc>
		<lastmod>2017-03-03T15:35:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/03/malware-leveraging-powersploit/</loc>
		<lastmod>2017-03-03T17:02:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/03/hackerone-offers-free-bug-bounty-programs-open-source-projects/</loc>
		<lastmod>2017-03-03T17:51:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/04/new-dark-web-service-helps-crooks-trick-revealing-payment-card-pin/</loc>
		<lastmod>2017-03-04T03:45:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/04/penetration-testing-metasploit-made-easy/</loc>
		<lastmod>2017-03-04T04:07:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/04/exclusive-criminal-group-using-ssh-tcp-direct-forward-attack-also-targeting-italian-infrastructure/</loc>
		<lastmod>2017-03-04T08:34:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/04/third-party-vendor-issues-temporary-patch-windows-gdi-vulnerability/</loc>
		<lastmod>2017-03-04T14:40:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/04/researchers-store-full-computer-operating-system-dna/</loc>
		<lastmod>2017-03-04T15:09:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/06/keep-tor-hack-source-code-secret-doj-dismisses-child-porn-case/</loc>
		<lastmod>2017-03-06T02:56:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/06/biterrant-attack/</loc>
		<lastmod>2017-03-06T12:23:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/06/ransomware-hits-pennsylvania-senate-democrats/</loc>
		<lastmod>2017-03-06T13:38:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/06/bug-twitter-allowed-hackers-access-locked-accounts-october/</loc>
		<lastmod>2018-05-11T17:38:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/06/hacking-western-digital-mycloud-nas/</loc>
		<lastmod>2017-03-06T14:50:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/07/hard-drive-will-self-destruct-data-wiping-malware-targets-europe/</loc>
		<lastmod>2017-03-07T03:13:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/07/undetectable-mac-malware-proton-sale-dark-web-40-btc/</loc>
		<lastmod>2017-03-07T03:23:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/07/poachers-hack-gps-trackers-extract-metadata-public-photos-hunt-animals/</loc>
		<lastmod>2017-03-07T13:46:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/07/wordpress-webmasters-urged-upgrade-version-4-73-patch-six-security-holes/</loc>
		<lastmod>2017-03-07T14:12:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/07/wikileaks-publishes-docs-says-trove-cia-hacking-tools/</loc>
		<lastmod>2017-03-07T17:19:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/08/spies-spying-part-97-shock-horror-cia-turn-phones-tvs-computers-surveillance-bugs/</loc>
		<lastmod>2017-03-08T04:02:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/08/submit-uefi-ransomware-full-disclosure-black-hat-asia/</loc>
		<lastmod>2017-03-08T04:09:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/08/mobile-menace-monday-facebook-lite-infected-spy-fakeplay/</loc>
		<lastmod>2017-03-08T13:23:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/08/verifone-investigates-gas-station-hack-attacks/</loc>
		<lastmod>2017-03-08T16:50:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/09/multiple-vulnerabilities-discovered-dna-sequencing-web-application/</loc>
		<lastmod>2017-03-09T03:29:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/09/apache-struts-jakarta-multipart-parser-remote-code-execution-vulnerability/</loc>
		<lastmod>2017-03-09T03:35:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/09/microsoft-excel-files-increasingly-used-spread-malware/</loc>
		<lastmod>2017-03-09T03:43:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/09/anonymous-hacker-exposed-steubenville-rape-case-gets-two-years-prison/</loc>
		<lastmod>2017-03-09T15:37:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/09/new-ranran-ransomware-uses-encryption-tiers-political-messages/</loc>
		<lastmod>2017-03-09T16:51:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/10/third-websites-use-outdated-vulnerable-javascript-libraries/</loc>
		<lastmod>2017-03-10T03:54:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/10/encrypted-messaging-app-confide-full-security-bugs-exposing-user-data/</loc>
		<lastmod>2017-03-10T04:22:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/10/researchers-break-mac-address-randomization-track-100-test-devices/</loc>
		<lastmod>2017-03-10T15:26:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/10/mobile-security-reality-malware-augmented/</loc>
		<lastmod>2017-03-10T15:57:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/11/credit-card-stealer-disguises-google-chrome-browser/</loc>
		<lastmod>2017-03-11T03:41:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/11/android-patched-protect-users-getting-hacked-via-headphones-connector/</loc>
		<lastmod>2017-03-11T03:59:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/11/intel-security-mcafee-releases-rootkit-scanner-following-vault-7-cia-leak/</loc>
		<lastmod>2017-03-11T11:16:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/11/malware-found-preinstalled-38-android-phones-used-2-companies/</loc>
		<lastmod>2017-03-11T11:38:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/11/cujo-smart-firewall-stops-people-hacking-internet-devices/</loc>
		<lastmod>2017-03-11T15:43:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/13/new-linux-malware-exploits-cgi-vulnerability/</loc>
		<lastmod>2017-03-13T03:17:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/13/super-malware-steals-encryption-keys-intel-sgx-enclaves/</loc>
		<lastmod>2017-03-13T03:26:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/15/crooks-hijack-magento-realex-payments-extension-steal-payment-card-data/</loc>
		<lastmod>2017-03-15T03:04:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/15/petrwrap-new-petya-based-ransomware-used-targeted-attacks/</loc>
		<lastmod>2017-03-15T03:17:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/15/google-kicks-chamois-android-adware-off-play-store/</loc>
		<lastmod>2017-03-15T03:40:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/15/turkish-hackers-deface-hundreds-websites-twitter-accounts/</loc>
		<lastmod>2017-03-15T14:05:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/15/%e2%80%8bnew-smartphone-threat-now-attackers-can-use-sound-hack-device/</loc>
		<lastmod>2017-03-15T14:26:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/16/researchers-find-vulnerability-whatsapp-telegrams-web-clients/</loc>
		<lastmod>2017-03-16T03:41:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/16/russian-spies-brains-behind-yahoo-mega-hack-four-charged/</loc>
		<lastmod>2017-03-16T04:09:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/16/revenge-ransomware-cryptomix-variant-distributed-rig-exploit-kit/</loc>
		<lastmod>2017-03-16T09:11:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/16/new-majikpos-malware-targets-users-across-north-america-canada/</loc>
		<lastmod>2017-03-16T12:09:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/17/another-years-old-flaw-fixed-linux-kernel/</loc>
		<lastmod>2017-03-17T02:26:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/17/ransomware-operators-hiding-malware-deeper-installer-packages/</loc>
		<lastmod>2017-03-17T03:07:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/17/ubiquiti-devices-exposed-hacking-via-20-years-old-php-version/</loc>
		<lastmod>2017-03-17T15:53:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/17/suspected-hack-attack-snagging-cell-phone-data-across-d-c/</loc>
		<lastmod>2017-03-17T17:07:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/18/us-cert-security-products-perform-https-interception-weaken-security/</loc>
		<lastmod>2017-03-18T03:16:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/18/abta-website-hacked-43000-people-affected-breach/</loc>
		<lastmod>2017-03-18T04:00:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/18/virtual-machine-escape-fetches-105000-pwn2own-hacking-contest-updated/</loc>
		<lastmod>2017-03-18T11:20:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/18/security-vulnerability-mcdonalds-india-allows-hackers-access-customer-data/</loc>
		<lastmod>2017-03-18T12:40:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/18/former-admin-accused-leaving-backdoor-account-accessing-700-times/</loc>
		<lastmod>2017-03-18T16:10:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/20/new-old-technique-hijacks-user-sessions-windows-versions/</loc>
		<lastmod>2017-03-20T02:46:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/20/attackers-leverage-excel-powershell-dns-latest-non-malware-attack/</loc>
		<lastmod>2017-03-20T02:55:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/20/ciscos-investigation-vault-7-leak-uncovers-0-day-affecting-318-products/</loc>
		<lastmod>2017-03-20T14:42:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/20/dark-web-crackdowns-just-hot-air/</loc>
		<lastmod>2017-03-20T15:58:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/21/big-surprise-chinese-pups-deliver-backdoored-drivers/</loc>
		<lastmod>2017-03-21T02:27:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/21/moodle-remote-code-execution/</loc>
		<lastmod>2017-03-21T02:45:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/21/polski-vortex-flotera-ransomware-connection/</loc>
		<lastmod>2017-03-21T15:38:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/21/twitter-app-spams-fappening-bait-amazon-surveys/</loc>
		<lastmod>2017-03-21T16:08:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/21/hackers-will-remotely-wipe-iphones-unless-apple-pays-ransom/</loc>
		<lastmod>2017-03-21T17:20:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/22/new-attack-uses-microsofts-application-verifier-hijack-antivirus-software/</loc>
		<lastmod>2017-03-22T02:59:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/22/new-lltp-ransomware-appears-rewritten-venus-locker/</loc>
		<lastmod>2017-03-22T03:33:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/22/chinese-crooks-use-fake-cellular-telephony-towers-spread-android-malware/</loc>
		<lastmod>2017-03-22T09:45:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/22/new-metasploit-rftransceiver-extension-allows-testing-iot-sevices/</loc>
		<lastmod>2017-03-22T12:02:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/22/lastpass-bugs-allow-malicious-websites-steal-passwords/</loc>
		<lastmod>2017-03-22T14:43:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/23/industrial-control-systems-get-infected-malware-accident/</loc>
		<lastmod>2017-03-23T02:23:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/23/malvertising-campaign-adult-sites-spreads-ramnit-trojan/</loc>
		<lastmod>2017-03-23T03:47:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/23/word-document-spreads-macro-malware-targeting-windows-macos/</loc>
		<lastmod>2017-03-23T14:32:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/23/ebay-asks-users-downgrade-security/</loc>
		<lastmod>2017-03-23T14:52:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/23/sap-infrastructure-used-deploy-ransomware-enterprise-networks/</loc>
		<lastmod>2017-03-23T16:15:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/24/wikileaks-dark-matter-documents-reveal-cia-hacks-macs-iphones/</loc>
		<lastmod>2017-03-24T02:22:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/24/android-forums-resets-passwords-hack/</loc>
		<lastmod>2017-03-24T02:55:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/24/third-party-app-stores-delivered-via-ios-app-store/</loc>
		<lastmod>2017-03-24T11:33:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/24/using-sql-server-attacking-forest-trust/</loc>
		<lastmod>2017-03-24T16:01:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/24/wmimplant-wmi-based-agentless-post-exploitation-rat-developed-powershell/</loc>
		<lastmod>2017-03-24T16:21:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/25/new-attack-xssjacking-combines-clickjacking-pastejacking-self-xss/</loc>
		<lastmod>2017-03-25T02:38:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/25/massive-gift-card-fraud-bot-discovered-1000-customer-websites-attacked-already/</loc>
		<lastmod>2017-03-25T03:32:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/25/spear-phishing-campaign-targeted-saudi-arabia-government-organizations/</loc>
		<lastmod>2017-03-25T10:23:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/25/bluetooth-bug-lets-burglars-disable-google-nest-cams/</loc>
		<lastmod>2017-03-25T11:51:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/27/experts-doubt-hackers-claim-millions-breached-apple-credentials/</loc>
		<lastmod>2017-03-27T02:30:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/27/dishwasher-directory-traversal-bug/</loc>
		<lastmod>2017-03-27T02:56:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/27/zero-terminal-tiny-linux-pc-can-build-using-raspberry-pi-smartphone-keyboard/</loc>
		<lastmod>2017-03-27T15:09:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/27/hackers-breached-department-labor-job-seekers-portal/</loc>
		<lastmod>2017-03-27T16:52:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/27/british-authorities-slam-whatsapp-encryption-used-london-terrorist/</loc>
		<lastmod>2017-03-27T17:21:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/28/ransomware-scammers-exploited-safari-bug-extort-porn-viewing-ios-users/</loc>
		<lastmod>2017-03-28T03:16:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/28/adware-replaces-phone-numbers-security-firms-returned-search-results/</loc>
		<lastmod>2017-03-28T03:15:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/28/pycl-ransomware-delivered-via-rig-ek-distribution-test/</loc>
		<lastmod>2017-03-28T15:35:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/28/apt29-used-domain-fronting-tor-execute-backdoor/</loc>
		<lastmod>2017-03-28T16:11:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/28/microsoft-wont-help-government-hack-users/</loc>
		<lastmod>2017-03-28T17:43:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/29/humbled-malware-author-leaks-source-code-regain-communitys-trust/</loc>
		<lastmod>2017-03-29T02:55:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/29/ddos-server-ransomware-apache-struts-2-cve-2017-5638-campaign/</loc>
		<lastmod>2017-03-29T03:04:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/29/github-users-targeted-dimnie-trojan/</loc>
		<lastmod>2017-03-29T16:27:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/29/russian-hacker-pleads-guilty-role-infamous-linux-ebury-malware/</loc>
		<lastmod>2017-03-29T16:49:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/30/c-cops-arrest-man-potentially-linked-apple-extortion/</loc>
		<lastmod>2017-03-30T03:36:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/30/90-smart-tvs-vulnerable-remote-hacking-via-rogue-tv-signals/</loc>
		<lastmod>2017-03-30T03:57:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/30/google-wants-change-javascript-popups-abuse-tech-support-scammers/</loc>
		<lastmod>2017-03-30T12:12:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/30/kremlin-backed-apt28-doesnt-even-bother-hiding-attacks-says-finnish-secret-police/</loc>
		<lastmod>2017-03-30T12:18:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/31/flatbed-scanners-used-relay-point-controlling-malware-air-gapped-systems/</loc>
		<lastmod>2017-03-31T04:34:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/31/raging-sysadmin-shuts-company-servers-deletes-system-files/</loc>
		<lastmod>2017-03-31T16:09:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/31/cve-2017-2636-exploit-race-condition-n_hdlc-linux-kernel-driver-bypassing-smep/</loc>
		<lastmod>2017-03-31T16:28:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/03/31/listen-samsung-galaxy-s8-face-recognition-can-fooled-photo/</loc>
		<lastmod>2017-03-31T16:58:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/01/sanctions-ransomware-makes-fun-usa-sanctions-russia/</loc>
		<lastmod>2017-04-01T06:39:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/01/researchers-disclose-vulnerabilities-gigabyte-brix-systems/</loc>
		<lastmod>2017-04-01T10:51:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/01/smart-tv-hack-embeds-attack-code-broadcast-signal-no-access-required/</loc>
		<lastmod>2017-04-01T12:50:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/01/skype-users-hit-ransomware-app-malicious-ads/</loc>
		<lastmod>2017-04-01T17:05:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/01/telegram-finally-adds-end-end-encrypted-calls-app/</loc>
		<lastmod>2017-04-01T17:22:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/03/phishing-campaigns-target-airline-consumers-seeking-business-credentials/</loc>
		<lastmod>2017-04-03T03:02:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/03/hacker-stole-personal-information-95000-mcdonalds-job-applicants/</loc>
		<lastmod>2017-04-03T03:09:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/03/tech-news-brief-twitters-new-avatars-codeplex-shuts-iaaf-ny-post-hacked/</loc>
		<lastmod>2017-04-03T15:32:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/03/hackers-can-easily-hijack-dildo-camera-livestream-inside-vagina/</loc>
		<lastmod>2017-04-03T16:46:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/03/japan-plans-develop-hack-proof-satellite-system/</loc>
		<lastmod>2017-04-03T17:00:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/04/hack-virtual-memory-python-bytes/</loc>
		<lastmod>2017-04-04T03:09:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/04/beginners-guide-metasploit/</loc>
		<lastmod>2017-04-04T03:35:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/04/chinese-group-hacking-cloud-providers-reach-secure-enterprise-networks/</loc>
		<lastmod>2017-04-04T15:19:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/04/uefi-vulnerabilities-allow-fully-compromise-gigabyte-mini-pcs/</loc>
		<lastmod>2017-04-04T15:48:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/05/google-apple-issue-security-updates-critical-broadcom-wifi-vulnerabilities/</loc>
		<lastmod>2017-04-05T02:42:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/05/air-exploiting-broadcoms-wi-fi-stack-part-1/</loc>
		<lastmod>2017-04-05T02:55:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/05/hackers-empty-atms-drilling-one-small-hole/</loc>
		<lastmod>2017-04-05T15:35:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/05/south-korean-users-targeted-new-stealthy-malware-rokrat-rat/</loc>
		<lastmod>2017-04-05T16:32:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/06/meet-pegasus-worst-android-rat-malware-created-targeted-attack/</loc>
		<lastmod>2017-04-06T03:23:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/06/booby-trap-shortcut-backdoor/</loc>
		<lastmod>2017-04-06T03:40:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/06/lmaoxus-ransomware-another-case-weaponized-open-source-ransomware/</loc>
		<lastmod>2017-04-06T13:38:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/06/linux-based-tizen-os-easily-hackable-samsungs-open-source-android-replacement/</loc>
		<lastmod>2017-04-06T16:45:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/06/new-malware-intentionally-bricks-iot-devices/</loc>
		<lastmod>2017-04-06T17:26:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/07/ransomware-gang-made-100000-exploiting-apache-struts-zero-day/</loc>
		<lastmod>2017-04-07T03:04:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/07/australian-dark-web-hacking-campaign-unmasked-hundreds-globally/</loc>
		<lastmod>2017-04-07T03:32:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/07/sathurbot-distributed-wordpress-password-attack/</loc>
		<lastmod>2017-04-07T15:13:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/07/icloud-mail-phishing-scam-wants-steal-apple-accounts-banking-data-identity/</loc>
		<lastmod>2017-04-07T16:00:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/08/matrix-ransomware-spreads-pcs-using-malicious-shortcuts/</loc>
		<lastmod>2017-04-08T03:30:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/08/want-play-game-ransomware-asks-high-score-instead-money/</loc>
		<lastmod>2017-04-08T03:43:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/08/forget-mirai-brickerbot-malware-will-kill-crap-iot-devices/</loc>
		<lastmod>2017-04-08T11:47:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/08/malvertising-ios-pushes-eyebrow-raising-vpn-app/</loc>
		<lastmod>2017-04-08T12:24:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/08/heck-electronic-devices-trumps-situation-room/</loc>
		<lastmod>2017-04-08T16:33:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/10/shadow-brokers-publish-password-rest-stolen-nsa-hacking-tools/</loc>
		<lastmod>2017-04-10T02:45:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/10/hacker-sets-off-tornado-sirens-city-dallas-middle-night/</loc>
		<lastmod>2017-04-10T03:12:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/10/critical-office-zero-day-attacks-detected-wild/</loc>
		<lastmod>2017-04-10T16:32:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/10/epic-fail-tp-link-3g-router-spews-admin-password-via-sms/</loc>
		<lastmod>2017-04-10T16:47:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/10/alleged-russian-hacker-arrested-spain-reportedly-us-presidential-election-hack/</loc>
		<lastmod>2017-04-10T17:06:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/11/longhorn-cyber-espionage-group-actually-cia/</loc>
		<lastmod>2017-04-11T03:04:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/11/attackers-can-decipher-pins-passwords-way-users-tilt-phone/</loc>
		<lastmod>2017-04-11T15:49:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/11/riverbed-patches-vulnerabilities-application-monitoring-portal/</loc>
		<lastmod>2017-04-11T16:31:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/11/adobe-publishes-security-updates-flash-reader-photoshop-creative-cloud/</loc>
		<lastmod>2017-04-11T17:31:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/12/microsoft-patches-three-vulnerabilities-attack/</loc>
		<lastmod>2017-04-12T02:59:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/12/mole-ransomware-distributed-fake-online-word-docs/</loc>
		<lastmod>2017-04-12T14:10:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/12/home-routers-used-hack-wordpress-sites/</loc>
		<lastmod>2017-04-12T14:40:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/12/sap-updates-two-year-old-patch-trex-vulnerability/</loc>
		<lastmod>2017-04-12T16:26:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/13/five-inmates-built-two-pcs-hacked-prison-within/</loc>
		<lastmod>2017-04-13T03:22:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/13/microsoft-word-0-day-actively-exploited-strange-bedfellows/</loc>
		<lastmod>2017-04-13T03:33:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/13/smart-oven-smart-can-hijacked-via-sms/</loc>
		<lastmod>2017-04-13T15:39:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/13/%e2%80%8bmelbourne-confirms-ddos-attack-behind-dns-outage/</loc>
		<lastmod>2017-04-13T17:04:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/13/probably-bad-idea-run-tor-exit-node-home-russia/</loc>
		<lastmod>2017-04-13T17:16:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/14/copy-pasting-sundown-exploit-kit-offline-month/</loc>
		<lastmod>2017-04-14T02:59:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/14/high-risk-zero-day-leaves-200000-magento-merchants-vulnerable/</loc>
		<lastmod>2017-04-14T03:36:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/14/shadow-brokers-release-new-batch-files-containing-windows-swift-exploits/</loc>
		<lastmod>2017-04-14T14:56:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/14/linux-remote-root-bug-menace-make-sure-servers-pcs-gizmos-android-kit-patched/</loc>
		<lastmod>2017-04-14T15:40:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/14/latentbot-trace-can/</loc>
		<lastmod>2017-04-14T16:54:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/15/remote-attack-bosch-drivelog-connector-dongle/</loc>
		<lastmod>2017-04-15T03:00:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/15/cldap-protocol-allows-ddos-attacks-70x-amplification-factor/</loc>
		<lastmod>2017-04-15T03:31:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/15/watch-riddle-vulnerability-affects-oracle-mysql-versions-update-now/</loc>
		<lastmod>2017-04-15T13:27:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/15/exploit-kit-activity-quiets-far-silent/</loc>
		<lastmod>2017-04-15T16:29:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/17/callisto-apt-group-exploited-hacking-team-surveillance-tools-hack-government-targets/</loc>
		<lastmod>2017-04-17T03:30:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/17/somebody-just-hacked-ex-premier-league-star-anthony-stokes-lover-eilidh-scotts-icloud-account-leaked-240-explicit-images/</loc>
		<lastmod>2017-04-17T05:00:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/17/chrome-firefox-opera-vulnerable-undetectable-phishing-attack/</loc>
		<lastmod>2017-04-17T12:41:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/17/sql-injection-via-xss-pgadmin-4/</loc>
		<lastmod>2017-04-17T16:12:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/17/robert-taylor-innovator-shaped-modern-computing-dies-85/</loc>
		<lastmod>2017-04-17T16:31:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/18/malware-reaches-play-store-google-wages-war-bankbot-trojan/</loc>
		<lastmod>2017-04-18T03:38:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/18/wave-java-based-rats-target-tax-filers/</loc>
		<lastmod>2017-04-18T03:59:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/18/email-tracking-pixels-used-pre-hack-info-gathering/</loc>
		<lastmod>2017-04-18T13:48:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/18/shoneys-hit-apparent-credit-card-breach/</loc>
		<lastmod>2017-04-18T15:36:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/18/low-cost-ransomware-service-discovered/</loc>
		<lastmod>2017-04-18T15:58:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/19/new-open-source-rat-uses-telegram-protocol-steal-data-victims/</loc>
		<lastmod>2017-04-19T02:59:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/19/meet-pinlogger-drive-exploit-steals-smartphone-pins/</loc>
		<lastmod>2017-04-19T03:12:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/19/vigilante-botnet-infects-iot-devices-blackhats-can-hijack/</loc>
		<lastmod>2017-04-19T15:28:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/19/intercontinental-hotels-group-reveals-minimized-recent-malware-attack/</loc>
		<lastmod>2017-04-19T16:28:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/20/homograph-phishing-attacks-almost-impossible-detect-major-browsers/</loc>
		<lastmod>2017-04-20T02:50:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/20/ambient-light-sensors-can-used-steal-browser-data/</loc>
		<lastmod>2017-04-20T15:37:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/20/windows-bug-used-spread-stuxnet-remains-worlds-exploited/</loc>
		<lastmod>2017-04-20T17:03:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/20/analyzing-doublepulsar-kernel-dll-injection-technique/</loc>
		<lastmod>2017-04-20T17:20:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/21/malware-author-uses-tweets-control-lame-ddos-botnet/</loc>
		<lastmod>2017-04-21T03:19:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/21/vulnerabilities-linksys-routers-allow-attackers-hijack-dozens-models/</loc>
		<lastmod>2017-04-21T03:47:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/21/brickerbot-author-claims-bricked-two-million-devices/</loc>
		<lastmod>2017-04-21T10:18:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/21/aes-ni-ransomware-dev-claims-hes-using-shadow-brokers-exploits/</loc>
		<lastmod>2017-04-21T15:39:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/21/milkydoor-android-malware-uses-ssh-tunnels-access-secure-corporate-networks/</loc>
		<lastmod>2017-04-21T15:58:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/22/10000-windows-computers-may-infected-advanced-nsa-backdoor/</loc>
		<lastmod>2017-04-22T03:31:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/22/locky-ransomware-back-still-adding-osiris-encrypted-files/</loc>
		<lastmod>2017-04-22T03:45:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/22/skype-fixes-spyke-credential-phishing-remote-execution-bug/</loc>
		<lastmod>2017-04-22T12:09:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/22/us-court-sentenced-russian-hacker-roman-seleznev-27-years-jail-hacking/</loc>
		<lastmod>2017-04-22T16:26:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/22/doublepulsar-initial-smb-backdoor-ring-0-shellcode-analysis/</loc>
		<lastmod>2017-04-22T16:55:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/24/wall-street-engineer-hacks-employer-see-will-let-go/</loc>
		<lastmod>2017-04-24T02:51:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/24/fake-app-hiding-smsvova-spyware-went-undetected-years-google-play-stores/</loc>
		<lastmod>2017-04-24T03:06:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/24/ops-hackers-can-exfiltrate-data-air-gapped-networks-malware-controlled-via-scanner/</loc>
		<lastmod>2017-04-24T15:10:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/24/2016s-popular-exploit-vulnerability-used-stuxnet-attacks/</loc>
		<lastmod>2017-04-24T15:36:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/25/interpol-identifies-8800-cc-servers-used-malware-ransomware-others/</loc>
		<lastmod>2017-04-25T03:10:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/25/ransomware-hidden-inside-word-document-thats-hidden-inside-pdf/</loc>
		<lastmod>2017-04-25T03:33:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/25/point-sale-malware-steals-drivers-license-information/</loc>
		<lastmod>2017-04-25T17:01:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/25/microsoft-edge-vulnerability-allows-cookie-password-theft/</loc>
		<lastmod>2017-04-25T17:26:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/25/webroot-antivirus-mistakenly-flags-windows-malware/</loc>
		<lastmod>2017-04-25T17:45:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/26/nsa-backdoor-detected-55000-windows-boxes-can-now-remotely-removed/</loc>
		<lastmod>2017-04-26T02:40:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/26/hipchat-hacked-resets-passwords-affected-users/</loc>
		<lastmod>2017-04-26T02:56:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/26/samsung-smart-tv-can-hacked-via-wi-fi-direct-feature/</loc>
		<lastmod>2017-04-26T14:40:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/26/admin-password-leaving-iot-device-vulnerable-cyberattacks/</loc>
		<lastmod>2017-04-26T15:07:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/26/nsas-doublepulsar-kernel-exploit-use-internet-wide/</loc>
		<lastmod>2017-04-26T15:27:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/27/security-vulnerabilities-hyundai-blue-link-mobile-app-allowed-hackers-steal-vehicles/</loc>
		<lastmod>2017-04-27T02:39:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/27/linux-shishiga-malware-using-lua-scripts/</loc>
		<lastmod>2017-04-27T03:00:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/27/85000-hacked-rdp-servers-still-available-sale-xdedic-marketplace/</loc>
		<lastmod>2017-04-27T13:32:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/27/backdoor-code-discovered-popular-bitcoin-mining-equipment/</loc>
		<lastmod>2017-04-27T13:59:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/27/cracking-apt28-traffic-seconds/</loc>
		<lastmod>2017-04-27T14:39:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/28/lawsuit-fox-news-group-hacked-surveilled-stalked-ex-host-andrea-tantaros/</loc>
		<lastmod>2017-04-28T03:20:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/28/fcc-chief-wants-roll-back-net-neutrality-rule/</loc>
		<lastmod>2017-04-28T03:38:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/28/osx-malware-catching-wants-read-https-traffic/</loc>
		<lastmod>2017-04-28T13:52:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/28/several-cable-modem-models-affected-snmp-god-mode-flaw/</loc>
		<lastmod>2017-04-28T14:10:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/28/kali-linux-2017-1-arrived-power-password-cracking-cloud-gpus/</loc>
		<lastmod>2017-04-28T16:20:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/29/nomx-secure-email-service-can-easily-hacked-say-researchers/</loc>
		<lastmod>2017-04-29T03:33:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/29/open-ports-create-backdoors-millions-smartphones/</loc>
		<lastmod>2017-04-29T03:51:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/29/hacker-leaks-orange-new-black-season-5-episodes-netflix-extortion-attempt-fails/</loc>
		<lastmod>2017-04-29T15:09:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/29/expert-discovered-online-data-belonging-trading-firm-amp/</loc>
		<lastmod>2017-04-29T15:54:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/04/29/wikileaks-reveals-cia-tool-scribbles-document-tracking/</loc>
		<lastmod>2017-04-29T17:18:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/01/exploiting-net-managed-dcom/</loc>
		<lastmod>2017-05-01T02:30:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/01/russian-controlled-telecom-hijacks-financial-services-internet-traffic/</loc>
		<lastmod>2017-05-01T04:38:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/01/whid-injector-bring-hid-attacks-next-level/</loc>
		<lastmod>2017-05-01T13:33:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/01/dll-injection-using-loadlibrary-c/</loc>
		<lastmod>2017-05-01T13:56:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/01/malware-author-inflates-backdoor-trojan-junk-data-hoping-avoid-detection/</loc>
		<lastmod>2017-05-01T16:15:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/02/intel-fixes-9-year-old-cpu-flaw-allows-remote-code-execution/</loc>
		<lastmod>2017-05-02T13:54:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/02/ibm-warns-customers-usb-flash-drives-may-contain-malware/</loc>
		<lastmod>2017-05-02T14:11:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/02/nsa-announces-will-stop-surveillance-activities-emails-texts-internet-communications/</loc>
		<lastmod>2017-05-02T14:24:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/02/hyundai-patches-mobile-app-flaws-allow-hackers-steal-cars/</loc>
		<lastmod>2017-05-02T15:31:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/02/new-shodan-tool-can-find-malware-command-control-cc-servers/</loc>
		<lastmod>2017-05-02T17:51:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/03/behold-spear-phish-just-might-good-enough-hook/</loc>
		<lastmod>2017-05-03T03:09:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/03/information-security-practices-aadhaar-135-million-indian-government-payment-card-details-leaked/</loc>
		<lastmod>2017-05-03T15:21:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/03/chinese-ta459-apt-exploits-cve-2017-0199-flaw-target-financial-firms/</loc>
		<lastmod>2017-05-03T16:42:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/03/facebook-enters-war-information-operations-acknowledges-election-hijinx/</loc>
		<lastmod>2017-05-03T17:24:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/04/thieves-drain-2fa-protected-bank-accounts-abusing-ss7-routing-protocol/</loc>
		<lastmod>2017-05-04T02:25:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/04/hundreds-privacy-invading-apps-using-ultrasonic-sounds-track/</loc>
		<lastmod>2017-05-04T02:49:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/04/watch-researchers-hack-industrial-robot-sabotage-production/</loc>
		<lastmod>2017-05-04T03:05:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/04/twitter-dude-trying-take-credit-google-docs-phishing-attack/</loc>
		<lastmod>2017-05-04T15:41:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/04/powershell-injection-diskless-payload-persistence-bypass-techniques/</loc>
		<lastmod>2017-05-04T17:02:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/05/wordpress-zero-day-expose-password-reset-emails/</loc>
		<lastmod>2017-05-05T02:40:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/05/leaked-uks-secret-blueprint-telcos-mass-spying-internet-phones-backdoors/</loc>
		<lastmod>2017-05-05T03:03:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/05/dark-web-marketplace-shut-slovakia/</loc>
		<lastmod>2017-05-05T15:21:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/05/windows-defender-atp-thwarts-operation-wilysupply-software-supply-chain-cyberattack/</loc>
		<lastmod>2017-05-05T15:31:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/06/remote-hijack-computers-using-intels-insecure-chips-just-use-empty-login-string/</loc>
		<lastmod>2017-05-06T02:51:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/06/hackers-hide-ip-address/</loc>
		<lastmod>2017-05-06T03:01:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/06/cisco-fixes-critical-flaw-cisco-cvr100w-wireless-n-vpn-small-business-routers/</loc>
		<lastmod>2017-05-06T17:10:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/06/emmanuel-macrons-party-says-hit-massive-hack/</loc>
		<lastmod>2017-05-06T17:27:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/06/hacking-everything-chris-evans-scarybeasts/</loc>
		<lastmod>2017-05-06T17:36:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/08/website-handbrake-app-hacked-spread-proton-rat-mac-users/</loc>
		<lastmod>2017-05-08T02:31:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/08/frozrlock-ransomware-advertised-dark-web-great-security-tool/</loc>
		<lastmod>2017-05-08T02:46:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/08/google-project-zero-team-worst-windows-rce-vulnerability-recent-memory/</loc>
		<lastmod>2017-05-08T13:02:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/08/snake-malware-ported-windows-mac/</loc>
		<lastmod>2017-05-08T16:38:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/09/malwaresearch-command-line-tool-find-malware-openmalware-org/</loc>
		<lastmod>2017-05-09T02:22:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/09/nemes1s-raas-padcrypt-ransomwares-affiliate-system/</loc>
		<lastmod>2017-05-09T15:03:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/09/hikvision-patches-backdoor-ip-cameras/</loc>
		<lastmod>2017-05-09T15:22:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/09/san-bernardino-iphone-hack-u-s-senator-reveals-much-fbi-spent/</loc>
		<lastmod>2017-05-09T16:02:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/10/cisco-patches-switch-hijacking-hole-one-exploited-cia/</loc>
		<lastmod>2017-05-10T03:23:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/10/news-brief-bitkangoroo-ransomware-deletes-files-not-pay/</loc>
		<lastmod>2017-05-10T04:01:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/10/rsautil-ransomware-helppmeindia-com-installed-via-hacked-remote-desktop-services/</loc>
		<lastmod>2017-05-10T16:34:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/10/icloud-keychain-vulnerability-allowed-hackers-steal-sensitive-data/</loc>
		<lastmod>2017-05-10T17:10:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/11/session-hijacking-cookie-stealing-wordpress-malware-spotted/</loc>
		<lastmod>2017-05-11T02:50:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/11/sednit-adds-two-zero-day-exploits-using-trumps-attack-syria-decoy/</loc>
		<lastmod>2017-05-11T03:26:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/11/keylogger-found-audio-driver-hp-laptops/</loc>
		<lastmod>2017-05-11T14:47:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/11/linux-open-source-technologies-protect-online-privacy-snowden/</loc>
		<lastmod>2017-05-11T15:05:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/11/edge-security-flaw-allows-theft-facebook-twitter-credentials/</loc>
		<lastmod>2017-05-11T16:24:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/12/exploiting-linux-kernel-via-packet-sockets/</loc>
		<lastmod>2017-05-12T02:53:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/12/oneplus-otas-analysis-exploitation/</loc>
		<lastmod>2017-05-12T03:16:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/12/telefonica-tells-employees-shut-computers-amid-massive-ransomware-outbreak/</loc>
		<lastmod>2017-05-12T14:43:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/12/major-french-news-sites-victim-ddos-attack/</loc>
		<lastmod>2017-05-12T15:22:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/12/vanilla-forums-plain-flavoured-zero-day/</loc>
		<lastmod>2017-05-12T16:53:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/13/new-iot-attack-linked-iran-persirai-malware-strikes-ip-cameras-latest-iot-attack/</loc>
		<lastmod>2017-05-13T03:28:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/13/nsa-derived-ransomware-worm-shutting-computers-worldwide/</loc>
		<lastmod>2017-05-13T03:42:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/13/wcry-mean-microsoft-issues-patch-3-unsupported-windows-versions/</loc>
		<lastmod>2017-05-13T13:16:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/13/new-jaff-ransomware-part-active-necurs-spam-blitz/</loc>
		<lastmod>2017-05-13T16:54:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/15/honeypot-server-gets-infected-wannacry-ransomware-6-times-90-minutes/</loc>
		<lastmod>2017-05-15T03:30:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/15/vault7-wikileaks-published-documentation-aftermidnight-assassin-malware/</loc>
		<lastmod>2017-05-15T16:06:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/15/just-patch-isnt-easy-think/</loc>
		<lastmod>2017-05-15T17:43:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/15/protect-wannacry-ransomware/</loc>
		<lastmod>2017-05-15T17:50:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/16/virulent-wcry-ransomware-worm-may-north-koreas-fingerprints/</loc>
		<lastmod>2017-05-16T02:31:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/16/fake-whatsapp-com-url-gets-users-install-adware/</loc>
		<lastmod>2017-05-16T03:12:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/16/new-shadow-brokers-message-teases-data-nuke-programs-windows-10-exploits/</loc>
		<lastmod>2017-05-16T14:17:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/16/hack-virtual-memory-malloc-heap-program-break/</loc>
		<lastmod>2017-05-16T14:44:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/17/can-steal-windows-login-credentials-via-google-chrome-scf-files/</loc>
		<lastmod>2017-05-17T02:06:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/17/people-photoshopping-wannacry-ransom-notes-everything-screen/</loc>
		<lastmod>2017-05-17T02:37:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/17/malware-uses-fake-wordpress-api-domain-steal-sensitive-cookies/</loc>
		<lastmod>2017-05-17T14:56:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/17/bell-canada-hacked-1-9-million-customer-account-details-stolen-hackers/</loc>
		<lastmod>2017-05-17T15:07:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/17/security-guard-hacks-trashes-company-servers-quitting-job/</loc>
		<lastmod>2017-05-17T17:25:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/18/new-joomla-sql-injection-flaw-ridiculously-simple-exploit/</loc>
		<lastmod>2017-05-18T02:26:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/18/fearing-shadow-brokers-leak-nsa-reported-critical-flaw-microsoft/</loc>
		<lastmod>2017-05-18T03:37:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/18/hack-put-data-17-million-zomato-users-risk-india-worried/</loc>
		<lastmod>2017-05-18T13:11:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/18/critical-improper-authentication-vulnerability-uber-allowed-password-reset-account/</loc>
		<lastmod>2017-05-18T13:26:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/18/using-binsnitch-py-detect-files-touched-malware/</loc>
		<lastmod>2017-05-18T16:46:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/19/windows-xp-pcs-infected-wcry-can-decrypted-without-paying-ransom/</loc>
		<lastmod>2017-05-19T03:00:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/19/hacker-demands-ransom-stealing-source-code-famous-app-maker/</loc>
		<lastmod>2017-05-19T16:12:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/19/bypassing-application-whitelisting-bginfo/</loc>
		<lastmod>2017-05-19T16:39:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/19/multiple-groups-exploiting-eternalblue-weeks-wannacry/</loc>
		<lastmod>2017-05-19T17:22:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/20/windows-xp-hit-wannacry-ransomware-tool-decrypt-infected-files/</loc>
		<lastmod>2017-05-20T03:10:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/20/people-infected-recent-wcry-worm-can-unlock-pcs-without-paying-ransom/</loc>
		<lastmod>2017-05-20T03:23:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/20/wannacry-ransomworm-spread/</loc>
		<lastmod>2017-05-20T10:42:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/20/dafont-site-hacked-almost-700k-accounts-exposed/</loc>
		<lastmod>2017-05-20T16:18:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/20/ultimate-linux-trojan-horse-windows-subsystem-linux/</loc>
		<lastmod>2017-05-20T17:04:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/22/ssd-drives-vulnerable-attacks-corrupt-user-data/</loc>
		<lastmod>2017-05-22T03:01:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/22/dark-web-market-shuts-claiming-hack-users-fear-exit-scam/</loc>
		<lastmod>2017-05-22T03:58:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/22/yahoo-retires-imagemagick-library-18-byte-exploit-leaks-user-email-content/</loc>
		<lastmod>2017-05-22T15:00:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/22/new-firmware-netgear-routers-includes-data-collection-feature/</loc>
		<lastmod>2017-05-22T17:17:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/23/europol-arrested-27-jackpotting-attacks-atm-across-europe/</loc>
		<lastmod>2017-05-23T03:12:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/23/north-korea-denies-involvement-wannacry-ransomware-outbreak/</loc>
		<lastmod>2017-05-23T03:37:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/23/russian-police-apprehend-cron-gang-behind-tiny-z-ponyforx-malware/</loc>
		<lastmod>2017-05-23T13:08:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/23/windows-10-uac-bypass-uses-apps-features-utility/</loc>
		<lastmod>2017-05-23T16:21:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/23/hacked-translation-subtitles-complete-takeover/</loc>
		<lastmod>2017-05-23T17:55:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/24/samsung-galaxy-s8-iris-scanner-fooled-photo/</loc>
		<lastmod>2017-05-24T02:54:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/24/post-exploitation-mounting-vmdk-files-meterpreter/</loc>
		<lastmod>2017-05-24T03:17:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/24/can-bypass-windows-applocker-protection-via-rogue-control-panel-items/</loc>
		<lastmod>2017-05-24T16:18:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/24/64-bit-malware-threat-may-itty-bitty-now-set-grow/</loc>
		<lastmod>2017-05-24T16:43:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/24/canadian-teen-allegedly-behind-notorious-dark-web-hacking-forum/</loc>
		<lastmod>2017-05-24T17:11:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/25/android-users-tricked-installing-malware-via-app-money-scheme/</loc>
		<lastmod>2017-05-25T03:22:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/25/wormable-code-execution-bug-lurked-samba-7-years-patch-now/</loc>
		<lastmod>2017-05-25T03:43:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/25/apple-icloud-android-nvidia-driver-n-day-exploit-details-revealed/</loc>
		<lastmod>2017-05-25T13:09:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/25/security-firm-releases-windows-xp-patch-nsa-exploit-esteemaudit/</loc>
		<lastmod>2017-05-25T15:45:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/25/aes-ni-ransomware-dev-releases-decryption-keys-amid-fears-framed-xdata-outbreak/</loc>
		<lastmod>2017-05-25T16:56:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/26/florida-gop-consultant-admits-worked-guccifer-2-0-analyzing-hacked-data/</loc>
		<lastmod>2017-05-26T04:14:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/26/millions-android-devices-potentially-exposed-cloak-dagger-attack/</loc>
		<lastmod>2017-05-26T13:54:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/26/filezilla-ftp-client-adds-support-master-password-encrypts-logins/</loc>
		<lastmod>2017-05-26T14:14:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/26/building-searchable-encrypted-databases-php-sql/</loc>
		<lastmod>2017-05-26T14:40:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/26/filesystem-bug-hangs-crashes-windows-7-windows-8-1/</loc>
		<lastmod>2017-05-26T15:06:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/27/google-boots-41-apps-infected-judy-malware-off-play-store/</loc>
		<lastmod>2017-05-27T02:39:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/27/radio-controlled-pacemakers-arent-hard-hack-may-think/</loc>
		<lastmod>2017-05-27T02:54:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/27/chipotle-mexican-grill-fast-food-chain-notified-customers-pos-malware-breach/</loc>
		<lastmod>2017-05-27T14:46:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/27/much-share-price-falls-get-hacked/</loc>
		<lastmod>2017-05-27T16:53:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/29/british-airways-computer-system-goes-stranding-thousands-no-evidence-cyber-attack/</loc>
		<lastmod>2017-05-29T03:27:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/29/microsoft-sues-chinese-company-hacking-xbox-accounts/</loc>
		<lastmod>2017-05-29T03:42:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/29/us-wants-extend-laptop-ban-international-flights/</loc>
		<lastmod>2017-05-29T14:35:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/29/anonymous-member-playing-houdini-rat-moware-ransomware/</loc>
		<lastmod>2017-05-29T14:59:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/29/awfully-polite-hackers-allegedly-hijacked-mall-billboard/</loc>
		<lastmod>2017-05-29T16:53:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/30/split-tunnel-smtp-exploit-allows-attacker-inject-payloads-email-servers/</loc>
		<lastmod>2017-05-30T02:39:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/30/stolen-version-dma-locker-making-rounds/</loc>
		<lastmod>2017-05-30T02:56:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/30/shadow-brokers-announce-details-upcoming-monthly-dump-service/</loc>
		<lastmod>2017-05-30T15:02:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/30/freeradius-allows-hackers-log-without-credentials/</loc>
		<lastmod>2017-05-30T16:05:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/31/xdata-ransomware-master-decryption-keys-released-kaspersky-releases-decryptor/</loc>
		<lastmod>2017-05-31T03:02:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/31/spy-satellite-spacex-launched-might-buzz-space-station/</loc>
		<lastmod>2017-05-31T03:30:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/31/motorcycle-gang-busted-hacking-stealing-150-jeep-wranglers/</loc>
		<lastmod>2017-05-31T13:04:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/31/new-report-links-north-korea-lazarus-apt-group/</loc>
		<lastmod>2017-05-31T13:24:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/05/31/sanctuary-dark-web-market-hacked-cipher0007/</loc>
		<lastmod>2017-05-31T16:40:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/01/bootstrap-self-service-continuous-fuzzing/</loc>
		<lastmod>2017-06-01T03:24:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/01/dissection-esteemaudit-windows-remote-desktop-exploit/</loc>
		<lastmod>2017-06-01T03:51:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/01/linux-distros-patch-dangerous-vulnerability-sudo-command/</loc>
		<lastmod>2017-06-01T16:06:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/01/dark-web-users-child-porn-website-tracked-visiting-file-sharing-site/</loc>
		<lastmod>2017-06-01T16:26:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/01/man-linked-auto-parts-store-behind-bachosens-malware/</loc>
		<lastmod>2017-06-01T16:34:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/02/onelogin-suffers-breach-customer-data-said-exposed-decrypted/</loc>
		<lastmod>2017-06-02T00:23:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/02/stanford-university-site-hosted-malware-months/</loc>
		<lastmod>2017-06-02T01:38:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/05/super-expensive-ransomware-linked-online-cybercrime-market-say-security-researchers-2/</loc>
		<lastmod>2017-06-05T14:32:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/06/judy-malware-alert-36-5-mn-android-users-may-infected-virus/</loc>
		<lastmod>2017-06-06T12:22:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/06/google-will-pay-upto-200000-finding-bug-android-os/</loc>
		<lastmod>2017-06-06T12:35:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/08/creator-bitcoin-mining-schemes-faces-12-million/</loc>
		<lastmod>2017-06-08T01:38:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/08/fbi-arrests-nsa-contractor-leaked-top-secret-russian-hacking-document-intercep/</loc>
		<lastmod>2017-06-08T01:38:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/08/8000-vulnerabilities-found-pacemakers/</loc>
		<lastmod>2017-06-08T01:43:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/09/raspberry-pi-crypto-mining-malware-arrived/</loc>
		<lastmod>2017-06-09T17:11:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/09/android-smartphones-targeted-wannacry-lookalike/</loc>
		<lastmod>2017-06-09T17:11:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/10/zusy-malware-malicious-attack-installs-via-mouseover/</loc>
		<lastmod>2017-06-10T22:57:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/13/macspy-macransom-malware-service-mac-os/</loc>
		<lastmod>2017-06-13T05:17:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/13/industroyer-malware-touted-biggest-cyber-threat-critical-infrastructure-since-stuxnet/</loc>
		<lastmod>2017-06-13T05:27:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/15/single-email-stole-1-9-million-southern-oregon-university/</loc>
		<lastmod>2017-06-15T15:07:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/15/xavier-trojan-lurks-within-800-android-apps-google-play-store/</loc>
		<lastmod>2017-06-15T15:15:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/17/advanced-cia-firmware-infecting-wi-fi-routers-years/</loc>
		<lastmod>2017-06-17T13:26:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/17/new-code-injecting-sorebrect-fileless-ransomware-detected-wild/</loc>
		<lastmod>2017-06-17T13:51:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/17/nigerian-spammers-90s-moved-keyloggers-rats/</loc>
		<lastmod>2017-06-17T14:04:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/17/can-hack-mazda-cars-usb-flash-drive/</loc>
		<lastmod>2017-06-17T14:55:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/17/developer-creates-rootkit-hides-php-server-modules/</loc>
		<lastmod>2017-06-17T15:23:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/19/hacker-royal-gingerness-jailed-cyber-attack-uk-hospital-airport/</loc>
		<lastmod>2017-06-19T02:36:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/19/pinkslipbot-banking-trojan-exploiting-infected-machines-control-servers/</loc>
		<lastmod>2017-06-19T15:08:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/19/abusing-aws-metadata-service-using-ssrf-vulnerabilities/</loc>
		<lastmod>2017-06-19T15:25:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/19/can-blame-guy-recent-surge-android-malware-play-store/</loc>
		<lastmod>2017-06-19T16:23:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/20/stack-clash-vulnerability-grants-root-access-linux-unix-oses/</loc>
		<lastmod>2017-06-20T03:10:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/20/mexican-government-accused-illegal-phone-hacking-citizens/</loc>
		<lastmod>2017-06-20T03:26:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/20/south-korean-web-hosting-provider-pays-1-million-ransomware-demand/</loc>
		<lastmod>2017-06-20T13:23:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/20/one-kind-android-smartphone-ransomware-behind-massive-rise-malicious-software/</loc>
		<lastmod>2017-06-20T15:50:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/21/android-apps-dangerous-ztorg-family-sneak-google-play/</loc>
		<lastmod>2017-06-21T05:41:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/21/say-goodbye-smbv1-windows-fall-creators-update/</loc>
		<lastmod>2017-06-21T05:57:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/21/nsa-malware-used-infect-windows-pcs-cryptocurrency-miner/</loc>
		<lastmod>2017-06-21T12:33:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/21/one-month-later-wannacry-ransomware-still-shutting-factories/</loc>
		<lastmod>2017-06-21T16:44:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/21/diabolical-way-hacking-chip-wave-hand/</loc>
		<lastmod>2017-06-21T17:20:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/22/teslaware-plays-russian-roulette-files/</loc>
		<lastmod>2017-06-22T04:25:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/22/netflix-hacker-stole-orange-new-black-season-vulnerable-windows-pc/</loc>
		<lastmod>2017-06-22T05:15:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/22/attackers-can-exploit-electronic-cigarettes-hack-computers/</loc>
		<lastmod>2017-06-22T12:29:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/22/vault-7-cia-malware-hacking-air-gapped-networks-via-usb-thumb-drives/</loc>
		<lastmod>2017-06-22T12:58:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/22/symantec-patches-messaging-gateway-remote-code-execution-bugs/</loc>
		<lastmod>2017-06-22T13:51:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/23/drupal-fixes-cve-2017-6922-flaw-exploited-spam-campaigns-wild/</loc>
		<lastmod>2017-06-23T05:20:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/23/new-ghosthook-attack-bypasses-windows-patchguard-protections/</loc>
		<lastmod>2017-06-23T10:58:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/23/rig-exploit-kit-usage-declines-browsers-getting-harder-hack/</loc>
		<lastmod>2017-06-23T11:07:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/23/two-men-arrested-hacking-microsoft/</loc>
		<lastmod>2017-06-23T17:00:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/24/aes-256-crypto-cracked-50-secs-using-e200-kit-one-metre-away/</loc>
		<lastmod>2017-06-24T04:41:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/24/hijack-hundreds-http-connections-dns-typosquatting/</loc>
		<lastmod>2017-06-24T10:04:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/24/fbi-victims-arent-reporting-ransomware-attacks/</loc>
		<lastmod>2017-06-24T10:03:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/24/hackers-threaten-take-steam-summer-sale-begins/</loc>
		<lastmod>2017-06-24T09:59:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/24/heaps-windows-10-internal-builds-private-source-code-leak-online/</loc>
		<lastmod>2017-06-24T13:48:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/26/prmitm-attackers-can-hide-password-resets-inside-account-registrations/</loc>
		<lastmod>2017-06-26T04:15:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/26/fired-employee-hacks-shuts-smart-water-readers-five-us-cities/</loc>
		<lastmod>2017-06-26T04:28:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/26/uk-govt-wants-encryption-backdoors-cant-even-protect-email-servers-brute-force-attack/</loc>
		<lastmod>2017-06-26T16:20:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/26/handheld-wifi-packet-monitor/</loc>
		<lastmod>2017-06-26T17:17:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/27/windows-defender-bug-gaping-poc-exploit-encrypted/</loc>
		<lastmod>2017-06-27T03:29:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/27/russian-gov-threatening-ban-telegram-refused-comply-data-protection-laws/</loc>
		<lastmod>2017-06-27T07:40:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/28/zero-day-skype-flaw-causes-crashes-remote-code-execution/</loc>
		<lastmod>2017-06-28T02:26:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/28/wannacry-deja-vu-petya-ransomware-outbreak-wreaking-havoc-across-globe/</loc>
		<lastmod>2017-06-28T03:26:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/28/europe-fined-google-2-7-billion-manipulating-search-results/</loc>
		<lastmod>2017-06-28T03:41:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/28/12-best-wifi-hacking-apps-android-smartphones-2017-edition/</loc>
		<lastmod>2019-08-06T01:41:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/28/vault-7-cia-malware-tracking-windows-devices-via-wifi-networks/</loc>
		<lastmod>2017-06-28T17:32:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/29/shadow-brokers-threaten-expose-identity-former-nsa-hacker/</loc>
		<lastmod>2017-06-29T02:19:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/29/surprise-notpetya-cyber-weapon-not-ransomware/</loc>
		<lastmod>2017-06-29T02:33:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/29/critical-flaw-allows-hacking-linux-machines-just-malicious-dns-response/</loc>
		<lastmod>2017-06-29T09:37:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/29/microsoft-announces-controlled-folder-access-fend-off-crypto-ransomware/</loc>
		<lastmod>2017-06-29T17:38:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/30/fedexs-tnt-express-deliveries-disrupted-virus-attack/</loc>
		<lastmod>2017-06-30T03:27:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/30/management-bug-can-crash-cisco-ios-ios-xe/</loc>
		<lastmod>2017-06-30T03:48:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/30/8tracks-data-leak-exposed-18-million-user-accounts/</loc>
		<lastmod>2017-06-30T17:33:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/06/30/ransomware-attacks-continue-ukraine-mysterious-wannacry-clone/</loc>
		<lastmod>2017-06-30T17:54:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/01/hacker-incursio-gets-two-years-prison-hacking-cia-dhs-doj-fbi/</loc>
		<lastmod>2017-07-01T04:54:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/01/windows-pcs-attack-europe-systems-chernobyl-nuclear-plant-infected/</loc>
		<lastmod>2017-07-01T13:58:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/01/sql-injection-flaw-wordpress-plugin-wp-statistics-potentially-exposed-300000-sites/</loc>
		<lastmod>2017-07-01T14:26:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/01/siemens-patches-critical-intel-amt-flaw-industrial-products/</loc>
		<lastmod>2017-07-01T16:45:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/03/classic-ether-wallet-hacked-users-report-massive-losses/</loc>
		<lastmod>2017-07-03T03:03:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/03/man-pleads-guilty-stealing-bitcoin-dark-web-criminals/</loc>
		<lastmod>2017-07-03T16:02:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/06/openbsd-will-get-unique-kernels-reboot-hear-linux-windows/</loc>
		<lastmod>2017-07-06T14:16:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/06/fourth-largest-cryptocurrency-exchange-hacked-users-lose-ethereum-bitcoin/</loc>
		<lastmod>2017-07-06T14:30:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/06/alphabay-market-one-largest-dark-web-marketplaces-exit-scam/</loc>
		<lastmod>2017-07-06T14:55:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/06/perl-devs-fix-important-flaw-dbd-mysql-affects-encryption-client-server/</loc>
		<lastmod>2017-07-06T15:24:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/07/cia-malware-can-steal-ssh-credentials-session-traffic/</loc>
		<lastmod>2017-07-07T01:30:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/07/copycat-malware-infected-android-devices-around-world/</loc>
		<lastmod>2017-07-07T02:04:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/07/highly-advanced-spydealer-malware-can-root-one-four-android-devices/</loc>
		<lastmod>2017-07-07T16:24:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/07/zip-bombs-can-protect-websites-getting-hacked/</loc>
		<lastmod>2017-07-07T17:01:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/07/broadpwn-potentially-expose-hack-millions-android-devices-using-broadcom-wi-fi-chip/</loc>
		<lastmod>2017-07-07T16:59:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/08/exposed-server-leaked-details-3-million-wwe-fans/</loc>
		<lastmod>2017-07-08T05:01:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/08/slocker-mobile-ransomware-starts-mimicking-wannacry/</loc>
		<lastmod>2017-07-08T05:24:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/08/weak-bug-exploiting-heap-overflow-vmware/</loc>
		<lastmod>2017-07-08T12:48:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/08/decryption-key-original-petya-ransomware-released/</loc>
		<lastmod>2017-07-08T16:20:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/08/iphone-android-exposed-broadpwn-security-flaw-google-patch-available/</loc>
		<lastmod>2017-07-08T16:39:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/10/company-caught-selling-user-data-shuts-avoid-paying-104-million-fine/</loc>
		<lastmod>2017-07-10T03:28:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/10/emulation-exploration-bcm-wifi-frame-parsing-using-luaqemu/</loc>
		<lastmod>2017-07-10T03:48:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/10/dark-web-hosting-service-hacked-data-stolen/</loc>
		<lastmod>2017-07-10T15:17:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/10/upatre-trojan-downloader/</loc>
		<lastmod>2017-07-10T15:37:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/10/reliance-jio-systems-allegedly-hacked-biggest-breach-personal-data-ever-india/</loc>
		<lastmod>2017-07-10T15:49:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/11/us-food-payment-kiosk-vendor-avanti-markets-hacked-biometric-data-stolen/</loc>
		<lastmod>2017-07-11T03:34:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/11/calling-artificial-intelligence-counter-ransomware-attacks/</loc>
		<lastmod>2017-07-11T16:19:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/11/man-pleads-guilty-manipulating-lottery-winning-tickets-via-hacked-computer/</loc>
		<lastmod>2017-07-11T16:37:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/11/adwind-rat-back-crooks-targeting-aerospace-industries-many-countries/</loc>
		<lastmod>2017-07-11T17:05:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/12/ntlm-relay-attacks-still-causing-problems-2017/</loc>
		<lastmod>2017-07-12T03:16:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/12/telegram-controlled-hacking-tool-targets-sql-injection-scale/</loc>
		<lastmod>2017-07-12T03:24:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/12/uk-radio-station-hijacked-eight-times-past-month-play-obscene-song/</loc>
		<lastmod>2017-07-12T17:42:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/12/telegram-based-sql-injection-scanner-available-500-hacking-forum/</loc>
		<lastmod>2017-07-12T17:55:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/12/magala-trojan-uses-virtual-desktops-secretly-click-search-results-ads/</loc>
		<lastmod>2017-07-12T18:03:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/13/data-14-million-verizon-customers-exposed-server-snafu/</loc>
		<lastmod>2017-07-13T03:18:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/13/vulnerabilities-expose-oracle-oam-10g-remote-session-hijacking/</loc>
		<lastmod>2017-07-13T03:38:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/13/scammer-uses-fake-tor-browser-lure-victims-supposed-dark-web-marketplace/</loc>
		<lastmod>2017-07-13T15:38:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/13/samba-puts-new-security-update-address-exploit-fueled-wannacry/</loc>
		<lastmod>2017-07-13T16:26:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/13/wikileaks-cia-highrise-android-malware-used-intercept-redirect-smss/</loc>
		<lastmod>2017-07-13T16:37:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/14/app-finds-50000-computers-vulnerable-eternalblue-exploit/</loc>
		<lastmod>2017-07-14T03:03:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/14/new-pos-malware-lockpos-emerges-threat-landscape/</loc>
		<lastmod>2017-07-14T03:34:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/14/21-year-old-bug-kerberos-protocol-gets-patch-windows-linux/</loc>
		<lastmod>2017-07-14T15:28:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/14/alphabay-dark-web-market-taken-law-enforcement-raids/</loc>
		<lastmod>2017-07-14T16:00:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/14/ubuntu-linux-distro-now-available-windows-10/</loc>
		<lastmod>2017-07-14T16:43:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/15/keeping-petyas-demystifying-malware-family/</loc>
		<lastmod>2017-07-15T04:40:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/15/cisco-issues-security-patches-nine-serious-rces-snmp-subsystem-ios-ios-xe/</loc>
		<lastmod>2017-07-15T12:28:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/15/ovidiy-stealer-cheap-efficient-infostealer-offered-sale/</loc>
		<lastmod>2017-07-15T12:49:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/15/new-exte-cryptomix-ransomware-variant-released/</loc>
		<lastmod>2017-07-15T16:19:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/15/amazon-working-new-messaging-app-called-anytime/</loc>
		<lastmod>2017-07-15T16:38:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/17/experts-recover-aes256-encryption-key-pcs-electromagnetic-emissions/</loc>
		<lastmod>2017-07-17T02:57:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/17/751-domains-hijacked-redirect-traffic-exploit-kits/</loc>
		<lastmod>2017-07-17T15:44:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/17/ghostctrl-android-rat-also-doubles-ransomware/</loc>
		<lastmod>2017-07-17T15:55:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/17/ashley-madison-agrees-11-2-million-settlement-2015-massive-data-breach/</loc>
		<lastmod>2017-07-17T16:16:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/17/alpine-linux-vulnerability-discovery-code-execution-pt-1-2/</loc>
		<lastmod>2017-07-17T16:26:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/18/second-time-year-experts-found-flaw-cisco-webex-extension/</loc>
		<lastmod>2017-07-18T03:18:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/18/reyptson-ransomware-spams-friends-stealing-thunderbird-contacts/</loc>
		<lastmod>2017-07-18T03:35:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/18/home-security-system-fails-secure-opens-homes-hacking-burglaries/</loc>
		<lastmod>2017-07-18T17:33:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/18/coding-library-vulnerability-may-trickle-thousands-iot-devices/</loc>
		<lastmod>2017-07-18T17:41:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/18/implementing-malware-command-control-using-major-cdns-high-traffic-domains/</loc>
		<lastmod>2017-07-18T17:54:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/19/sambacry-vulnerability-used-deploy-backdoors-nas-devices/</loc>
		<lastmod>2017-07-19T03:11:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/19/oracle-releases-biggest-update-ever-308-vulnerabilities-patched/</loc>
		<lastmod>2017-07-19T03:26:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/19/bad-taste-vulnerability-affects-linux-systems-via-malicious-windows-msi-files/</loc>
		<lastmod>2017-07-19T16:55:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/19/wikileaks-cia-tasked-raytheon-analyzing-ttps-used-threat-actors-wild/</loc>
		<lastmod>2017-07-19T17:11:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/19/nukebot-banking-trojan-rough-drafts-real-threats/</loc>
		<lastmod>2017-07-19T17:28:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/20/hacker-uses-parity-wallet-vulnerability-steal-30-million-worth-ethereum/</loc>
		<lastmod>2017-07-20T03:47:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/20/authorities-take-hansa-dark-web-market-confirm-alphabay-takedown/</loc>
		<lastmod>2017-07-20T16:21:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/20/hack-segway-ninebot-minipro-hoverboard-20-seconds/</loc>
		<lastmod>2017-07-20T16:36:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/20/bypassing-amsi-via-com-server-hijacking/</loc>
		<lastmod>2017-07-20T17:02:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/20/bug-gnome-pic-parser-can-exploited-run-malicious-vbscripts/</loc>
		<lastmod>2017-07-20T17:12:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/21/chrome-extension-hijacks-search-results-filtering-trump-web/</loc>
		<lastmod>2017-07-21T03:23:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/21/tor-network-will-pay-hack-new-bug-bounty-program/</loc>
		<lastmod>2017-07-21T03:53:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/21/stantinko-modular-backdoor-infected-500000-computers/</loc>
		<lastmod>2017-07-21T17:58:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/21/fcc-no-documentation-ddos-attack-hit-net-neutrality-comments/</loc>
		<lastmod>2017-07-21T18:11:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/22/briar-tor-based-messenger-passes-security-audit-enters-beta-stage/</loc>
		<lastmod>2017-07-22T03:53:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/22/englishmansdentist-exploit-analysis/</loc>
		<lastmod>2017-07-22T04:05:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/22/new-version-darkhotel-malware-spotted-going-political-figures/</loc>
		<lastmod>2017-07-22T15:57:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/22/shut-up-and-hack/</loc>
		<lastmod>2017-07-22T16:15:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/22/microsoft-sued-fancy-bear-gain-control-domains-used-cyber-espionage-campaigns/</loc>
		<lastmod>2017-07-22T16:38:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/24/hacker-bestbuy-admits-hijacking-deutsche-telekom-routers-mirai-malware/</loc>
		<lastmod>2017-07-24T15:51:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/24/expert-exploited-unrestricted-file-upload-flaw-paypal-server-remotely-execute-code/</loc>
		<lastmod>2017-07-24T16:00:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/24/briton-admits-router-hack-ddosed-deutsche-telekom/</loc>
		<lastmod>2017-07-24T16:42:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/24/macos-fruitfly-backdoor-analysis-renders-new-spying-capabilities/</loc>
		<lastmod>2017-07-24T17:06:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/24/hacker-steals-8-4-million-worth-ethereum-veritaseum-platform/</loc>
		<lastmod>2017-07-24T17:22:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/25/perverse-malware-infecting-hundreds-macs-remained-undetected-years/</loc>
		<lastmod>2017-07-25T03:07:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/25/banking-trojan-uses-mouse-movements-distinguish-users-virtual-machines/</loc>
		<lastmod>2017-07-25T16:26:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/25/universal-android-ssl-pinning-bypass-frida/</loc>
		<lastmod>2017-07-25T16:36:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/25/novel-attack-tricks-servers-cache-expose-personal-data/</loc>
		<lastmod>2017-07-25T17:34:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/25/experts-detailed-new-operation-wilted-tulip-campaign-copykittens-apt/</loc>
		<lastmod>2017-07-25T17:51:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/26/citadel-trojan-developer-got-busted/</loc>
		<lastmod>2017-07-26T03:22:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/26/wi-fi-cracking/</loc>
		<lastmod>2017-07-26T03:34:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/26/smart-drawing-pads-used-ddos-attacks-iot-fish-tank-used-casino-hack/</loc>
		<lastmod>2017-07-26T16:02:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/26/new-cowersnail-windows-backdoor-linked-shellbind-sambacry-linux-malware/</loc>
		<lastmod>2017-07-26T17:10:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/27/flare-vm-windows-malware-analysis-distribution-youve-always-needed/</loc>
		<lastmod>2017-07-27T03:13:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/27/ssltls-client-fingerprinting-malware-detection/</loc>
		<lastmod>2017-07-27T03:31:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/27/crooks-reused-passwords-dark-web-dutch-police-hijacked-accounts/</loc>
		<lastmod>2017-07-27T16:00:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/27/shieldfs-can-stop-revert-effects-ransom-ware-infections/</loc>
		<lastmod>2017-07-27T16:09:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/27/security-expert-hacks-atm-drilling-hole/</loc>
		<lastmod>2017-07-27T16:27:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/28/btc-e-owner-arrested-laundering-stolen-bitcoin-ransomware-payments/</loc>
		<lastmod>2017-07-28T03:18:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/28/cloak-dagger-attack-bedeviled-android-months/</loc>
		<lastmod>2017-07-28T03:39:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/28/chinese-researchers-hack-tesla-model-x-impressive-video/</loc>
		<lastmod>2017-07-28T14:53:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/28/three-vendors-decline-patch-vulnerabilities-nuclear-radiation-monitors/</loc>
		<lastmod>2017-07-28T15:55:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/28/attack-uses-docker-containers-hide-persist-plant-malware/</loc>
		<lastmod>2017-07-28T16:14:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/29/triada-trojan-found-firmware-low-cost-android-smartphones/</loc>
		<lastmod>2017-07-29T03:41:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/29/3-linux-macos-hacking-tools-developed-cia-exposed-achilles-aeris-seapea/</loc>
		<lastmod>2017-07-29T04:17:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/29/microsoft-adds-support-linking-android-phones-windows-10-pcs/</loc>
		<lastmod>2017-07-29T16:05:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/29/security-flaws-smart-car-wash-can-exploited-cause-physical-injuries/</loc>
		<lastmod>2017-07-29T16:31:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/29/virgin-america-hacked-employee-passwords-personal-information-compromised/</loc>
		<lastmod>2017-07-29T16:54:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/31/internets-largest-bitcoin-mixer-shuts-realizing-bitcoin-not-anonymous/</loc>
		<lastmod>2017-07-31T03:06:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/31/hackers-leak-data-mandiant-security-researcher-operation-leaktheanalyst/</loc>
		<lastmod>2017-07-31T16:42:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/31/def-con-voting-village-hackers-easily-pwned-us-voting-machines/</loc>
		<lastmod>2017-07-31T16:57:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/07/31/brickerbot-dev-claims-cyber-attack-affected-60000-indian-modems/</loc>
		<lastmod>2017-07-31T17:07:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/08/01/copyfish-chrome-extension-hijacked-show-adware/</loc>
		<lastmod>2017-08-01T03:38:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/08/01/android-banking-trojan-svpeng-adds-keylogger/</loc>
		<lastmod>2017-08-01T04:49:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/08/02/pharmaceutical-giant-merck-confirmed-notpetya-attack-disrupted-operations-worldwide/</loc>
		<lastmod>2017-08-02T02:45:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/08/02/security-flaws-affect-tcus-used-bmw-ford-infiniti-nissan-vehicles/</loc>
		<lastmod>2017-08-02T03:23:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/08/03/roughly-175000-chinese-internet-connected-security-cameras-can-easily-hacked/</loc>
		<lastmod>2017-08-03T04:44:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/08/09/experimental-mozilla-send-service-allows-users-share-encrypted-copy-huge-files/</loc>
		<lastmod>2017-08-09T15:21:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/08/09/prison-time-manager-hacked-ex-employers-ftp-server-email-account/</loc>
		<lastmod>2017-08-09T15:59:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/08/09/fbi-used-booby-trapped-video-catch-suspected-sextortionist-hiding-behind-tor/</loc>
		<lastmod>2017-08-09T16:33:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/08/10/mamba-ransomware-back-targets-organizations-brazil-saudi-arabia/</loc>
		<lastmod>2017-08-10T02:59:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/08/28/hack-navy-vessel/</loc>
		<lastmod>2017-08-28T02:11:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/08/29/bit-paymer-ransomware-hits-scottish-hospitals/</loc>
		<lastmod>2017-08-29T14:53:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/08/29/metadata-iot-traffic-exposes-home-user-activity/</loc>
		<lastmod>2017-08-29T15:12:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/08/29/ziva-zimperiums-ios-video-audio-kernel-exploit/</loc>
		<lastmod>2017-08-29T15:21:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/08/30/security-firms-unite-bring-wirex-android-ddos-botnet/</loc>
		<lastmod>2017-08-30T02:41:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/08/30/vulnerability-spotlight-code-execution-vulnerability-labview/</loc>
		<lastmod>2017-08-30T03:11:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/08/30/still-takes-2-minutes-vulnerable-iot-devices-compromised-online/</loc>
		<lastmod>2017-08-30T13:46:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/08/30/selena-gomez-posts-justin-bieber-nude-photos-instagram-hack/</loc>
		<lastmod>2017-08-30T14:41:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/08/31/new-eset-research-uncovers-gazer-stealthy-backdoor-spies-embassies/</loc>
		<lastmod>2017-08-31T02:57:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/08/31/buy-macbook-1-hacking-sap-pos/</loc>
		<lastmod>2017-08-31T04:07:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/08/31/expert-discovered-2893-bitcoin-miners-left-exposed-internet/</loc>
		<lastmod>2017-08-31T10:08:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/08/31/three-hardcoded-backdoor-accounts-discovered-arris-modems/</loc>
		<lastmod>2017-08-31T10:19:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/08/31/locky-ransomware-attacks-ramp/</loc>
		<lastmod>2017-08-31T14:20:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/01/cia-developed-windows-malware-alters-boot-sector-load-malware/</loc>
		<lastmod>2017-09-01T03:06:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/01/reflected-xss-bug-patched-popular-woocommerce-wordpress-plugin/</loc>
		<lastmod>2017-09-01T03:26:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/01/free-cobian-rat-offered-underground-hacking-forums-comes-backdoor/</loc>
		<lastmod>2017-09-01T15:54:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/01/boobytrapped-word-file-installs-locky-ransomware-close-document/</loc>
		<lastmod>2017-09-01T16:14:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/01/discovering-session-hijacking-vulnerability-gitlab/</loc>
		<lastmod>2017-09-01T16:38:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/02/instagram-hack-hit-millions-accounts-victims-phone-numbers-now-sale/</loc>
		<lastmod>2017-09-02T03:56:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/02/radio-hacker-interrupts-police-chase-australia/</loc>
		<lastmod>2017-09-02T07:50:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/02/ddos-booter-service-suffers-security-breach/</loc>
		<lastmod>2017-09-02T12:09:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/02/experts-spotted-malware-campaign-using-hoeflertext-popups-push-rat-malware/</loc>
		<lastmod>2017-09-02T14:55:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/04/vulnerabilities-discovered-mobile-bootloaders-major-vendors/</loc>
		<lastmod>2017-09-04T02:58:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/04/massive-wave-mongodb-ransom-attacks-makes-26000-new-victims/</loc>
		<lastmod>2017-09-04T14:55:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/04/banking-trojan-now-targets-coinbase-users-not-just-banking-portals/</loc>
		<lastmod>2017-09-04T15:13:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/05/chinese-man-jailed-helping-net-users-evade-state-blocks/</loc>
		<lastmod>2017-09-05T10:37:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/05/six-year-old-loop-bug-re-discovered-affect-almost-major-pdf-viewers/</loc>
		<lastmod>2017-09-05T10:43:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/05/trustzone-downgrade-attack-opens-android-devices-old-vulnerabilities/</loc>
		<lastmod>2017-09-05T13:18:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/06/critical-remote-code-execution-vulnerability-apache/</loc>
		<lastmod>2017-09-06T03:13:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/06/lenovo-gets-slap-wrist-superfish-adware-scandal/</loc>
		<lastmod>2017-09-06T09:06:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/06/sabotage-warning-issued-hackers-hiding-deep-inside-energy-sector/</loc>
		<lastmod>2017-09-06T12:31:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/06/a360-drive-abused-deliver-adwind-remcos-netwire-rats/</loc>
		<lastmod>2017-09-06T16:03:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/07/bug-windows-kernel-prevent-security-software-identifying-malware/</loc>
		<lastmod>2017-09-07T10:47:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/07/codefork-group-uses-fileless-malware-deploy-monero-miners/</loc>
		<lastmod>2017-09-07T11:18:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/07/samsung-paying-hackers-200000-breach-devices/</loc>
		<lastmod>2017-09-07T13:14:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/07/hackers-can-use-ultrasounds-take-control-alexa-siri-cortana-others/</loc>
		<lastmod>2017-09-07T16:02:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/08/researchers-hack-voting-machines-used-german-elections/</loc>
		<lastmod>2017-09-08T03:18:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/08/firm-hired-monitor-data-breaches-hacked-143-million-social-security-numbers-stolen/</loc>
		<lastmod>2017-09-08T03:39:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/08/researchers-reveal-new-toast-overlay-attack-android-devices/</loc>
		<lastmod>2017-09-08T13:00:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/09/malware-group-uses-facebook-cdn-bypass-security-solutions/</loc>
		<lastmod>2017-09-09T16:56:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/09/member-crackas-attitude-hacked-us-intel-officials-sentenced-5-years-jail/</loc>
		<lastmod>2017-09-09T17:16:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/09/android-users-vulnerable-high-severity-overlay-attacks/</loc>
		<lastmod>2017-09-09T17:32:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/11/mexican-tax-refund-moneyback-site-exposed-400gb-sensitive-customer-data/</loc>
		<lastmod>2017-09-11T03:23:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/11/intra-library-collusion-attacks-open-door-whole-new-kind-android-malware/</loc>
		<lastmod>2017-09-11T14:12:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/11/google-chrome-will-soon-warn-software-performs-mitm-attacks/</loc>
		<lastmod>2017-09-11T15:52:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/11/hackers-can-remotely-access-smiths-medical-syringe-infusion-pumps-kill-patients/</loc>
		<lastmod>2017-09-11T16:10:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/12/comodo-caught-breaking-new-caa-standard-one-day-went-effect/</loc>
		<lastmod>2017-09-12T03:06:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/12/bashware-malware-can-abuse-windows-10s-linux-shell-bypass-security-software/</loc>
		<lastmod>2017-09-12T13:10:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/12/mongodb-improves-security-amid-new-wave-ransom-attacks/</loc>
		<lastmod>2017-09-12T13:14:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/13/routex-malware-uses-netgear-routers-credential-stuffing-attacks/</loc>
		<lastmod>2017-09-13T13:33:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/13/second-researcher-drops-router-exploit-code-d-link-mishandles-bug-reports/</loc>
		<lastmod>2017-09-13T13:45:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/13/backdoor-found-wordpress-plugin-200000-installations/</loc>
		<lastmod>2017-09-13T16:15:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/13/startup-sells-zero-days-governments-offering-1-million-tor-hacks/</loc>
		<lastmod>2017-09-13T16:24:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/14/blueborne-8-zero-day-bugs-threaten-8-2-billion-bluetooth-enabled-devices/</loc>
		<lastmod>2017-09-14T02:51:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/15/sysadmin-hacks-former-employer-buys-ipad-tablets-staples/</loc>
		<lastmod>2017-09-15T16:00:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/15/adware-installs-infostealer-trojan-loads-via-chrome-dll-hijacking/</loc>
		<lastmod>2017-09-15T16:09:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/15/premium-sms-malware-expensivewall-infected-millions-android-handsets/</loc>
		<lastmod>2017-09-15T16:35:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/16/attackers-can-bypass-skel-protection-macos-high-sierra/</loc>
		<lastmod>2017-09-16T02:46:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/16/ourmine-hacks-vevo-employee-disrespectful-hackers-linkedin/</loc>
		<lastmod>2017-09-16T13:25:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/16/loopix-anonymity-system-wants-secure-alternative-tor/</loc>
		<lastmod>2017-09-16T17:40:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/18/ccleaner-compromised-distribute-malware-almost-month/</loc>
		<lastmod>2017-09-18T14:48:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/18/cse-cybsec-zlab-malware-analysis-report-notpetya/</loc>
		<lastmod>2017-09-18T15:03:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/18/litebit-bitcoin-exchange-hacked-twice-two-months/</loc>
		<lastmod>2017-09-18T15:17:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/18/azure-confidential-computing-%e2%80%8bmicrosoft-boosts-security-cloud-data/</loc>
		<lastmod>2017-09-18T16:08:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/19/researchers-discover-new-android-banking-trojan/</loc>
		<lastmod>2017-09-19T03:09:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/19/deep-dive-hacking-8-bit-avr/</loc>
		<lastmod>2017-09-19T03:17:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/19/russian-authorities-announce-takedown-ramp-dark-web-marketplace/</loc>
		<lastmod>2017-09-19T15:34:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/19/researchers-demonstrate-steal-bitcoin-exploiting-ss7-issues/</loc>
		<lastmod>2017-09-20T03:44:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/20/iterm2-leaks-everything-hover-terminal-via-dns-requests/</loc>
		<lastmod>2017-09-20T03:12:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/20/malware-uses-security-cameras-infrared-capabilities-steal-data/</loc>
		<lastmod>2017-09-20T03:26:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/20/viacom-left-keys-digital-kingdom-publicly-exposed-aws-s3-bucket/</loc>
		<lastmod>2017-09-20T15:51:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/20/underground-hacking-forum-admins-second-thoughts-selling-ransomware/</loc>
		<lastmod>2017-09-20T15:56:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/20/attackers-can-use-hvac-systems-control-malware-air-gapped-networks/</loc>
		<lastmod>2017-09-20T16:08:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/21/trickbot-tricks-victims-web-injects-server-side-injections/</loc>
		<lastmod>2017-09-21T03:29:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/21/sec-says-hackers-breached-system-might-used-stolen-data-insider-trading/</loc>
		<lastmod>2017-09-21T15:16:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/21/attackers-take-wordpress-joomla-jboss-servers-mine-monero/</loc>
		<lastmod>2017-09-21T15:22:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/21/researchers-link-ccleaner-hack-cyberespionage-group/</loc>
		<lastmod>2017-09-21T15:45:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/21/whatsapp-refused-add-backdoor-uk-government/</loc>
		<lastmod>2017-09-21T16:24:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/22/clkscrew-attack-can-hack-modern-chipsets-via-power-management-features/</loc>
		<lastmod>2017-09-22T03:08:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/22/isp-involvement-suspected-distribution-finfisher-spyware/</loc>
		<lastmod>2017-09-22T03:29:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/22/sec-announces-hacked-information-may-used-insider-trading/</loc>
		<lastmod>2017-09-22T15:50:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/22/ddos-extortion-group-sends-ransom-demand-thousands-companies/</loc>
		<lastmod>2017-09-22T16:05:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/22/ransomware-demands-nudes-instead-bitcoin/</loc>
		<lastmod>2017-09-22T16:38:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/23/new-verizon-data-leak-second-one-months/</loc>
		<lastmod>2017-09-23T02:54:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/23/experts-spotted-login-page-flaw-joomla-exposes-admin-credentials/</loc>
		<lastmod>2017-09-23T03:04:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/23/popular-android-keyboard-app-caught-collecting-user-data-running-external-code/</loc>
		<lastmod>2017-09-23T09:51:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/26/whatsapp-banned-china-showcases-broadening-censorship/</loc>
		<lastmod>2017-09-26T17:47:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/27/europol-report-cyber-attacks-atm-networks-rise/</loc>
		<lastmod>2017-09-27T02:48:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/27/another-banking-trojan-adds-support-nsas-eternalblue-exploit/</loc>
		<lastmod>2017-09-27T16:29:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/27/internet-explorer-bug-leaks-users-type-url-address-bar/</loc>
		<lastmod>2017-09-27T16:58:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/28/cisco-addressed-several-critical-ios-flaws-expose-devices-remote-attacks/</loc>
		<lastmod>2017-09-28T12:22:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/28/one-hacker-stole-thousands-dollars-worth-cryptocurrency-classic-code-injection-hack-etherdelta/</loc>
		<lastmod>2017-09-28T12:35:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/28/ios-apps-can-read-metadata-revealing-users-location-histories/</loc>
		<lastmod>2017-09-28T12:52:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/28/fin7-group-uses-javascript-stealer-dll-variant-new-attacks/</loc>
		<lastmod>2017-09-28T16:00:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/29/way-beard-growing-finals-gets-busted-drug-dealing-dark-web/</loc>
		<lastmod>2017-09-29T02:54:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/29/amazon-owned-grocery-chain-whole-foods-market-suffered-payment-card-breach/</loc>
		<lastmod>2017-09-29T15:47:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/29/money-making-machine-monero-mining-malware/</loc>
		<lastmod>2017-09-29T16:00:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/30/exploiting-wi-fi-stack-apple-devices/</loc>
		<lastmod>2017-09-30T04:48:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/09/30/macs-not-receiving-efi-firmware-security-updates-expected/</loc>
		<lastmod>2017-09-30T05:05:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/04/yahoo-hack-3-billion-yahoo-accounts-hacked-2013-attack/</loc>
		<lastmod>2017-10-04T10:58:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/04/intezer-researchers-link-ccleaner-hack-chinese-apt17-hackers/</loc>
		<lastmod>2017-10-04T18:18:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/04/password-leak-puts-online-radio-stations-risk-hijack/</loc>
		<lastmod>2017-10-04T18:39:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/05/new-network-security-standards-will-protect-internets-routing/</loc>
		<lastmod>2017-10-05T03:38:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/05/cve-2017-12617-code-execution-flaw-patched-apache-tomcat/</loc>
		<lastmod>2017-10-05T15:08:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/05/cheap-nasty-malware-wants-steal-data/</loc>
		<lastmod>2017-10-05T16:00:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/06/using-binary-diffing-discover-windows-kernel-memory-disclosure-bugs/</loc>
		<lastmod>2017-10-06T14:07:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/06/wsj-kaspersky-software-likely-used-russian-backed-nsa-breach/</loc>
		<lastmod>2017-10-06T14:18:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/06/zapad-drills-russia-may-tested-cyber-weapons-latvia/</loc>
		<lastmod>2017-10-06T16:28:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/06/apple-issues-emergency-patch-fix-password-leak-disk-encryption-utility/</loc>
		<lastmod>2017-10-06T16:47:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/07/researchers-ubers-ios-app-secret-permissions-allowed-copy-phone-screen/</loc>
		<lastmod>2017-10-07T03:17:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/07/simple-registry-hacks-bypass-windows-digital-signature-opening-gates-malicious-code/</loc>
		<lastmod>2017-10-07T03:26:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/07/disqus-confirms-2012-hack-comments-tool/</loc>
		<lastmod>2017-10-07T12:41:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/07/critical-vulnerability-affects-siemens-smart-meters/</loc>
		<lastmod>2017-10-07T16:00:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/09/forrester-one-influential-research-advisory-firms-hacked/</loc>
		<lastmod>2017-10-09T03:08:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/09/wi-fi-packet-sniffing-monitoring-windows-using-raspberry-pi-inspired-wimonitor/</loc>
		<lastmod>2017-10-09T03:24:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/09/kovter-group-malvertising-campaign-exposes-millions-potential-ad-fraud-malware-infections/</loc>
		<lastmod>2017-10-09T15:17:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/09/one-internets-gatekeepers-eyeing-sneaky-cryptocurrency-miners/</loc>
		<lastmod>2017-10-09T15:55:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/10/man-goes-nickname-liquidworm-released-flir-thermal-camera-exploit/</loc>
		<lastmod>2017-10-10T02:43:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/10/formbook-malware-targets-us-defense-contractors-aerospace-manufacturing-sectors/</loc>
		<lastmod>2017-10-10T03:27:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/10/iran-linked-oilrig-hacked-group-use-new-trojan-middle-east-attacks/</loc>
		<lastmod>2017-10-10T16:37:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/10/4g5g-wireless-networks-vulnerable-wifi-putting-smartcities-risk/</loc>
		<lastmod>2017-10-10T16:50:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
</urlset><!-- <p>Please edit wp-db.inc.php in wp-includes and set SAVEQUERIES to true if you want to see the queries.</p> --> <!-- Request ID: 04c8c11e3b6e549406ed197e87a5dd94; Queries for sitemap: 2; Total queries: 51; Seconds: 0.09; Memory for sitemap: 2MB; Total memory: 16MB -->
