<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet type='text/xsl' href='https://www.securitynewspaper.com/snnews_pl/google-sitemap-generator/sitemap.xsl'?><!-- sitemap-generator-url='http://www.arnebrachhold.de' sitemap-generator-version='4.1.23' -->
<!-- generated-on='May 17, 2026 5:26 am' -->
<urlset xmlns:xsi='http://www.w3.org/2001/XMLSchema-instance' xsi:schemaLocation='http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd' xmlns='http://www.sitemaps.org/schemas/sitemap/0.9'>	<url>
		<loc>https://www.securitynewspaper.com/2017/10/10/accenture-left-huge-trove-highly-sensitive-data-exposed-servers/</loc>
		<lastmod>2017-10-10T17:12:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/11/ios-privacy-steal-password-easily-get-users-apple-id-password-just-asking/</loc>
		<lastmod>2017-10-11T03:20:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/11/whatsapp-exploit-can-allow-hackers-monitor-sleep-things/</loc>
		<lastmod>2017-10-11T03:28:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/11/microsoft-addresses-cve-2017-11826-office-zero-day-used-deliver-malware/</loc>
		<lastmod>2017-10-11T15:59:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/11/t-mobile-website-allowed-hackers-access-account-data-just-phone-number/</loc>
		<lastmod>2017-10-11T16:09:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/11/ransomware-now-big-business-dark-web-malware-developers-cashing/</loc>
		<lastmod>2017-10-11T17:10:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/12/kaspersky-spotted-atmii-new-strain-atm-malware/</loc>
		<lastmod>2017-10-12T03:05:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/12/bug-no-name-multiple-heap-buffer-overflows-windows-dns-client/</loc>
		<lastmod>2017-10-12T03:19:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/12/swiss-bpc-banking-software-smartvista-vulnerable-sql-injection-attacks/</loc>
		<lastmod>2017-10-12T15:56:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/12/asd-revealed-hacker-stole-30gb-sensitive-data-australias-military-capabilities/</loc>
		<lastmod>2017-10-12T16:08:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/12/macro-less-code-exec-msword/</loc>
		<lastmod>2017-10-12T16:30:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/13/equifax-website-redirected-visitors-fake-flash-update-malvertising/</loc>
		<lastmod>2017-10-13T03:13:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/13/netflix-flavoured-phishing-attack-targets-business-emails/</loc>
		<lastmod>2017-10-13T03:35:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/13/doublelocker-innovative-android-ransomware/</loc>
		<lastmod>2017-10-13T13:00:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/13/new-facebook-scam-allows-friend-contacts-hack-account/</loc>
		<lastmod>2017-10-13T16:08:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/14/rabbit-hole-blu-phone-infection/</loc>
		<lastmod>2017-10-14T03:34:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/14/someone-created-tor-hidden-service-phish-tor-hidden-service/</loc>
		<lastmod>2017-10-14T13:41:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/14/security-service-ukraine-new-wave-large-scale-notpetya-like-attack/</loc>
		<lastmod>2017-10-14T16:11:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/14/mayhem-malware-server-botnet-continues-evolve/</loc>
		<lastmod>2017-10-14T16:36:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/16/flaws-siemens-building-automation-controllers-open-hack-fix-asap/</loc>
		<lastmod>2017-10-16T02:53:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/16/create-keylogger-using-notepad/</loc>
		<lastmod>2017-10-16T03:15:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/16/linux-kernel-affected-local-privilege-escalation-vulnerability/</loc>
		<lastmod>2017-10-16T13:04:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/16/key-reinstallation-attacks-breaking-wpa2-forcing-nonce-reuse/</loc>
		<lastmod>2017-10-16T13:28:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/17/roca-vulnerable-rsa-generation-cve-2017-15361/</loc>
		<lastmod>2017-10-17T03:12:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/17/fake-tax-documents-spread-jrat-malware/</loc>
		<lastmod>2017-10-17T03:28:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/17/even-best-email-spoofing-defences-world-hmrc-spoofed/</loc>
		<lastmod>2017-10-17T17:43:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/17/atm-malware-sold-darknet-market/</loc>
		<lastmod>2017-10-17T17:51:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/18/blackoasis-apt-leverages-new-flash-zero-day-exploit-deploy-finspy/</loc>
		<lastmod>2017-10-18T03:48:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/18/microsoft-never-disclosed-2013-hack-secret-vulnerability-database/</loc>
		<lastmod>2017-10-18T04:09:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/18/google-introduces-new-advanced-protection-feature-protect-users/</loc>
		<lastmod>2017-10-18T15:43:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/18/securing-printed-data-paperless-office/</loc>
		<lastmod>2017-10-18T16:01:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/20/attacking-co-hosted-vm-hacker-hammer-two-memory-modules/</loc>
		<lastmod>2017-10-20T05:15:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/20/magnitude-exploit-kit-now-targeting-south-korea-magniber-ransomware/</loc>
		<lastmod>2017-10-20T05:34:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/20/necurs-botnet-malspam-pushes-locky-using-dde-attack/</loc>
		<lastmod>2017-10-20T16:14:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/20/osxproton-spreading-supply-chain-attack/</loc>
		<lastmod>2017-10-20T16:17:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/20/malware-firmware-exploit-false-sense-security/</loc>
		<lastmod>2017-10-20T16:26:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/21/security-concerns-lead-lte-service-shutdown-chinese-apple-watches/</loc>
		<lastmod>2017-10-21T04:09:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/21/assemblyline-canadas-cse-intelligence-agency-releases-malware-analysis-tool/</loc>
		<lastmod>2017-10-21T13:33:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/21/hack-apps-earn-1000-bug-bounty-program-launched-google-hackerone/</loc>
		<lastmod>2017-10-21T16:21:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/23/us-warns-ongoing-attacks-energy-firms-critical-infrastructure/</loc>
		<lastmod>2017-10-23T03:12:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/23/pi-top-raspberry-pi-powered-modular-laptop-help-learn-coding-hardware-hacks/</loc>
		<lastmod>2017-10-23T03:21:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/23/netbsd-security-improved-implementation-kernel-aslr-kaslr/</loc>
		<lastmod>2017-10-23T13:52:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/23/fake-cryptocurrency-trading-apps-google-play/</loc>
		<lastmod>2017-10-23T15:55:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/24/exclusive-cse-zlab-experts-spotted-new-wonder-botnet-wild/</loc>
		<lastmod>2017-10-24T02:53:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/24/ahmyth-android-rat-another-open-source-android-rat-tool-available-github/</loc>
		<lastmod>2017-10-24T03:03:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/24/apnic-whois-related-problem-led-accidental-exposure-authentication-data/</loc>
		<lastmod>2017-10-24T14:49:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/24/kiev-metro-hit-new-variant-infamous-diskcoder-ransomware/</loc>
		<lastmod>2017-10-24T16:10:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/24/windows-10-security-heres-shield-files-ransomware-says-microsoft/</loc>
		<lastmod>2017-10-24T16:25:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/25/bad-rabbit-not-petya-back-improved-ransomware/</loc>
		<lastmod>2017-10-25T02:57:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/25/duhk-attack-exposes-gaps-fips-certification/</loc>
		<lastmod>2017-10-25T03:16:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/25/offshore-legal-firm-appleby-hacked-financial-details-rich-clients-set-released/</loc>
		<lastmod>2017-10-25T18:03:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/25/hackers-hijack-coinhive-cryptocurrency-miner-old-password/</loc>
		<lastmod>2017-10-25T18:11:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/26/canadian-smbs-technology-can-help-stay-energized/</loc>
		<lastmod>2017-10-26T03:17:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/26/kaspersky-says-nsa-hacking-tools-obtained-malware-found/</loc>
		<lastmod>2017-10-26T03:49:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/27/two-critical-vulnerabilities-found-inmarsats-satcom-systems/</loc>
		<lastmod>2017-10-27T16:16:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/28/pick-ble-smart-lock-cause-cancer-using-just-mobile-phone/</loc>
		<lastmod>2017-10-28T03:58:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/28/homehack-hackers-taken-control-lgs-iot-home-appliances/</loc>
		<lastmod>2017-10-28T04:03:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/28/mysterious-hack-allows-attackers-stealing-windows-login-credentials-without-user-interaction/</loc>
		<lastmod>2017-10-28T12:26:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/28/basetools-underground-hacking-forum-breached-hacker-demands-50k-ransom/</loc>
		<lastmod>2017-10-28T15:56:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/30/iotroop-botnet-full-investigation/</loc>
		<lastmod>2017-10-30T03:10:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/30/stealing-amazon-ec2-keys-via-xss-vulnerability/</loc>
		<lastmod>2017-10-30T03:23:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/30/industrial-products-many-vendors-still-vulnerable-krack-attack/</loc>
		<lastmod>2017-10-30T13:18:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/30/iphone-apps-granted-camera-access-can-secretly-take-photos-record-video/</loc>
		<lastmod>2017-10-30T16:12:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/31/password-cracking-tool-helps-admins-test-security/</loc>
		<lastmod>2017-10-31T03:56:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/31/advancements-cyber-security-hackers-ddos-prevalent-ever/</loc>
		<lastmod>2017-10-31T04:04:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/31/vulnerabilities-google-issue-tracker-exposed-details-unpatched-flaws/</loc>
		<lastmod>2017-10-31T14:43:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/10/31/highly-critical-flaw-cvss-score-10-lets-hackers-hijack-oracle-identity-manager/</loc>
		<lastmod>2017-10-31T16:22:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/01/popular-circle-disney-parental-control-system-riddled-23-vulnerabilities/</loc>
		<lastmod>2017-11-01T03:30:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/01/night-devil-ransomware-wiper-look-targeted-attacks-japan/</loc>
		<lastmod>2017-11-01T03:38:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/01/d-link-middle-east-dlink-mea-website-secretly-mining-cryptocurrencies/</loc>
		<lastmod>2017-11-01T16:49:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/01/facebook-password-stealing-phishing-attack-hits-hard-android-ios-users/</loc>
		<lastmod>2017-11-01T17:07:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/02/wordpress-releases-version-4-8-3-address-serious-sql-injection-vulnerability/</loc>
		<lastmod>2017-11-02T03:18:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/02/silence-new-trojan-attacking-financial-organizations/</loc>
		<lastmod>2017-11-02T03:30:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/02/undetectable-atm-shimmers-used-steal-chip-based-card-worldwide/</loc>
		<lastmod>2017-11-02T13:14:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/02/pwn2own-iphone-7-hacked-three-times-galaxy-s8-huawei-mate-9-pro-also-got-destroyed/</loc>
		<lastmod>2017-11-02T15:42:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/03/arrest-made-fireeye-corporate-network-hacking-attempt/</loc>
		<lastmod>2017-11-03T03:38:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/03/threat-actors-using-default-ssh-credentials-hijack-ethereum-miners/</loc>
		<lastmod>2017-11-03T04:35:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/03/poisoning-well-banking-trojan-targets-google-search-results/</loc>
		<lastmod>2017-11-03T15:40:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/03/corebot-making-comeback/</loc>
		<lastmod>2017-11-03T15:44:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/04/us-doj-identifies-least-6-russian-government-officials-involved-dnc-hack/</loc>
		<lastmod>2017-11-04T03:22:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/04/next-gen-algorithms-make-tor-browser-secure-private-download-alpha-now/</loc>
		<lastmod>2017-11-04T03:26:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/04/make-reverse-tcp-backdoor-python-part-1/</loc>
		<lastmod>2017-11-04T16:03:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/04/fake-whatsapp-app-official-google-play-store-downloaded-million-android-users/</loc>
		<lastmod>2017-11-04T16:07:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/04/critical-tor-flaw-leaks-users-real-ip-address-update-now/</loc>
		<lastmod>2017-11-04T16:12:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/06/nic-asia-bank-last-victim-swift-hackers/</loc>
		<lastmod>2017-11-06T03:14:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/06/malware-signed-stolen-digital-code-signing-certificates-continues-bypass-security-software/</loc>
		<lastmod>2017-11-06T15:29:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/06/high-interaction-honeypots-sysdig-falco/</loc>
		<lastmod>2017-11-06T15:50:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/06/online-privacy-free-paid/</loc>
		<lastmod>2017-11-06T16:12:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/07/paradise-papers-result-hack-external-attackers/</loc>
		<lastmod>2017-11-07T04:08:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/07/cisco-patches-dos-flaw-bgp-ethernet-vpn-implementation/</loc>
		<lastmod>2017-11-07T04:20:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/07/flaws-ieee-p1735-electronics-standard-expose-intellectual-property/</loc>
		<lastmod>2017-11-07T13:15:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/07/stealthy-cat-mouse-hacking-campaign-aims-steal-diplomatic-secrets/</loc>
		<lastmod>2017-11-07T15:33:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/07/mantistek-gk2s-keylogger-warning-cheap-gadgets/</loc>
		<lastmod>2017-11-07T15:48:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/08/playing-cat-mouse-introducing-felismus-malware/</loc>
		<lastmod>2017-11-08T03:30:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/08/brother-printers-susceptible-remote-denial-service-attacks/</loc>
		<lastmod>2017-11-08T03:47:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/08/linux-security-google-fuzzer-finds-ton-holes-kernels-usb-subsystem/</loc>
		<lastmod>2017-11-08T15:44:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/09/zero-day-zen-garden-windows-exploit-development-part-1/</loc>
		<lastmod>2017-11-09T03:56:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/09/five-tips-keeping-database-secure/</loc>
		<lastmod>2017-11-09T04:17:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/09/experts-can-hack-cpus-since-2008-usb-triggering-intel-management-engine-flaw/</loc>
		<lastmod>2017-11-09T14:31:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/09/hack-hackers-watcha-new-ipcam-exploit-scam/</loc>
		<lastmod>2017-11-09T15:47:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/09/russias-fancy-bear-hackers-exploit-microsoft-office-flaw-nyc-terrorism-fears/</loc>
		<lastmod>2017-11-09T16:07:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/10/vault-8-wikileaks-releases-source-code-cia-hive-malware-control-platform/</loc>
		<lastmod>2017-11-10T03:28:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/10/toastamigo-first-known-strain-malware-uses-toast-overlay-exploit/</loc>
		<lastmod>2017-11-10T15:17:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/10/disdain-exploit-kit-side-social-engineering-deliver-neutrino-bot/</loc>
		<lastmod>2017-11-10T16:06:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/10/fighting-persistent-malware-uefi-scanner/</loc>
		<lastmod>2017-11-10T16:26:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/11/using-legitimate-tools-hide-malicious-code/</loc>
		<lastmod>2017-11-11T03:26:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/11/ordinypt-wiper-ransomware-targets-german-businesses/</loc>
		<lastmod>2017-11-11T04:21:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/11/avgater-attack-abuse-quarantine-vulnerabilities-privilege-escalation/</loc>
		<lastmod>2017-11-11T12:59:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/11/runpe-hide-code-behind-legit-process/</loc>
		<lastmod>2017-11-11T13:21:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/13/avira-spotted-new-strain-dreaded-locky-ransomware-wild/</loc>
		<lastmod>2017-11-13T03:26:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/13/hacking-google-recaptcha/</loc>
		<lastmod>2017-11-13T04:04:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/13/dhs-tests-demonstrate-boeing-757-airplanes-vulnerable-hacking/</loc>
		<lastmod>2017-11-13T15:35:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/13/c-espionage-group-using-new-strain-malware-dubbed-reaver/</loc>
		<lastmod>2017-11-13T15:50:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/14/av-can-open-attacks-otherwise-wouldnt-possible/</loc>
		<lastmod>2017-11-14T02:56:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/14/cryptojacking-craze-drains-cpu-now-done-2500-sites/</loc>
		<lastmod>2017-11-14T03:23:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/14/oneplus-includes-qualcomm-engineering-app-phones-exposes-root-backdoor/</loc>
		<lastmod>2017-11-14T16:49:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/14/experts-bypass-ultra-secure-apple-iphone-x-face-id-3d-printed-mask/</loc>
		<lastmod>2017-11-14T17:02:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/15/blueborne-rce-android-6-0-1-cve-2017-0781-english/</loc>
		<lastmod>2017-11-15T03:19:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/15/go-hell-powershell-powerdown-powershell-attacks/</loc>
		<lastmod>2017-11-15T12:19:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/15/multi-stage-malware-sneaks-google-play/</loc>
		<lastmod>2017-11-15T15:40:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/15/17-year-old-ms-office-flaw-cve-2017-11882-exploited-remotely-install-malware-without-victim-interaction/</loc>
		<lastmod>2017-11-15T15:52:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/16/motherboard-hacking-livestream-cracking-mmorpgs/</loc>
		<lastmod>2017-11-16T03:28:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/16/us-retailer-forever-21-warns-customers-payment-card-breach-locations/</loc>
		<lastmod>2017-11-16T03:42:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/16/new-emotet-hijacks-windows-api-evades-sandbox-analysis/</loc>
		<lastmod>2017-11-16T13:20:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/16/amazon-echo-google-home-vulnerable-bluetooth-exploit/</loc>
		<lastmod>2017-11-16T13:39:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/18/motherboard-hacking-livestream-turn-router-part-botnet/</loc>
		<lastmod>2017-11-18T05:35:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/18/pentagon-contractor-leaves-social-media-spy-archive-wide-open-amazon/</loc>
		<lastmod>2017-11-18T14:05:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/20/antivirus-software-can-hijacked-compromise-windows-systems/</loc>
		<lastmod>2017-11-20T06:39:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/20/four-methods-hackers-use-steal-data-air-gapped-computers/</loc>
		<lastmod>2017-11-20T16:05:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/21/fully-undetectable-backdooring-pe-files/</loc>
		<lastmod>2017-11-21T04:02:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/21/adwind-remote-access-trojan-makes-comeback-got-smarter/</loc>
		<lastmod>2017-11-21T16:50:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/21/intel-security-flaws-put-laptops-servers-storage-risk-hacking/</loc>
		<lastmod>2017-11-21T17:04:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/22/uber-concealed-hack-57-million-accounts-year/</loc>
		<lastmod>2017-11-22T03:32:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/22/alternative-methods-becoming-system/</loc>
		<lastmod>2017-11-22T16:15:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/23/top-websites-using-keyloggers-recording-even-passwords-research-shows/</loc>
		<lastmod>2017-11-23T03:08:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/23/ubuntu-17-10-users-get-major-kernel-update-20-security-vulnerabilities-patched/</loc>
		<lastmod>2017-11-23T03:22:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/23/hp-patches-severe-code-execution-bug-enterprise-printers/</loc>
		<lastmod>2017-11-23T15:42:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/24/android-commercial-spyware/</loc>
		<lastmod>2017-11-24T03:31:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/24/qkg-filecoder-self-replicating-document-encrypting-ransomware/</loc>
		<lastmod>2017-11-24T03:44:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/24/macos-malware-notorious-data-stealing-capabilities-back/</loc>
		<lastmod>2017-11-24T13:30:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/25/saml-post-intrusion-attack-mirrors-golden-ticket/</loc>
		<lastmod>2017-11-25T03:21:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/25/imgur-confirms-2014-hack-email-addresses-passwords-stolen-1-7-million-accounts/</loc>
		<lastmod>2017-11-25T16:22:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/27/young-daeshgram-hackers-flood-official-isis-propaganda-channels-porn/</loc>
		<lastmod>2017-11-27T03:37:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/27/image-removal-vulnerability-facebook-polling-feature/</loc>
		<lastmod>2017-11-27T14:40:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/27/newly-published-exploit-code-used-spread-marai-variant/</loc>
		<lastmod>2017-11-27T14:49:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/28/security-firm-front-advanced-chinese-hacking-operation-feds-say/</loc>
		<lastmod>2017-11-28T04:11:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/28/terror-exploit-kit-goes-https-way/</loc>
		<lastmod>2017-11-28T13:30:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/28/fake-whatsapp-updater-google-play-store-downloaded-1-million-times-served-malware-ads/</loc>
		<lastmod>2017-11-28T14:02:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/29/macos-bug-lets-log-admin-no-password-required/</loc>
		<lastmod>2017-11-29T03:46:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/29/google-detects-boots-tizi-spyware-off-google-play/</loc>
		<lastmod>2017-11-29T03:54:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/29/just-pair-11-radio-gadgets-can-steal-car/</loc>
		<lastmod>2017-11-29T04:22:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/30/shipping-giant-refuses-pay-hackers-ransom-data-stolen/</loc>
		<lastmod>2017-11-30T03:35:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/11/30/persistent-drive-cryptomining-coming-browser-near/</loc>
		<lastmod>2017-11-30T16:33:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/12/01/cisco-patches-critical-playback-bugs-webex-players/</loc>
		<lastmod>2017-12-01T03:25:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/12/01/national-credit-federation-leaked-us-citizen-data-unsecured-aws-bucket/</loc>
		<lastmod>2017-12-01T13:23:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/12/02/kernel-exploit-demo-windows-10-privesc-via-warbird/</loc>
		<lastmod>2017-12-02T03:36:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/12/02/vulnerability-walkthrough-7zip-cve-2016-2334-hfs-code-execution-vulnerability/</loc>
		<lastmod>2017-12-02T04:09:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/12/04/dark-web-threats-technical-tactical/</loc>
		<lastmod>2017-12-04T03:42:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/12/04/windows-10-bug-exposing-users-security-threats-delay-windows-updates/</loc>
		<lastmod>2017-12-04T17:41:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/12/04/paypals-tio-data-breach-1-6-million-customers-personal-details-stolen-hackers/</loc>
		<lastmod>2017-12-04T17:53:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/12/05/ursnif-trojan-adopts-new-code-injection-technique/</loc>
		<lastmod>2017-12-05T03:49:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/12/05/us-says-doesnt-need-secret-courts-approval-ask-encryption-backdoors/</loc>
		<lastmod>2017-12-05T13:16:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/12/05/giant-botnet-behind-one-million-malware-attacks-month-just-got-shut/</loc>
		<lastmod>2017-12-05T15:48:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/12/06/virtual-keyboard-developer-leaked-31-million-client-records/</loc>
		<lastmod>2017-12-06T03:38:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/12/06/developers-targeted-parsedroid-poc-attack/</loc>
		<lastmod>2017-12-06T03:44:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/12/06/teamviewer-rushes-fix-permissions-bug/</loc>
		<lastmod>2017-12-06T13:48:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/12/07/malware-free-attacks-mount-big-breaches-crowdstrike-finds/</loc>
		<lastmod>2017-12-07T03:40:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/12/07/cloudflare-solutions-keylogger-thousands-infected-wordpress-sites/</loc>
		<lastmod>2017-12-07T03:55:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/12/07/digital-currency-exchange-nicehash-says-bitcoin-worth-nearly-64-million-hacked/</loc>
		<lastmod>2017-12-07T15:15:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/12/07/new-malware-evasion-technique-works-windows-versions/</loc>
		<lastmod>2017-12-07T15:25:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/12/08/man-middle-flaw-left-smartphone-banking-apps-vulnerable/</loc>
		<lastmod>2017-12-08T03:35:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/12/08/remotely-cracking-bluetooth-enabled-gun-safes/</loc>
		<lastmod>2017-12-08T03:48:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/12/08/protect-next-big-corporate-hack/</loc>
		<lastmod>2017-12-08T13:40:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/12/09/windows-10-uks-gchq-found-hack-windows-defender-pc/</loc>
		<lastmod>2017-12-09T02:44:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/12/09/strongpity2-spyware-replaces-finfisher-mitm-campaign-isp-involved/</loc>
		<lastmod>2017-12-09T16:04:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/12/09/keylogger-discovered-hp-notebook-keyboard-drivers/</loc>
		<lastmod>2017-12-09T17:02:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/12/09/downad-malware-using-dictionary-attack-control-servers-remotely-execute-code/</loc>
		<lastmod>2017-12-09T17:08:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/12/09/zero-day-ios-homekit-vulnerability-allowed-remote-access-smart-accessories-including-locks-fix-rolling/</loc>
		<lastmod>2017-12-09T17:13:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/12/11/amazon-launches-single-sign-service-aws-cloud/</loc>
		<lastmod>2017-12-11T03:50:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/12/11/moneytaker-in-pursuit-of-the-invisible/</loc>
		<lastmod>2017-12-11T18:07:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/12/11/new-android-vulnerability-allows-attackers-modify-apps-without-affecting-signatures/</loc>
		<lastmod>2017-12-11T18:16:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/12/12/banking-malware-google-play-targets-polish-banks/</loc>
		<lastmod>2017-12-12T03:43:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/12/12/vulnerability-found-two-keyless-entry-locks/</loc>
		<lastmod>2017-12-12T15:12:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/12/12/google-releases-tool-help-iphone-hackers/</loc>
		<lastmod>2017-12-12T15:17:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/12/13/1998-attack-messes-sites-secret-crypto-keys-back-big-way/</loc>
		<lastmod>2017-12-13T03:37:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/12/13/spider-new-thread-ransomware-web/</loc>
		<lastmod>2017-12-13T16:47:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/12/13/still-stealing/</loc>
		<lastmod>2017-12-13T17:14:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/12/14/suspicious-event-routes-traffic-big-name-sites-russia/</loc>
		<lastmod>2017-12-14T05:12:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/12/14/security-researcher-says-directv-hardware-can-easily-hacked/</loc>
		<lastmod>2017-12-14T15:29:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/12/15/harden-windows-applocker-based-case-study-part-1/</loc>
		<lastmod>2017-12-15T04:52:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/12/15/attackers-deploy-new-ics-attack-framework-triton-cause-operational-disruption-critical-infrastructure/</loc>
		<lastmod>2017-12-15T15:56:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/12/15/fcc-just-killed-net-neutrality-now/</loc>
		<lastmod>2017-12-15T16:26:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/12/16/five-programming-languages-flaws-expose-apps-attack/</loc>
		<lastmod>2017-12-16T04:42:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/12/16/anyone-can-steal-chrome-saved-passwords-form-fields-bookmarks-history/</loc>
		<lastmod>2017-12-16T14:47:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/12/18/face-palm-windows-10-bundled-password-manager-exposed-saved-passwords/</loc>
		<lastmod>2017-12-18T03:27:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/12/18/ssd-advisory-vbulletin-routestring-unauthenticated-remote-code-execution/</loc>
		<lastmod>2017-12-18T16:36:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/12/18/uk-firms-stockpile-bitcoin-pay-off-ransomware-hackers/</loc>
		<lastmod>2017-12-18T17:08:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/12/19/hackers-take-control-security-firms-domain-steal-secret-data/</loc>
		<lastmod>2017-12-19T03:51:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/12/19/android-malware-posing-porn-can-literally-make-phones-battery-explode/</loc>
		<lastmod>2017-12-19T13:47:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/12/20/lo-lo-lo-loapi-trojan-break-android/</loc>
		<lastmod>2017-12-20T05:16:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/12/20/facebook-disrupting-north-korean-hacking-operations/</loc>
		<lastmod>2017-12-20T15:33:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/12/21/five-arrested-spreading-ransomware-throughout-europe-us/</loc>
		<lastmod>2017-12-21T03:27:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/12/21/project-zero-chains-bugs-apacolypse-now-attack-windows-10/</loc>
		<lastmod>2017-12-21T13:44:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/12/21/chm-badness-delivers-banking-trojan/</loc>
		<lastmod>2017-12-21T14:05:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/12/22/windows-xp-atm-machine-hacked-simply-pressing-shift-five-times-row/</loc>
		<lastmod>2017-12-22T03:26:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/12/22/hate-apple-slowing-iphones-bad-batteries/</loc>
		<lastmod>2017-12-22T04:31:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/12/22/8-best-wifi-hacking-software-analysis-tools-use-2018/</loc>
		<lastmod>2019-08-06T01:41:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/12/23/us-capitals-surveillance-cam-network-allegedly-hijacked-romanian-ransomware-suspects/</loc>
		<lastmod>2017-12-23T03:52:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/12/23/facebook-phishers-want-connect-facebook/</loc>
		<lastmod>2017-12-23T04:55:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/12/23/huawei-router-vulnerability-used-spread-mirai-variant/</loc>
		<lastmod>2017-12-23T13:40:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/12/25/cve-2017-7344-fortinet-forticlient-windows-privilege-escalation-logon/</loc>
		<lastmod>2017-12-25T03:41:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/12/26/sednit-update-fancy-bear-spent-year/</loc>
		<lastmod>2017-12-26T03:26:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/12/26/badrabbit-ransomware-decided-avoid-one-antivirus-vendor/</loc>
		<lastmod>2017-12-26T13:34:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/12/27/wifi-repeater-probably-bench/</loc>
		<lastmod>2017-12-27T04:51:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/12/27/wildly-popular-christmas-game-got-mistaken-spyware/</loc>
		<lastmod>2017-12-27T15:05:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/12/28/hackers-can-rickroll-thousands-sonos-bose-speakers-internet/</loc>
		<lastmod>2017-12-28T04:12:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/12/28/russia-might-hacking-fbi-stealing-fingerprints-millions-says-report/</loc>
		<lastmod>2017-12-28T13:30:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/12/29/memory-leaks-happen-java-application/</loc>
		<lastmod>2017-12-29T03:40:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/12/29/tcp-bind-shell-assembly-arm-32-bit/</loc>
		<lastmod>2017-12-29T15:40:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/12/30/ospf-open-shortest-path-first-routing-protocol-stages/</loc>
		<lastmod>2017-12-30T05:16:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/12/30/atms-running-windows-xp-russia-hacked-pressing-shift-key-5-times/</loc>
		<lastmod>2017-12-30T13:21:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2017/12/30/liverpool-mexico-website-hijacks-visitor-computers-mobiles-mine-cryptocurrency/</loc>
		<lastmod>2018-01-17T01:32:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/01/02/process-doppelganging-giving-hard-time-av-vendors/</loc>
		<lastmod>2018-01-02T03:36:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/01/02/web-trackers-now-exploiting-password-managers-track-user-behavior/</loc>
		<lastmod>2018-01-02T13:28:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/01/02/vulnerability-phpmyadmin-lets-attacker-perform-drop-table-single-click/</loc>
		<lastmod>2018-01-02T15:42:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/01/03/starbucks-customer-computers-hacked-mine-bitcoin-public-wifi/</loc>
		<lastmod>2018-01-03T03:16:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/01/04/meltdown-spectre-vulnerabilities-bring-computing-apocalypse-yes-screwed/</loc>
		<lastmod>2018-01-04T03:52:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/01/04/google-apps-script-vulnerability-opened-door-malware/</loc>
		<lastmod>2018-01-04T15:14:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/01/04/privacy-location-tracking-device-owners-threatened-trackmageddon-flaws/</loc>
		<lastmod>2018-01-04T15:31:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/01/05/apple-confirms-iphone-mac-affected-meltdown-spectre-vulnerabilities/</loc>
		<lastmod>2018-01-05T04:27:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/01/05/hacking-western-digital-mycloud-nas-2/</loc>
		<lastmod>2018-01-05T13:32:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/01/05/windows-10-not-slowed-meltdown-spectre-patches/</loc>
		<lastmod>2018-01-05T15:33:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/01/06/zero-day-vulnerabilities-hijack-full-dell-emc-data-protection-suite/</loc>
		<lastmod>2018-01-06T04:21:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/01/06/coffeeminer-hacking-wifi-inject-cryptocurrency-miner-html-requests/</loc>
		<lastmod>2018-01-06T15:43:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/01/08/protect-home-router-attacks/</loc>
		<lastmod>2018-01-08T13:07:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/01/08/smartphones-security-enhancements-just-make-dangerous/</loc>
		<lastmod>2018-01-08T15:57:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/01/09/china-shuttered-128000-sites-2017-internet-crackdown/</loc>
		<lastmod>2018-01-09T04:07:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/01/09/developers-left-vulnerability-unpatched-months-alerted/</loc>
		<lastmod>2018-01-09T04:51:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/01/09/crackme0x02-dissected-radare2/</loc>
		<lastmod>2018-01-09T16:56:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/01/10/eset-research-appearances-deceiving-turlas-backdoor-laced-flash-player-installer/</loc>
		<lastmod>2018-01-10T03:39:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/01/10/oracle-app-server-hack-let-one-attacker-mine-226000-worth-cryptocoins/</loc>
		<lastmod>2018-01-10T04:34:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/01/10/wi-fi-alliance-announces-wpa3/</loc>
		<lastmod>2018-01-10T13:07:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/01/11/macos-high-sierra-flaw-unlocks-app-store-system-preferences-password-fixed-latest-beta/</loc>
		<lastmod>2018-01-11T15:00:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/01/11/prosecutors-say-mac-spyware-stole-millions-user-images-13-years/</loc>
		<lastmod>2018-01-11T15:24:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/01/12/hackers-can-save-lives/</loc>
		<lastmod>2018-01-12T03:37:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/01/12/emc-vmware-security-bugs-throw-gasoline-cloud-security-fire/</loc>
		<lastmod>2018-01-12T15:37:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/01/12/new-intel-security-vulnerability-discovered-millions-laptops-affected/</loc>
		<lastmod>2018-01-12T16:10:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/01/13/analyzing-new-macos-dns-hijacker-osx-mami/</loc>
		<lastmod>2018-01-13T04:10:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/01/13/fourth-fappening-hacker-pleads-guilty-breaking-celebrities-accounts/</loc>
		<lastmod>2018-01-13T14:38:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/01/15/security-researchers-flag-invite-bug-whatsapp-group-chats/</loc>
		<lastmod>2018-01-15T03:45:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/01/15/fake-spectre-meltdown-patch-pushes-smoke-loader-malware/</loc>
		<lastmod>2018-01-15T15:10:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/01/15/crack-wpa-wpa2-wi-fi-routers-aircrack-ng-hashcat/</loc>
		<lastmod>2018-01-15T15:28:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/01/16/hacking-facebook-accounts-using-csrf-oculus-facebook-integration/</loc>
		<lastmod>2018-01-16T03:31:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/01/16/oneplus-checkout-hacked-dangers-site-payment-processing/</loc>
		<lastmod>2018-01-16T04:27:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/01/16/bittorrent-users-beware-flaw-lets-hackers-control-computer/</loc>
		<lastmod>2018-01-16T14:48:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/01/16/canadian-police-charge-operator-hacked-password-service-leakedsource-com/</loc>
		<lastmod>2018-01-16T15:14:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/01/17/google-chrome-extensions-500000-downloads-found-malicious/</loc>
		<lastmod>2018-01-17T03:29:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/01/17/skygofree-following-footsteps-hackingteam/</loc>
		<lastmod>2018-01-17T04:44:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/01/17/hacking-fx-cp400-part-1-getting-firmware/</loc>
		<lastmod>2018-01-17T16:13:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/01/17/heads-unusual-ransomware-strain-encrypts-cloud-email-real-time-video/</loc>
		<lastmod>2018-01-17T16:21:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/01/18/microsoft-office-vulnerabilities-used-distribute-zyklon-malware-recent-campaign/</loc>
		<lastmod>2018-01-18T03:48:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/01/18/windows-10-meltdown-spectre-patch-new-updates-bring-fix-unbootable-amd-pcs/</loc>
		<lastmod>2018-01-18T15:51:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/01/18/android-malware-wants-steal-facebook-login-bombard-ads/</loc>
		<lastmod>2018-01-18T15:55:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/01/19/new-chrome-firefox-extensions-block-removal-hijack-browsers/</loc>
		<lastmod>2018-01-19T03:53:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/01/19/new-year-new-look-dridex-via-compromised-ftp/</loc>
		<lastmod>2018-01-19T15:48:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/01/20/oneplus-confirms-hack-exposed-credit-cards-phone-buyers/</loc>
		<lastmod>2018-01-20T03:27:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/01/20/cloudflair-bypassing-cloudflare-using-internet-wide-scan-data/</loc>
		<lastmod>2018-01-20T03:56:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/01/22/uber-ignores-security-bug-makes-two-factor-authentication-useless/</loc>
		<lastmod>2018-01-22T03:34:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/01/22/hacker-jailed-ddos-attacks-skype-google/</loc>
		<lastmod>2018-01-22T15:15:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/01/23/dutch-government-switches-super-secure-dumb-phone-prevent-hacks/</loc>
		<lastmod>2018-01-23T03:39:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/01/23/pentesters-portable-cracking-rig/</loc>
		<lastmod>2018-01-23T03:45:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/01/24/heres-epidemic-malicious-ads-grew-much-worse-last-year/</loc>
		<lastmod>2018-01-24T03:36:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/01/24/severe-electron-framework-vulnerability-impacts-apps-like-skype-slack/</loc>
		<lastmod>2018-01-24T15:48:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/01/24/piece-dna-contained-key-1-bitcoin-guy-cracked-code/</loc>
		<lastmod>2018-01-24T16:01:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/01/25/silver-bullet-attacker/</loc>
		<lastmod>2018-01-25T03:57:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/01/25/%e2%80%8blinux-intel-slowly-hack-way-spectre-patch/</loc>
		<lastmod>2018-01-25T04:44:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/01/27/now-even-youtube-serves-ads-cpu-draining-cryptocurrency-miners/</loc>
		<lastmod>2018-01-27T03:00:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/01/27/analyzing-crossrat/</loc>
		<lastmod>2018-01-27T03:11:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/01/27/hack-turned-off-computer-running-unsigned-code-intel/</loc>
		<lastmod>2018-01-27T15:43:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/01/27/coincheck-cryptocurrency-exchange-hacked-534-million-stolen/</loc>
		<lastmod>2018-01-27T15:48:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/01/29/keylogger-campaign-returns-infecting-2000-wordpress-sites/</loc>
		<lastmod>2018-01-29T04:50:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/01/29/new-variant-ploutus-atm-malware-observed-wild-latin-america/</loc>
		<lastmod>2018-01-29T16:02:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/01/29/fitness-tracking-app-strava-gives-away-location-secret-us-army-bases/</loc>
		<lastmod>2018-01-29T16:14:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/01/30/lenovo-fixes-hardcoded-password-flaw-impacting-thinkpad-fingerprint-scanners/</loc>
		<lastmod>2018-01-30T03:55:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/01/30/double-dipping-diverting-ransomware-bitcoin-payments-via-onion-domains/</loc>
		<lastmod>2018-01-30T15:54:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/01/31/gandcrab-ransomware-distributed-rig-grandsoft-exploit-kits/</loc>
		<lastmod>2018-01-31T03:33:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/01/31/cisco-patches-critical-vpn-vulnerability/</loc>
		<lastmod>2018-01-31T15:17:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/01/31/pe-sieve-small-tool-investigating-inline-hooks/</loc>
		<lastmod>2018-01-31T15:59:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/01/firefox-58-0-1-mozilla-releases-fix-critical-html-hijack-flaw/</loc>
		<lastmod>2018-02-01T03:40:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/01/windows-10-update-microsofts-latest-bug-fixes-include-amd-reboot-patches/</loc>
		<lastmod>2018-02-01T15:58:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/02/adobe-flash-player-zero-day-spotted-wild/</loc>
		<lastmod>2018-02-02T07:19:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/02/bug-ios-11-3-beta-1-refuses-connect-secure-wi-fi-network/</loc>
		<lastmod>2018-02-02T16:36:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/03/new-tool-automatically-finds-hacks-vulnerable-internet-connected-devices/</loc>
		<lastmod>2018-02-03T03:47:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/03/internet-dildos-long-way-vibrant-future-iot-iod/</loc>
		<lastmod>2018-02-03T05:05:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/03/lizard-squad-alive-continuing-activities-bigbotpein-report/</loc>
		<lastmod>2018-02-03T15:10:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/05/apple-offers-free-repairs-iphone-7-devices-refuse-connect-cellular-service/</loc>
		<lastmod>2018-02-05T02:35:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/05/lauri-love-accused-hacking-fbi-federal-reserve-british-court-rules-will-not-extradited-us/</loc>
		<lastmod>2018-02-05T15:14:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/06/two-men-charged-jackpotting-scheme-drains-atms-minutes/</loc>
		<lastmod>2018-02-06T03:47:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/06/authorities-shut-luminosity-rat-used-buyers-78-countries/</loc>
		<lastmod>2018-02-06T16:56:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/07/leaked-nsa-exploits-can-now-hack-windows-version/</loc>
		<lastmod>2018-02-07T03:41:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/07/cisco-issues-new-patches-critical-firewall-software-vulnerability/</loc>
		<lastmod>2018-02-07T04:29:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/07/flaw-hotspot-shield-can-expose-vpn-users-locations/</loc>
		<lastmod>2018-02-07T15:28:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/08/uk-led-police-operation-quashes-luminosity-link-rat/</loc>
		<lastmod>2018-02-08T04:00:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/08/android-malware-problem-google-removed-700000-malicious-apps-play-store-2017/</loc>
		<lastmod>2018-02-08T13:08:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/08/security-breach-affects-300-000-micros-pos-oracle-systems/</loc>
		<lastmod>2018-02-08T13:57:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/09/cryptocurrency-mining-will-challenging-new-google-chrome/</loc>
		<lastmod>2018-02-09T02:59:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/09/google-rewards-2-9-million-dollars-bug-bounty-2017/</loc>
		<lastmod>2018-02-09T03:01:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/09/beware-sites-update-flash-use-cpu-mine-cryptocurrencies/</loc>
		<lastmod>2018-02-09T15:24:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/09/act-face-cyberbullying/</loc>
		<lastmod>2018-02-09T16:05:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/10/zerodium-offers-45000-linux-zero-day-vulnerabilities/</loc>
		<lastmod>2018-02-10T13:10:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/10/targeted-attacks-middle-east/</loc>
		<lastmod>2018-02-10T13:12:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/12/hackers-hijack-government-websites-mine-crypto-cash/</loc>
		<lastmod>2018-02-12T04:08:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/12/hospital-hit-cryptocurrency-mining-malware/</loc>
		<lastmod>2018-02-12T15:06:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/12/isolating-pc-internet-useless-hackers/</loc>
		<lastmod>2018-02-12T15:19:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/13/olympic-destroyer-malware-behind-winter-olympics-cyberattack-researchers-say/</loc>
		<lastmod>2018-02-13T03:22:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/13/public-clouds-like-dropbox-onedrive-google-drive-not-protect-data-properly-malware/</loc>
		<lastmod>2018-02-13T03:36:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/13/kali-linux-2018-1-now-available-know-whats-new-version/</loc>
		<lastmod>2018-02-13T04:34:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/14/critical-telegram-flaw-attack-disguised-malware-benign-images/</loc>
		<lastmod>2018-02-14T03:33:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/14/microsoft-will-eliminate-use-passwords-windows-10/</loc>
		<lastmod>2018-02-14T03:53:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/15/oneplus-confirms-attack-payments-page/</loc>
		<lastmod>2018-02-15T03:33:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/15/lizard-squad-still-active-now-also-acts-another-name-bigbotpein/</loc>
		<lastmod>2018-02-15T03:43:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/15/vulnerability-skype-allows-obtain-privileges-system-level/</loc>
		<lastmod>2018-02-15T04:39:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/15/hack-computer-using-thefatrat-beef/</loc>
		<lastmod>2018-02-15T05:04:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/16/hackers-find-new-way-attack-computers-without-using-macros-word/</loc>
		<lastmod>2018-02-16T03:30:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/16/attacks-windows-pxe-boot-images/</loc>
		<lastmod>2018-02-16T03:36:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/16/google-launches-ad-blocker-chrome/</loc>
		<lastmod>2018-02-16T04:09:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/16/crossrat-trojan-built-java-infects-windows-macos-linux-solaris/</loc>
		<lastmod>2018-02-16T04:51:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/17/onavo-free-vpn-facebook-uses-spy/</loc>
		<lastmod>2018-02-17T02:27:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/17/raw-sockets-backdoor-gives-attackers-complete-control-linux-servers/</loc>
		<lastmod>2018-02-17T02:40:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/19/reelphish-tool-social-engineering-two-factor-authentication/</loc>
		<lastmod>2018-02-19T03:33:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/19/hack-using-parat-remote-access-trojan-rat/</loc>
		<lastmod>2018-02-19T03:36:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/19/hacker-erase-1-terabyte-data-spyware-developers-server/</loc>
		<lastmod>2018-02-19T15:53:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/19/intercept-mobile-communications-calls-messages-easily-without-hacking/</loc>
		<lastmod>2021-07-05T10:09:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/20/119000-fedex-users-passports-security-id-driving-licenses-exposed/</loc>
		<lastmod>2018-02-20T15:37:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/20/pcapxray/</loc>
		<lastmod>2018-02-20T15:46:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/20/hackers-made-3-4-million-by-installing-miners-on-jenkins-servers/</loc>
		<lastmod>2018-02-20T15:56:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/21/tesla-cloud-resources-hacked-run-cryptocurrency-mining-malware/</loc>
		<lastmod>2018-02-21T03:22:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/21/year-old-coldroot-rat-targets-macos-still-evades-detection/</loc>
		<lastmod>2018-02-21T03:53:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/21/ransomware-discovered-user-can-distribute-free/</loc>
		<lastmod>2018-02-21T16:04:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/21/another-crime-using-swift-time-indian-bank/</loc>
		<lastmod>2018-02-21T16:15:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/21/crowbar-tool-perform-brute-force-attacks-different-services/</loc>
		<lastmod>2018-02-22T03:27:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/22/lockcrypt-ransomware-arrives-remote-desktop/</loc>
		<lastmod>2018-02-22T03:26:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/22/single-null-character-hide-malware-windows-10-antivirus/</loc>
		<lastmod>2018-02-22T03:32:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/22/what-is-tunna-and-how-does-it-work/</loc>
		<lastmod>2018-02-22T03:54:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/22/utorrent-bugs-let-websites-control-computer-steal-downloads/</loc>
		<lastmod>2018-02-22T04:49:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/23/one-stop-counterfeit-certificate-shops-malware-signing-needs/</loc>
		<lastmod>2018-02-23T03:27:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/23/cryptojacking-attack-found-los-angeles-times-website/</loc>
		<lastmod>2018-02-23T04:05:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/23/facebook-will-verify-location-buyers-us-election-announcements/</loc>
		<lastmod>2018-02-23T15:52:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/23/dr-mine-tool-allows-us-know-web-mining-cryptocurrency/</loc>
		<lastmod>2018-02-23T16:02:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/23/simple-dnscrypt-tool-encrypt-dns-traffic-windows-protect-privacy/</loc>
		<lastmod>2018-02-23T16:20:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/23/madlira-tool-android-malware-detection/</loc>
		<lastmod>2018-02-23T16:27:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/23/hackers-spread-android-spyware-facebook-using-fake-profiles/</loc>
		<lastmod>2018-02-23T16:35:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/24/cybersecurity-framework-iso-27001/</loc>
		<lastmod>2018-02-24T02:05:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/24/drupal-patches-critical-bug-leaves-platform-open-xss-attack/</loc>
		<lastmod>2018-02-24T03:09:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/24/ransomware-hits-colorado-department-transportation/</loc>
		<lastmod>2018-02-24T03:11:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/24/10000-pnb-credit-debit-card-customers-hit-data-breach/</loc>
		<lastmod>2018-02-24T12:37:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/26/happened-us-moved-chip-embedded-payment-cards/</loc>
		<lastmod>2018-02-26T03:11:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/26/boon-privacy-android-p-will-prevent-idle-background-apps-accessing-camera/</loc>
		<lastmod>2018-02-26T15:34:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/27/open-bug-bounty-announce-100k-fixed-vulnerabilities/</loc>
		<lastmod>2018-02-27T02:53:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/27/protect-office-365-data-ransomware/</loc>
		<lastmod>2018-02-27T02:56:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/27/hack-active-directory-icebreaker/</loc>
		<lastmod>2018-02-27T02:58:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/28/new-adware-shows-advertising-uses-pc-mine-cryptocurrencies/</loc>
		<lastmod>2018-02-28T02:58:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/28/vulnerability-found-single-sign-products/</loc>
		<lastmod>2018-02-28T03:00:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/28/iot-hack-break-smart-home/</loc>
		<lastmod>2018-02-28T03:18:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/02/28/facebook-business-pages-administrator-data-exposed-vulnerability/</loc>
		<lastmod>2018-02-28T03:20:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/01/re-dressing-instagram-leaking-application-tokens-via-instagram-clickjacking-vulnerability/</loc>
		<lastmod>2018-03-01T03:48:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/01/malware-everything-need-know-viruses-trojans-malicious-software/</loc>
		<lastmod>2018-03-01T03:58:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/01/memcached-servers-can-used-perform-ddos-attacks/</loc>
		<lastmod>2018-03-01T04:01:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/02/vmware-exploitation-uninitialized-buffers/</loc>
		<lastmod>2018-03-02T04:15:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/02/personal-data-21000-us-marine-force-reserve-personnel-leaked/</loc>
		<lastmod>2018-03-02T04:11:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/02/aws-bucket-exposes-50-4-gb-financial-giants-data/</loc>
		<lastmod>2018-03-02T04:13:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/03/equifax-hack-just-got-worse-lot-americans/</loc>
		<lastmod>2018-03-03T03:32:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/03/new-spectre-attack-can-pry-data-intels-sgx/</loc>
		<lastmod>2018-03-03T03:35:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/03/biggest-ddos-attack-ever-hits-github-website/</loc>
		<lastmod>2018-03-03T03:38:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/03/hijacker-v1-3-wi-fi-cracking-tools-android/</loc>
		<lastmod>2018-03-03T03:45:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/05/ethereum-fixes-serious-eclipse-flaw-exploited-kid/</loc>
		<lastmod>2018-03-05T03:48:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/05/exploiting-custom-template-engines/</loc>
		<lastmod>2018-03-05T04:00:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/06/lte-security-flaws-used-spying-spreading-chaos/</loc>
		<lastmod>2018-03-06T03:44:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/06/20000-private-web-certificate-keys-exposed-business-tiff/</loc>
		<lastmod>2018-03-06T03:47:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/06/applebees-restaurants-suffered-payment-card-breach/</loc>
		<lastmod>2018-03-06T03:50:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/06/vulnerability-pivotals-spring-data-rest-allows-hacking-machine-built-components/</loc>
		<lastmod>2018-03-06T04:18:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/07/400k-servers-may-risk-serious-code-execution-attacks-patch-now/</loc>
		<lastmod>2018-03-07T03:38:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/07/sgxspectre-exploits-recent-intel-cpu-flaw-leaks-enclave-secrets/</loc>
		<lastmod>2018-03-07T03:42:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/07/hackers-bypassed-adobe-flash-protection-mechanism/</loc>
		<lastmod>2018-03-07T13:08:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/07/kaspersky-lab-now-offers-100000-vulnerabilities/</loc>
		<lastmod>2018-03-07T17:10:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/07/new-ddos-attack-record-reaches-1-7-tbps/</loc>
		<lastmod>2018-03-07T17:11:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/07/new-attacks-4g-lte-network/</loc>
		<lastmod>2018-03-07T17:12:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/08/hackers-infect-windows-pc-even-locked-thanks-cortana/</loc>
		<lastmod>2018-03-08T03:42:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/08/nike-website-vulnerability-exposed-sensitive-server-data/</loc>
		<lastmod>2018-03-08T03:45:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/08/data-leak-facebooks-ad-software/</loc>
		<lastmod>2018-03-08T03:48:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/09/lame-google-play-apps-attack-users-windows-malware-still-thing/</loc>
		<lastmod>2018-03-09T01:31:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/09/state-mac-malware/</loc>
		<lastmod>2018-03-09T01:36:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/09/data-breach-fresno-15000-affected/</loc>
		<lastmod>2018-03-09T16:20:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/09/stop-memcached-ddos-attacks/</loc>
		<lastmod>2018-03-09T16:22:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/09/gozi-trojan-becomes-dark-cloud-botnet/</loc>
		<lastmod>2018-03-09T16:25:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/09/kali-linux-microsoft-store-use-windows-10/</loc>
		<lastmod>2018-03-09T16:27:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/10/apache-solr-bug-hit-cryptomining-attack/</loc>
		<lastmod>2018-03-10T02:59:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/10/amazon-google-playstation-suffered-ddos-attacks/</loc>
		<lastmod>2018-03-10T03:01:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/10/hackers-sell-apple-id-dark-web-15-usd/</loc>
		<lastmod>2018-03-10T03:03:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/10/ransomware-robots-next-security-threat/</loc>
		<lastmod>2018-03-10T03:08:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/13/vulnerability-reporting-delays-china/</loc>
		<lastmod>2018-03-13T03:10:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/13/dumb-domain-bruteforce-tool-bruteforce-domains/</loc>
		<lastmod>2018-03-13T03:13:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/13/increase-healthcare-attacks-cryptocurrency-mining/</loc>
		<lastmod>2018-03-13T03:15:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/13/binance-pays-250k-bounty-expose-hackers/</loc>
		<lastmod>2018-03-13T03:27:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/14/data-breach-n-y-hospital-135k-patients-affected/</loc>
		<lastmod>2018-03-14T03:22:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/14/dark-web-entire-identity-sale/</loc>
		<lastmod>2018-03-14T03:28:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/14/airline-websites-dont-care-privacy/</loc>
		<lastmod>2018-03-14T03:32:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/14/rop-tool-v2-4-1-tool-help-writing-binary-exploits/</loc>
		<lastmod>2018-03-14T03:37:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/15/amd-processors-critical-security-vilnerabilities/</loc>
		<lastmod>2018-03-15T03:31:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/15/hackers-steal-data-uk-police-server/</loc>
		<lastmod>2018-03-15T03:32:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/15/uk-govt-contractor-hit-apt15-hackers/</loc>
		<lastmod>2018-03-15T03:35:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/15/hackers-steal-data-air-gapped-pcs-microphones-speakers/</loc>
		<lastmod>2018-03-15T03:38:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/16/wechat-list-chinese-technology-banned-security-worries/</loc>
		<lastmod>2018-03-16T03:25:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/16/intel-microcode-patches-now-microsoft-update-catalog/</loc>
		<lastmod>2018-03-16T03:28:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/16/apac-information-security-chiefs-expect-critical-attack/</loc>
		<lastmod>2018-03-16T03:33:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/16/android-settings-users-change-right-now/</loc>
		<lastmod>2018-03-16T03:36:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/17/walmart-partner-exposes-data-millions-customers/</loc>
		<lastmod>2018-03-17T02:37:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/17/sap-crm-servers-vulnerable-online-attacks/</loc>
		<lastmod>2018-03-17T02:39:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/17/vpn-hotspot-shield-purevpn-zenmate-revealing-real-ip-addresses/</loc>
		<lastmod>2018-03-17T02:47:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/17/pre-installed-malware-found-android-devices/</loc>
		<lastmod>2018-03-17T02:54:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/20/15000-graykey-promises-crack-iphone-passcodes-police/</loc>
		<lastmod>2018-03-20T03:26:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/20/top-five-ways-gained-access-corporate-wireless-network-lo0tbo0ty-karma-edition/</loc>
		<lastmod>2018-03-20T03:34:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/20/deep-dive-database-attacks-part-ii-delivery-execution-malicious-executables-sql-commands-sql-server/</loc>
		<lastmod>2018-03-20T16:37:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/21/microsoft-bug-bounty-program-offering-250k-meltdown-spectre-vulnerabilities/</loc>
		<lastmod>2018-03-21T03:26:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/21/twitter-ban-crypto-related-ads/</loc>
		<lastmod>2018-03-21T03:29:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/21/facebook-free-fall-now-worth-50000-m-less/</loc>
		<lastmod>2018-03-21T03:32:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/21/plugins-text-editors-help-hackers-gain-elevated-privileges/</loc>
		<lastmod>2018-03-21T03:35:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/21/self-driving-uber-kills-woman-arizona/</loc>
		<lastmod>2018-03-21T03:45:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/22/hackers-steal-banking-personal-data-800000-orbitz-customers/</loc>
		<lastmod>2018-03-22T03:32:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/22/amd-will-roll-patches-recently-discovered-vulnerabilities/</loc>
		<lastmod>2018-03-22T03:34:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/22/puerto-rico-power-utility-hacked/</loc>
		<lastmod>2018-03-22T03:36:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/22/windows-remote-assistance-exploit-allows-hackers-steal-files/</loc>
		<lastmod>2018-03-22T03:38:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/23/atlanta-city-government-systems-due-ransomware-attack-updated/</loc>
		<lastmod>2018-03-23T04:02:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/23/cryptocurrency-miner-distributed-via-php-weathermap-vulnerability-targets-linux-servers/</loc>
		<lastmod>2018-03-23T04:08:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/24/netflix-launches-bug-bounty-program/</loc>
		<lastmod>2018-03-24T02:08:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/24/mongodb-hacked-13-seconds/</loc>
		<lastmod>2018-03-24T02:10:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/24/hackers-exploit-old-vulnerability-mine-cryptocurrencies-linux-servers/</loc>
		<lastmod>2018-03-24T02:12:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/24/atlanta-computer-systems-possible-ransomware-attack/</loc>
		<lastmod>2018-03-24T02:14:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/26/nine-iranians-indicted-us-hacking-steal-research-data/</loc>
		<lastmod>2018-03-26T03:38:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/26/dnc-lone-hacker-guccifer-2-0-pegged-russian-spy-opsec-fail/</loc>
		<lastmod>2018-03-26T03:42:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/26/facebook-scraped-call-text-message-data-years-android-phones-updated/</loc>
		<lastmod>2018-03-26T03:55:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/27/trickbot-banking-malware-new-trick/</loc>
		<lastmod>2018-03-27T03:08:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/27/internet-engineering-task-force-announced-approval-tls-1-3/</loc>
		<lastmod>2018-03-27T03:11:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/27/powershell-rat-backdoor-uses-gmail-exfiltrate-data/</loc>
		<lastmod>2018-03-27T04:15:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/27/can-limit-facebooks-data-collection/</loc>
		<lastmod>2018-03-27T04:29:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/28/openssl-updates-2018-patch-three-vulnerabilities/</loc>
		<lastmod>2018-03-28T02:30:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/28/sanny-info-stealer-campaign-targets-government-agencies-malware/</loc>
		<lastmod>2018-03-28T02:33:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/28/android-malware-qr-reader-apps-play-store/</loc>
		<lastmod>2018-03-28T02:53:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/29/northern-irish-parliament-hit-brute-force-attack/</loc>
		<lastmod>2018-03-29T03:00:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/29/cbm-bicho-hardware-backdoor-can-bus/</loc>
		<lastmod>2018-03-29T03:13:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/29/windows-7-meltdown-patch-opens-vulnerability/</loc>
		<lastmod>2018-03-29T03:20:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/29/hackers-spread-malware-youtube-comment-section/</loc>
		<lastmod>2018-03-29T03:24:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/30/update-drupal-asap-million-sites-can-easily-hacked-visitor/</loc>
		<lastmod>2018-03-30T04:01:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/30/20-suspect-hackers-arrested-online-banking-fraud/</loc>
		<lastmod>2018-03-30T05:02:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/31/boeing-possibly-hit-wannacry-company-plays-cyberattack/</loc>
		<lastmod>2018-03-31T15:07:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/03/31/russian-accused-massive-u-s-hacking-extradited-pleads-not-guilty/</loc>
		<lastmod>2018-03-31T15:26:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/02/explosive-facebook-memo-leaks-top-exec-defended-growth-even-people-get-killed/</loc>
		<lastmod>2018-04-02T03:14:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/03/lord-taylor-saks-data-breach-5-million-cards-probably-sale-dark-web/</loc>
		<lastmod>2018-04-03T03:07:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/03/invoke-dosfuscation-v1-0/</loc>
		<lastmod>2018-04-03T03:13:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/03/ios-camera-qr-code-expose-users/</loc>
		<lastmod>2018-04-03T03:19:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/03/state-usb-data-protection/</loc>
		<lastmod>2018-04-03T03:34:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/04/georgia-senate-passes-bill-penalizes-unauthorized-pen-tests/</loc>
		<lastmod>2018-04-04T03:00:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/04/taipan-web-application-security-scanner/</loc>
		<lastmod>2018-04-04T03:13:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/04/fauxpersky-spyware-impersonates-kaspersky-av/</loc>
		<lastmod>2018-04-04T03:20:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/04/njrat-upgraded-push-lime-ransomware-bitcoin-wallet-stealer/</loc>
		<lastmod>2018-04-04T04:00:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/05/panera-accused-security-researcher-scam-reported-major-flaw/</loc>
		<lastmod>2018-04-05T03:32:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/05/whatsapp-public-groups-can-leave-user-data-vulnerable-scraping/</loc>
		<lastmod>2018-04-05T03:39:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/06/user-hiv-location-data-shared-third-parties-gay-dating-app-grindr/</loc>
		<lastmod>2018-04-06T02:29:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/06/load-intel-cpus-spectre-v2-flaw-cant-fixed/</loc>
		<lastmod>2018-04-06T02:47:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/06/1000-magento-stores-hit-cryptominer-credential-stealing-malware/</loc>
		<lastmod>2018-04-06T03:05:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/06/investigators-hijack-2000-subdomains-cloudfront-experiment/</loc>
		<lastmod>2018-04-06T03:08:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/07/government-websites-go-offline-possible-mass-cyber-attack-aimed-india/</loc>
		<lastmod>2018-04-07T01:48:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/07/defiance-securing-connected-hospitals/</loc>
		<lastmod>2018-04-07T01:51:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/07/2-billion-users-facebook-assume-data-compromised-zuckerberg/</loc>
		<lastmod>2018-04-07T01:57:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/07/sears-delta-air-lines-customer-data-exposed/</loc>
		<lastmod>2018-04-07T02:00:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/09/keep-isps-nose-browser-history-encrypted-dns/</loc>
		<lastmod>2018-04-09T04:29:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/09/happened-internet-attack-cisco-switches/</loc>
		<lastmod>2018-04-09T13:41:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/10/macos-malware-hit-devices-malicious-macros/</loc>
		<lastmod>2018-04-10T02:43:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/10/aol-advertising-platform-compromised-mine-cryptocurrency/</loc>
		<lastmod>2018-04-10T02:46:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/10/atmjackpot-malware-steal-cash-atms/</loc>
		<lastmod>2018-04-10T02:52:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/11/fake-software-update-carries-users-get-hit-malware/</loc>
		<lastmod>2018-04-11T03:46:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/11/facebooks-way-access-hospital-patient-records/</loc>
		<lastmod>2018-04-11T03:51:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/11/wi-fi-cracking-2/</loc>
		<lastmod>2018-04-11T03:54:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/12/windows-server-events-monitor/</loc>
		<lastmod>2018-04-12T03:02:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/12/vulnerability-outlook-let-hackers-steal-password-hashes/</loc>
		<lastmod>2018-04-12T03:05:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/12/vevos-channel-hacked-youtube-safe-sound/</loc>
		<lastmod>2018-04-12T03:09:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/12/hackers-take-control-emergency-alert-sirens-sirenjack-attack/</loc>
		<lastmod>2018-04-12T03:14:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/13/web-app-security/</loc>
		<lastmod>2018-04-13T03:28:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/13/facebook-password-recovery-software/</loc>
		<lastmod>2018-04-13T03:39:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/13/url-file-attacks-distribute-quant-loader/</loc>
		<lastmod>2018-04-13T03:42:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/13/two-cyber-security-menaces-protect/</loc>
		<lastmod>2018-04-13T03:45:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/13/forensics-report-wordpress-hacked-site/</loc>
		<lastmod>2018-04-13T03:49:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/14/tracing-ransomware-end-end/</loc>
		<lastmod>2018-04-14T02:47:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/14/facebook-reducing-call-history-sms-data-collection-android/</loc>
		<lastmod>2018-04-14T02:56:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/14/jshielder-automated-hardening-script-linux-servers/</loc>
		<lastmod>2018-04-14T03:05:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/16/privacy-not-sale-telegram-founder-says-banned-russia/</loc>
		<lastmod>2018-04-16T03:23:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/16/android-phone-toxic-hellstew-vulnerabilities-theres-app-help-find/</loc>
		<lastmod>2018-04-16T13:18:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/17/vulnerability-intel-spi-allows-attackers-erase-modify-bios-uefi/</loc>
		<lastmod>2018-04-17T02:55:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/17/new-early-bird-code-injection-technique/</loc>
		<lastmod>2018-04-17T03:01:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/17/vulnerability-drupal-cms-used-cryptomining/</loc>
		<lastmod>2018-04-17T03:24:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/17/website-security-firm-sucuri-hit-ddos-attacks/</loc>
		<lastmod>2018-04-17T03:52:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/18/hackers-now-using-botnets-take-hard-work-breaking-networks/</loc>
		<lastmod>2018-04-18T02:59:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/18/russia-bans-1-8-million-amazon-google-ips-attempt-block-telegram/</loc>
		<lastmod>2018-04-18T03:10:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/18/20-million-chrome-users-installed-fake-malicious-ad-blockers/</loc>
		<lastmod>2018-04-18T03:13:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/18/microsoft-new-custom-chip-linux-distro-secure-iot-devices/</loc>
		<lastmod>2018-04-18T03:16:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/19/now-hyperledger-bug-bounty-public-program/</loc>
		<lastmod>2018-04-19T03:01:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/19/biggest-tech-companies-together-fight-attacks/</loc>
		<lastmod>2018-04-19T03:25:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/19/stresspaint-malware-steals-facebook-credentials-session-cookies/</loc>
		<lastmod>2018-04-19T03:35:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/19/xiaoba-ransomware-retooled-coinminer-wreck-files/</loc>
		<lastmod>2018-04-19T03:44:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/20/ways-hackers-make-money-whit-stolen-data/</loc>
		<lastmod>2018-04-20T03:01:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/20/several-pentesting-tools-techniques-used-information-security-experts/</loc>
		<lastmod>2018-04-20T03:05:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/20/password-cracker-know/</loc>
		<lastmod>2018-04-20T03:13:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/21/hackers-hack-cisco-webex-malicious-flash-file/</loc>
		<lastmod>2018-04-21T03:52:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/21/bug-linkedin-allowed-data-stolen/</loc>
		<lastmod>2018-04-21T03:56:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/21/ransomware-service-platforms-available-dark-web/</loc>
		<lastmod>2018-04-21T03:59:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/21/powershell-automate-active-directory-audit/</loc>
		<lastmod>2018-04-21T04:26:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/23/roaming-mantis-uses-dns-hijacking-infect-android-smartphones/</loc>
		<lastmod>2018-04-23T01:49:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/23/drupalgeddon2-touches-off-arms-race-mass-exploit-powerful-web-servers/</loc>
		<lastmod>2018-04-23T01:56:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/24/different-ways-subdomain-enumeration/</loc>
		<lastmod>2018-04-24T06:58:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/24/hack-kernal-tool-xuetr-pchunter/</loc>
		<lastmod>2018-04-24T07:19:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/24/hack-various-devices-rf-software/</loc>
		<lastmod>2018-04-24T07:28:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/25/proper-use-sudo-linux-privilege-escalation/</loc>
		<lastmod>2018-04-25T20:33:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/25/vulnerabilities-exploited-third-party-trackers-abuse-facebook-login/</loc>
		<lastmod>2018-04-25T03:20:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/25/use-weak-nfs-permissions-escalate-linux-privileges/</loc>
		<lastmod>2018-04-25T20:39:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/26/nintendo-switch-hacked-exploit-cant-fixed/</loc>
		<lastmod>2018-04-26T03:12:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/26/find-vulnerabilities-active-directory-settings/</loc>
		<lastmod>2018-04-26T03:16:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/26/trustjacking-attack-allows-hackers-hack-ios-devices/</loc>
		<lastmod>2018-04-26T03:19:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/27/cloud-ex2-device-western-digital-leaks-files-default/</loc>
		<lastmod>2018-04-27T03:04:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/27/hackers-exploit-vulnerabilities-key-system-hack-hotel-locks/</loc>
		<lastmod>2018-04-27T03:08:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/27/hack-wireless-network-using-one-tool-hijacker/</loc>
		<lastmod>2018-04-27T03:15:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/28/150000-drupal-websites-got-hacked-new-vulnerability/</loc>
		<lastmod>2018-04-28T02:45:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/28/offensive-penetration-testing-kali/</loc>
		<lastmod>2018-04-28T02:54:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/28/sale-buy-rubella-hacking-kit-dark-web/</loc>
		<lastmod>2018-04-28T03:14:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/04/30/turning-echo-spy-device-took-clever-coding/</loc>
		<lastmod>2018-04-30T03:20:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/01/90-sap-implementations-vulnerable-new-sap-vulnerability/</loc>
		<lastmod>2018-05-01T01:58:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/01/hack-google-inbox-new-spoofing-vulnerability/</loc>
		<lastmod>2018-05-01T02:07:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/01/vulnerability-can-remotly-hack-volkswagen-audi-cars/</loc>
		<lastmod>2018-05-01T02:10:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/01/3-mexican-banks-along-banxico-bancomext-cyber-attack/</loc>
		<lastmod>2018-05-01T02:16:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/02/github-says-bug-exposed-plaintext-passwords/</loc>
		<lastmod>2018-05-02T03:04:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/02/facexworm-fools-facebook-users-steals-cryptocurrency-login-credentials/</loc>
		<lastmod>2018-05-02T03:29:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/03/apt28-hack-lojack-software-antivirus-cannot-detect/</loc>
		<lastmod>2018-05-03T02:14:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/03/data-breach-25000-users-cryptocurrency-platform-bezop/</loc>
		<lastmod>2018-05-03T02:19:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/03/hack-car-tool/</loc>
		<lastmod>2018-05-03T03:56:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/04/backdoor-hidden-npm-javascript-package/</loc>
		<lastmod>2018-05-04T01:42:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/04/poker-tournaments-cancelled-ddos-attacks-players-want-reimbursed/</loc>
		<lastmod>2018-05-04T01:51:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/04/make-subdomain-takeover-attack/</loc>
		<lastmod>2018-05-04T01:57:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/05/vulnerability-oracle-access-manager-exploited-bypass-authentication-control-account-user/</loc>
		<lastmod>2018-05-05T01:53:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/05/change-twitter-password-now-glitch-discovered-password-storage/</loc>
		<lastmod>2018-05-05T02:04:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/05/last-meltdown-patch-affected-serious-vulnerability/</loc>
		<lastmod>2018-05-05T02:40:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/07/drive-rowhammer-attack-uses-gpu-compromise-android-phone/</loc>
		<lastmod>2018-05-07T03:06:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/07/hacker-team-runs-cybersecurity-portal-claiming-protect-zero-day-attacks-60-seconds/</loc>
		<lastmod>2018-05-07T03:26:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/07/report-chinese-government-behind-decade-hacks-software-companies/</loc>
		<lastmod>2018-05-07T03:41:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/08/researchers-revealed-eight-spectre-vulnerabilities-cpu-chips/</loc>
		<lastmod>2018-05-08T02:53:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/08/war-greek-turkish-hackers/</loc>
		<lastmod>2018-05-08T02:56:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/09/drupwn-v0-9-2-tool-make-attacks-drupal-sites/</loc>
		<lastmod>2018-05-09T02:56:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/09/drupal-websites-including-government-sites-hacked-extract-cryptocurrencies/</loc>
		<lastmod>2018-05-09T02:59:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/09/tool-perform-brute-force-attacks-ssh-smtp-facebook-instagram-brut3k1t/</loc>
		<lastmod>2018-05-09T03:06:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/10/advanced-tool-launch-powershell-payload-remotely/</loc>
		<lastmod>2018-05-10T03:12:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/10/hackers-attack-copenhagen-citys-bicycle-sharing-system/</loc>
		<lastmod>2018-05-10T03:17:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/10/basestriker-new-attack-microsoft-office-365/</loc>
		<lastmod>2018-05-10T03:23:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/10/researchers-found-backdoor-python-library-steal-ssh-credentials/</loc>
		<lastmod>2018-05-10T03:23:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/11/vulnerabilities-lg-smartphones-exploited-execute-remote-code/</loc>
		<lastmod>2018-05-11T03:45:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/11/must-update-7-zip-now-critical-vulnerability-found/</loc>
		<lastmod>2018-05-11T04:12:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/12/ibm-improves-security-prohibits-use-usb-drives-throughout-company/</loc>
		<lastmod>2018-05-12T03:40:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/12/throwhammer-new-way-launch-rowhammer-attacks-via-network-packets/</loc>
		<lastmod>2018-05-12T03:44:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/12/reconnaissance-attack-target-correct-way/</loc>
		<lastmod>2018-05-12T04:11:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/14/synack-targeted-ransomware-uses-doppelganging-technique/</loc>
		<lastmod>2018-05-14T01:42:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/14/internet-explorer-zero-day-browser-attack/</loc>
		<lastmod>2018-05-14T01:49:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/15/pgp-users-warned-new-email-encryption-security-vulnerabilities/</loc>
		<lastmod>2018-05-15T03:07:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/15/cryptocurrency-miner-discovered-ubuntu-snap-store/</loc>
		<lastmod>2018-05-15T03:12:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/16/lenovo-roll-updates-fix-critical-vulnerabilities/</loc>
		<lastmod>2018-05-16T03:05:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/16/securus-tool-allows-police-officers-track-cell-phone-real-time/</loc>
		<lastmod>2018-05-16T03:09:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/17/indian-cricket-board-exposes-personal-data-thanks-amazon-web-service-s3/</loc>
		<lastmod>2018-05-17T03:08:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/17/red-hat-linux-affected-critical-vulnerability/</loc>
		<lastmod>2018-05-17T03:11:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/18/securus-company-dedicated-track-phones-real-time-hacked/</loc>
		<lastmod>2018-05-18T02:57:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/18/new-ways-hack-amazon-alexa-google-home-assistants/</loc>
		<lastmod>2018-05-18T03:01:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/18/former-cia-engineer-leaked-wikileaks-hacking-tools-used-agency/</loc>
		<lastmod>2018-05-18T03:04:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/19/advanced-tool-vulnerability-testing/</loc>
		<lastmod>2018-05-19T02:51:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/19/attempt-protect-democracy-free-expression-google-deploys-free-ddos-protection-services/</loc>
		<lastmod>2018-05-19T02:56:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/19/vulnerability-locationsmart-allows-obtaining-real-time-locations-smartphones/</loc>
		<lastmod>2018-05-19T03:00:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/19/principal-steps-web-application-security-testing/</loc>
		<lastmod>2018-05-19T03:03:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/21/safeguard-databases-sql-injections/</loc>
		<lastmod>2018-05-21T03:14:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/21/kali-linux-vs-ubuntu-distro-better-hacking/</loc>
		<lastmod>2018-05-21T03:41:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/21/look-drupalgeddons-client-side-attacks/</loc>
		<lastmod>2018-05-21T03:44:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/22/exploit-two-zero-days-vulnerabilities-simultaneously-single-attack-unicorn-attack/</loc>
		<lastmod>2018-05-22T03:14:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/22/congressional-california-debate-hacked-display-porn/</loc>
		<lastmod>2018-05-22T03:17:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/22/data-200-million-japanese-sale-hacker-forum/</loc>
		<lastmod>2018-05-22T03:19:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/22/new-spectre-variation-allow-attackers-recover-data-system-management-mode/</loc>
		<lastmod>2018-05-22T03:21:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/23/parrot-security-4-0-new-tool-cloud-iot-pentesting/</loc>
		<lastmod>2018-05-23T02:08:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/23/roaming-mantis-malware-evolve-preys-pc-android-ios-users/</loc>
		<lastmod>2018-05-23T02:12:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/24/critical-vulnerabilities-discovered-dell-devices/</loc>
		<lastmod>2018-05-24T02:53:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/24/vulnerabilities-let-bmw-models-hackable/</loc>
		<lastmod>2018-05-24T03:04:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/25/extract-forensic-information-browsers-tool-dumpzilla/</loc>
		<lastmod>2018-05-25T02:38:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/25/d-link-dir-620-routers-critical-vulnerabilities/</loc>
		<lastmod>2018-05-25T02:41:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/25/get-list-installed-software-remote-computers/</loc>
		<lastmod>2018-05-25T02:52:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/26/access-information-apple-single-portal/</loc>
		<lastmod>2018-05-26T01:52:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/26/amazons-alexa-recording-conversations-without-consent/</loc>
		<lastmod>2018-05-26T01:54:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/26/create-multiple-tor-instances-load-balancing/</loc>
		<lastmod>2018-05-26T01:57:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/28/fbi-tells-router-users-reboot-now-kill-malware-infecting-500k-devices/</loc>
		<lastmod>2018-05-28T03:31:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/28/z-shave-exploiting-z-wave-downgrade-attacks/</loc>
		<lastmod>2018-05-28T03:41:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/29/pornhub-taking-care-us-free-vpn-everyone-vpnhub/</loc>
		<lastmod>2018-05-29T02:57:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/29/backswap-malware-new-ways-steal-bank-accounts/</loc>
		<lastmod>2018-05-29T03:00:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/30/recognise-malware-links-accidentally-click/</loc>
		<lastmod>2018-05-30T03:04:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/30/singapore-isp-leaves-1000-routers-open-attack/</loc>
		<lastmod>2018-05-30T03:09:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/31/fbi-launches-international-alert-cisco-routers-easy-hack/</loc>
		<lastmod>2018-05-31T02:56:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/31/dutch-banks-affected-cyber-attack-services-disconnected/</loc>
		<lastmod>2018-05-31T03:00:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/05/31/funds-taylor-cryptocurrency-application-stolen-cyberattack/</loc>
		<lastmod>2018-05-31T03:04:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/06/01/bank-montreal-hacked-one-important-banks-canada/</loc>
		<lastmod>2018-06-01T02:40:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/06/01/archery-perform-scans-manage-vulnerabilities-tool/</loc>
		<lastmod>2018-06-01T03:12:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/06/02/hackers-using-skimmers-steal-credit-card-information-service-stations/</loc>
		<lastmod>2018-06-02T02:25:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/06/02/damage-hard-drives-ultrasonic-attack/</loc>
		<lastmod>2018-06-02T02:29:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/06/02/gyoithon-tool-make-penetration-testing-machine-learning/</loc>
		<lastmod>2018-06-02T02:36:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/06/04/honda-universal-music-group-expose-sensitive-data-misconfig-blunders/</loc>
		<lastmod>2018-06-04T02:33:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/06/04/side-channel-attacking-browsers-css3-features/</loc>
		<lastmod>2018-06-04T02:59:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/06/04/ss7-routing-protocol-breach-us-cellular-carrier-exposed-customer-data/</loc>
		<lastmod>2018-06-04T04:10:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/06/05/fbi-admits-inflated-number-iphones-cant-hack/</loc>
		<lastmod>2018-06-05T03:29:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/06/05/rediswannamine-unveiled-new-cryptojacking-attack-powered-redis-nsa-exploits/</loc>
		<lastmod>2018-06-05T03:48:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/06/07/92-million-user-accounts-dna-records-hacked-website-myheritage/</loc>
		<lastmod>2018-06-07T22:28:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/06/07/10-million-dollars-stolen-syndicate-wallet-accounts/</loc>
		<lastmod>2018-06-07T22:31:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/06/09/marcus-hutchins-engineer-who-stopped-wannacry-virus-imputed-in-new-accusations/</loc>
		<lastmod>2018-06-09T15:54:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/06/09/14-million-users-private-publications-are-already-public-by-facebooks-mistake/</loc>
		<lastmod>2018-06-09T16:03:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/06/09/ship-hacking-puts-operations-in-english-channel-at-risk/</loc>
		<lastmod>2018-06-09T16:10:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/06/12/how-to-file-a-cryptojacking-complaint-against-a-company-before-the-federal-trade-commission/</loc>
		<lastmod>2018-06-12T05:07:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/06/13/emergency-update-zero-day-attack-takes-over-adobe-flash/</loc>
		<lastmod>2018-06-13T03:54:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/06/13/bitcoin-falls-after-korean-exchange-hack-attack/</loc>
		<lastmod>2018-06-13T03:56:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/06/13/how-to-benefit-your-organization-from-white-hat-hackers/</loc>
		<lastmod>2018-06-13T15:51:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/06/14/hackers-can-use-cortana-to-break-into-computers-with-windows-10/</loc>
		<lastmod>2018-06-14T16:36:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/06/14/mining-malware-attacks-amazons-firetv/</loc>
		<lastmod>2018-06-14T16:41:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/06/14/banco-de-chile-loses-10-million-on-swift-network-related-attack/</loc>
		<lastmod>2018-06-14T16:43:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/06/14/smart-padlocks-can-be-hacked-in-seconds/</loc>
		<lastmod>2018-06-14T16:48:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/06/15/countering-a-brute-force-attack/</loc>
		<lastmod>2018-06-15T16:21:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/06/15/trump-and-kim-usb-fan-lauches-information-security-alert/</loc>
		<lastmod>2018-06-15T16:23:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/06/18/vulnerability-in-gnupg-has-allowed-counterfeiting-of-digital-signatures-for-decades/</loc>
		<lastmod>2018-06-18T02:01:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/06/18/european-union-qualifies-as-malicious-kaspersky-lab-software/</loc>
		<lastmod>2018-06-18T02:04:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/06/18/backdoored-images-downloaded-5-million-times-are-finally-removed-from-docker-hub/</loc>
		<lastmod>2018-06-18T02:07:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/06/18/hackers-hack-apples-new-iphone-anti-hacking-hack/</loc>
		<lastmod>2018-06-18T19:31:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/06/18/attackers-can-crash-the-hard-drives-using-sonic-signals/</loc>
		<lastmod>2018-06-18T03:16:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/06/19/exploit-kits-spring-2018-review/</loc>
		<lastmod>2018-06-19T03:37:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/06/19/this-sneaky-windows-malware-delivers-adware-and-takes-screenshots-of-your-desktop/</loc>
		<lastmod>2018-06-19T03:48:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/06/19/authorities-shut-down-black-hand-a-dark-web-market/</loc>
		<lastmod>2018-06-19T04:43:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/06/19/zip-slip-vulnerability-affects-thousands-of-projects/</loc>
		<lastmod>2018-06-19T04:47:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/06/19/critical-failures-expose-400-axis-camera-models-to-hacking/</loc>
		<lastmod>2018-06-19T04:50:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/06/20/teslas-hard-lesson-on-information-security/</loc>
		<lastmod>2018-06-20T02:15:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/06/20/hipaa-breaches-penalties-up-to-4-3-million/</loc>
		<lastmod>2018-06-20T02:21:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/06/21/bug-in-google-chromecast-and-home-devices-would-reveal-location-of-users/</loc>
		<lastmod>2018-06-21T01:47:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/06/21/the-andorid-emulator-andy-could-use-your-computer-to-mine-cryptocurrency/</loc>
		<lastmod>2018-06-21T02:02:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/06/21/phishing-attacks-can-bypass-office-365-security/</loc>
		<lastmod>2018-06-21T02:06:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/06/22/data-breach-on-ticketfly-compromises-millions-of-users-emails/</loc>
		<lastmod>2018-06-22T02:01:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/06/22/hackers-attack-satellite-operators-claims-symantec/</loc>
		<lastmod>2018-06-22T02:04:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/06/23/a-hacker-figured-out-how-to-brute-force-iphone-passcodes/</loc>
		<lastmod>2018-06-23T02:47:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/06/23/cisco-launches-34-update-patches-for-different-vulnerabilities-5-of-them-critical/</loc>
		<lastmod>2018-06-23T03:06:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/06/25/attacking-private-networks-from-the-internet-with-dns-rebinding/</loc>
		<lastmod>2018-06-25T03:02:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/06/25/how-to-influence-the-electoral-processes-and-hack-government-elections/</loc>
		<lastmod>2018-09-26T04:31:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/06/26/google-verifies-update-for-apps-installed-from-unknown-sources/</loc>
		<lastmod>2018-06-26T02:52:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/06/26/supreme-court-dictates-that-government-will-need-a-warrant-for-long-term-surveillance-using-location-data/</loc>
		<lastmod>2018-06-26T03:01:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/06/26/a-very-simple-hack-evades-ios-password-entry-limit-possibilities-of-brute-force-attacks/</loc>
		<lastmod>2018-06-26T03:10:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/06/26/microsoft-edge-bug-could-be-exploited-to-send-your-emails-to-malicious-websites/</loc>
		<lastmod>2018-06-26T03:18:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/06/27/50-malware-allows-users-to-build-their-own-botnets/</loc>
		<lastmod>2018-07-19T00:48:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/06/27/the-pirate-bay-is-offline-this-is-how-you-can-access-their-domain-in-dark-web/</loc>
		<lastmod>2018-07-19T00:47:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/06/27/hacking-on-pdq-attackers-get-access-to-credit-card-data/</loc>
		<lastmod>2018-07-19T00:49:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/06/27/officially-launched-wpa3-standard-with-new-security-features-wi-fi/</loc>
		<lastmod>2018-07-19T00:50:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/06/28/exploited-vulnerability-in-cisco-asa-and-firepower-devices/</loc>
		<lastmod>2018-07-19T00:50:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/06/28/voice-records-of-british-people-could-be-illegally-stored/</loc>
		<lastmod>2018-07-19T00:50:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/06/28/bitcoin-airdrop-fraud-protect-yourself-against-phishing-attacks/</loc>
		<lastmod>2018-07-19T00:52:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/06/29/patching-doublepulsar-to-exploit-windows-embedded-machines/</loc>
		<lastmod>2018-06-29T03:00:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/06/29/ticketmaster-admits-personal-data-stolen-in-hack-attack/</loc>
		<lastmod>2018-06-29T03:10:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/06/30/new-security-processes-to-prevent-malicious-automation-on-twitter/</loc>
		<lastmod>2018-07-19T00:53:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/06/30/linux-distro-suffers-hack-on-github/</loc>
		<lastmod>2018-07-19T00:57:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/06/30/do-our-smartphone-batteries-spy-on-us/</loc>
		<lastmod>2018-07-21T19:41:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/02/rowhammer-variant-rampage-targets-android-devices-all-over-again/</loc>
		<lastmod>2018-07-02T03:01:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/02/lte-wireless-connections-used-by-billions-arent-as-secure-as-we-thought/</loc>
		<lastmod>2018-07-02T03:15:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/03/zerodium-pays-up-to-500-000-for-zero-day-exploits/</loc>
		<lastmod>2018-07-21T19:39:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/03/tasmania-voter-registration-involved-in-data-violation/</loc>
		<lastmod>2018-07-21T19:39:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/03/lte-and-5g-networks-could-be-affected-by-new-vulnerabilities/</loc>
		<lastmod>2018-07-21T19:38:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/04/according-to-reports-google-allows-external-application-developers-to-read-peoples-emails/</loc>
		<lastmod>2018-07-21T19:38:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/04/nsa-started-deleting-all-call-records-acquired-from-2015/</loc>
		<lastmod>2018-07-21T19:38:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/05/fake-dating-apps-are-used-to-infiltrate-israeli-army/</loc>
		<lastmod>2018-07-21T19:38:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/05/customer-data-stolen-from-the-adidas-website-in-the-us/</loc>
		<lastmod>2018-07-21T19:38:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/05/a-map-to-find-free-wifi-from-airports-around-the-world/</loc>
		<lastmod>2018-07-21T19:38:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/05/samsung-galaxy-devices-send-private-images-attached-to-text-messages/</loc>
		<lastmod>2018-07-21T19:36:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/06/cryptocurrency-thefts-keep-increasing-the-amount-rises-to-761m-in-the-last-six-months/</loc>
		<lastmod>2018-07-21T19:36:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/06/tips-for-pentest-experts/</loc>
		<lastmod>2018-07-21T19:36:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/06/siemens-revealed-vulnerabilities-in-some-of-their-siclock-central-clocks-some-of-them-are-critical/</loc>
		<lastmod>2018-07-21T19:24:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/06/a-virus-that-decides-whether-your-computer-will-be-attacked-with-cryptojacking-or-with-ransomware/</loc>
		<lastmod>2018-07-21T19:23:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/07/british-government-announces-creation-of-the-london-cyber-crime-tribunal/</loc>
		<lastmod>2018-07-21T19:23:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/07/a-former-nso-employee-is-caught-selling-spyware-on-50m/</loc>
		<lastmod>2018-07-21T19:22:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/07/new-zealand-court-approves-kim-schmitz-a-k-a-kim-dotcom-extradition-to-us/</loc>
		<lastmod>2018-07-21T19:22:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/07/thermal-trace-of-the-keyboard-can-be-used-in-computer-attacks/</loc>
		<lastmod>2018-07-21T19:22:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/09/old-malware-gives-criminals-tricky-new-choice-ransomware-or-mining/</loc>
		<lastmod>2018-07-09T03:08:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/10/domainfactory-a-godaddy-web-hosting-company-has-been-hacked/</loc>
		<lastmod>2018-07-21T19:19:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/10/polar-finnish-fitness-monitor-accused-of-leaking-uk-and-us-military-personnel-data/</loc>
		<lastmod>2018-07-21T19:19:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/10/cryptocurrency-mining-a-well-known-practice-at-the-pirate-bay/</loc>
		<lastmod>2018-07-21T19:17:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/10/hackers-gain-access-to-gas-pump-in-detroit-steal-600-gallons/</loc>
		<lastmod>2018-07-21T19:17:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/11/do-third-party-apps-can-access-your-gmail-inbox/</loc>
		<lastmod>2018-07-20T00:53:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/11/ticketmaster-data-theft-part-of-something-bigger/</loc>
		<lastmod>2018-07-20T00:53:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/11/timehop-hacked-21-million-users-data-theft/</loc>
		<lastmod>2018-07-11T03:12:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/11/new-apple-security-feature-bypassed-with-an-adapter-that-the-brand-itself-sells/</loc>
		<lastmod>2018-07-20T00:52:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/12/uk-government-fines-facebook-with-500k-for-cambridge-analytica-case/</loc>
		<lastmod>2018-07-20T00:52:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/12/information-security-company-sued-for-not-detecting-malware-in-2009/</loc>
		<lastmod>2018-07-20T00:52:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/12/apple-and-google-face-questioning-from-us-congress-for-user-tracking/</loc>
		<lastmod>2018-07-20T00:44:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/12/stolen-d-link-certificates-used-to-sign-password-stealing-malware/</loc>
		<lastmod>2018-07-20T00:44:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/13/who-cashes-in-with-your-facebook-personal-data/</loc>
		<lastmod>2018-07-20T00:40:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/13/hacker-sells-stolen-us-drones-documents-in-dark-web/</loc>
		<lastmod>2018-07-20T00:40:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/13/bb-hospitality-group-restaurants-infected-with-malware/</loc>
		<lastmod>2018-07-20T00:38:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/13/former-apple-employee-extracted-documents-about-autonomous-vehicles/</loc>
		<lastmod>2018-07-20T00:37:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/14/data-breach-at-australian-airport-identity-security-system/</loc>
		<lastmod>2018-07-20T00:33:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/14/vpn-hola-chrome-extension-hijacked/</loc>
		<lastmod>2018-07-20T00:29:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/14/chrome-uses-more-ram-because-of-new-feature-against-spectre/</loc>
		<lastmod>2018-07-14T01:47:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/14/malicious-software-packages-at-linux-repositories/</loc>
		<lastmod>2018-07-20T00:26:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/14/dos-attack-over-blizzard/</loc>
		<lastmod>2018-07-14T01:52:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/16/advanced-mobile-malware-campaign-in-india-uses-malicious-mdm/</loc>
		<lastmod>2018-07-16T03:11:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/17/russia-stops-millions-of-computer-attacks-during-the-world-cup/</loc>
		<lastmod>2018-07-20T00:22:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/17/researchers-silently-manipulate-gps-navigation-systems/</loc>
		<lastmod>2018-07-20T00:22:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/17/kodak-cryptocurrency-miner-melts-in-the-air/</loc>
		<lastmod>2018-07-20T00:19:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/17/cisco-fixes-serious-bug-on-voip-phones/</loc>
		<lastmod>2018-07-20T00:19:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/18/amazon-users-report-issues-during-prime-day/</loc>
		<lastmod>2018-07-20T00:18:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/18/thousands-of-mega-logins-found-online/</loc>
		<lastmod>2018-07-20T00:18:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/18/prospective-on-the-evolution-of-ransomware/</loc>
		<lastmod>2018-07-20T00:17:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/18/spambot-attacks-wordpress-pages/</loc>
		<lastmod>2018-07-20T00:17:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/19/health-care-companies-said-a-competitor-is-putting-patient-data-at-risk/</loc>
		<lastmod>2018-07-19T03:06:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/19/microsoft-identity-bounty-program/</loc>
		<lastmod>2018-07-19T03:22:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/19/pennsylvania-birth-certificate-system-hacked/</loc>
		<lastmod>2018-07-19T03:26:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/19/spanish-telecom-provider-suffers-massive-data-breach/</loc>
		<lastmod>2018-07-19T03:32:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/20/european-union-fines-google-for-monopolistic-practices/</loc>
		<lastmod>2018-07-20T02:58:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/20/cyberattack-over-labcorp/</loc>
		<lastmod>2018-07-20T03:02:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/20/robocalling-company-leaves-virginia-voters-data-online/</loc>
		<lastmod>2018-07-20T03:08:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/21/data-breach-at-singapores-largest-health-company/</loc>
		<lastmod>2018-07-21T03:14:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/21/hackers-steal-1m-from-russian-bank/</loc>
		<lastmod>2018-07-21T03:16:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/21/cisco-launches-25-patches-for-wireless-vulnerabilities/</loc>
		<lastmod>2018-07-21T03:19:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/24/government-sponsored-spear-phishing-campaigns-remain-active/</loc>
		<lastmod>2018-07-24T03:06:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/24/new-variants-of-the-spectre-vulnerability/</loc>
		<lastmod>2018-07-24T03:15:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/24/a-human-resources-company-suffers-data-breach/</loc>
		<lastmod>2018-07-24T03:24:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/24/perspectives-on-loss-and-theft-applepay-and-google-wallet/</loc>
		<lastmod>2018-07-24T03:28:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/25/hackers-hacked-virginia-bank-twice-in-eight-months-2-4m-usd-stolen/</loc>
		<lastmod>2018-07-25T02:03:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/25/targeted-incentive-program-a-new-bug-bounty-program-1-million-usd/</loc>
		<lastmod>2018-07-25T02:07:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/25/russian-hackers-compromise-power-stations-in-the-us/</loc>
		<lastmod>2018-07-25T02:15:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/26/security-flaw-that-allows-hackers-to-replace-serverless-codes-at-ibm-is-fixed/</loc>
		<lastmod>2018-07-26T03:05:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/26/services-to-attack-businesses-can-be-acquired-from-40-usd-in-dark-web/</loc>
		<lastmod>2018-07-26T03:10:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/26/vehicle-sharing-apps-are-vulnerable-to-hacking/</loc>
		<lastmod>2018-07-26T03:14:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/27/digital-footprints-and-their-risks/</loc>
		<lastmod>2018-07-27T03:15:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/27/swanns-home-security-camera-recordings-could-be-intervened/</loc>
		<lastmod>2018-07-27T03:21:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/27/cosco-suffers-ransomware-attack/</loc>
		<lastmod>2018-07-27T03:27:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/28/google-removes-cryptocurrency-mining-apps-from-play-store/</loc>
		<lastmod>2018-07-28T02:33:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/28/lifelock-id-leaks-could-have-helped-information-thieves/</loc>
		<lastmod>2018-07-28T02:40:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/28/bluetooth-hack-affecting-millions-of-devices-from-several-vendors/</loc>
		<lastmod>2018-07-28T02:48:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/30/new-spectre-attack-enables-secrets-to-be-leaked-over-a-network/</loc>
		<lastmod>2018-07-30T03:28:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/30/bugs-in-samsung-iot-hub-leave-smart-home-open-to-attack/</loc>
		<lastmod>2018-07-30T03:47:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/31/telstra-admits-flaw-in-its-websites-search-function-that-provoke-a-security-failure/</loc>
		<lastmod>2018-07-31T03:04:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/31/inmates-hacked-prison-tablets-to-transfer-money-to-their-own-accounts/</loc>
		<lastmod>2018-07-31T03:08:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/07/31/hackers-steal-7-7m-from-cryptocurrency-platform/</loc>
		<lastmod>2018-07-31T03:11:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/01/small-it-companies-owners-arrested-for-leaking-data/</loc>
		<lastmod>2018-08-01T02:21:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/01/10k-usd-for-hackers-who-find-bugs-in-hp-printers/</loc>
		<lastmod>2018-08-01T02:24:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/01/multiple-flaws-found-in-samsung-smartthings-hub/</loc>
		<lastmod>2018-08-01T02:34:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/01/11k-wikileaks-direct-messages-leaked-by-activist/</loc>
		<lastmod>2018-08-01T02:40:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/02/spear-phishing-campaign-affects-over-400-companies/</loc>
		<lastmod>2018-08-02T03:18:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/02/government-employees-using-typewriters-because-of-ransomware-attack/</loc>
		<lastmod>2018-08-02T03:20:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/02/british-shipping-company-clarksons-hacked/</loc>
		<lastmod>2018-08-02T03:22:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/02/how-to-fake-your-phone-number-make-it-look-like-someone-else-is-calling/</loc>
		<lastmod>2021-09-28T12:08:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/03/law-against-smartphone-use-in-schools-is-approved-in-france/</loc>
		<lastmod>2018-08-03T02:28:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/03/data-from-reddit-users-exposed-to-attacks/</loc>
		<lastmod>2018-08-03T02:42:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/03/pentagon-cyber-war-cloud-10-billion-project-bidding-process-open/</loc>
		<lastmod>2018-08-03T02:45:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/04/vulnerability-in-microsoft-edge-would-allow-file-theft/</loc>
		<lastmod>2018-08-04T02:49:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/04/data-breach-in-salesforce/</loc>
		<lastmod>2018-08-04T02:54:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/04/new-ccleaner-version-will-compulsorily-monitor-your-activity/</loc>
		<lastmod>2018-08-04T02:57:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/04/3-fin7-hackers-are-arrested/</loc>
		<lastmod>2018-08-04T03:03:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/06/tsmc-says-it-recovers-80-percent-of-capacity-after-virus-shuts-down-plants/</loc>
		<lastmod>2018-08-06T02:55:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/07/160-hp-printer-models-contain-two-critical-vulnerabilities/</loc>
		<lastmod>2018-08-07T03:04:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/07/hundreds-of-people-loss-their-houses-because-of-failure-in-mortgage-systems/</loc>
		<lastmod>2018-08-07T03:08:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/07/several-wifi-devices-could-be-affected-by-new-wpa-wpa2-attack/</loc>
		<lastmod>2018-08-07T03:11:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/07/drupal-sites-vulnerable-to-hackers-because-of-symfony-flaw/</loc>
		<lastmod>2018-08-07T03:15:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/08/credit-card-applications-at-tcm-bank-have-been-leaked/</loc>
		<lastmod>2018-08-08T03:17:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/08/multiple-vulnerabilities-found-in-openemr-system/</loc>
		<lastmod>2018-08-08T03:19:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/08/department-of-defense-and-pentagon-ban-gps-enabled-devices-and-mobile-phones/</loc>
		<lastmod>2018-08-08T03:22:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/08/iphone-chipmaker-hit-by-massive-ransomware-attack/</loc>
		<lastmod>2018-08-08T03:26:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/09/snapchat-source-code-is-posted-on-github/</loc>
		<lastmod>2018-08-09T02:58:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/09/healthcare-information-of-2-million-of-mexicans-leaked/</loc>
		<lastmod>2018-08-09T03:01:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/09/users-could-spread-fake-news-because-of-whatsapp-vulnerabilities/</loc>
		<lastmod>2018-08-09T03:04:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/09/vulnerability-in-linux-would-allow-dos-attacks/</loc>
		<lastmod>2018-08-09T03:10:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/10/vulnerability-in-cortana-would-allow-taking-control-of-devices-with-windows-10/</loc>
		<lastmod>2018-08-10T03:05:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/10/critical-vulnerabilities-present-in-smart-city-systems/</loc>
		<lastmod>2018-08-10T03:07:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/10/u-s-troops-exposed-by-satellite-vulnerability/</loc>
		<lastmod>2018-08-10T03:09:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/10/dangerous-malware-powered-by-artificial-intelligence/</loc>
		<lastmod>2018-08-10T03:11:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/11/phishing-scam-in-icloud/</loc>
		<lastmod>2018-08-11T03:04:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/11/vulnerabilities-in-square-and-paypal-affect-mobile-points-of-sale/</loc>
		<lastmod>2018-08-11T03:07:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/11/according-to-th-department-of-defense-hackers-are-the-pilots-of-the-future/</loc>
		<lastmod>2018-08-11T03:10:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/11/a-specially-crafted-charger-could-take-control-of-your-laptop/</loc>
		<lastmod>2018-08-11T03:13:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/13/in-the-wild-router-exploit-sends-unwitting-users-to-fake-banking-site/</loc>
		<lastmod>2018-08-13T03:05:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/14/zero-day-vulnerability-present-in-macos/</loc>
		<lastmod>2018-08-14T02:03:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/14/data-theft-in-mexico-citys-subway-free-wifi/</loc>
		<lastmod>2018-08-14T02:07:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/14/vulnerabilities-in-pre-installed-apps-expose-millions-of-android-devices/</loc>
		<lastmod>2018-08-14T02:11:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/14/russian-espionage-software-persistent-in-thousands-of-domestic-routers/</loc>
		<lastmod>2018-08-14T02:14:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/15/more-than-10k-vulnerabilities-have-been-revealed-so-far-this-year/</loc>
		<lastmod>2018-08-15T02:39:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/15/google-tracks-iphone-and-android-users-even-if-location-services-are-disabled/</loc>
		<lastmod>2018-08-15T02:42:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/15/high-severity-vulnerability-in-oracle/</loc>
		<lastmod>2018-08-15T02:44:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/15/leaked-information-from-31k-godaddy-servers/</loc>
		<lastmod>2018-08-15T02:47:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/16/cisco-launches-security-patches-against-new-attack/</loc>
		<lastmod>2018-08-16T03:05:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/16/department-of-defense-announces-hack-the-marine-corps-bounty-program/</loc>
		<lastmod>2018-08-16T03:08:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/16/instagram-hacking-affects-thousands-of-users/</loc>
		<lastmod>2018-08-16T03:17:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/16/unlimited-money-withdrawal-from-atm-new-hacking-attack/</loc>
		<lastmod>2018-08-16T03:19:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/17/cryptocurrency-investor-losses-24m-usd-because-of-theft-through-his-smartphone/</loc>
		<lastmod>2018-08-17T02:56:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/17/hackers-can-modify-police-body-camera-footage-without-anyone-noticing/</loc>
		<lastmod>2018-08-17T02:58:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/18/australian-teenager-hacks-apple/</loc>
		<lastmod>2018-08-18T02:44:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/18/nsa-with-one-eye-on-organizations-such-as-girls-who-code/</loc>
		<lastmod>2018-08-18T02:53:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/18/a-third-of-organizations-claim-to-have-suffered-cryptojacking-attacks/</loc>
		<lastmod>2018-08-18T02:56:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/18/hackers-can-use-fax-machines-to-infect-a-network/</loc>
		<lastmod>2018-08-18T03:00:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/18/us-president-signs-small-business-cyber-security-act/</loc>
		<lastmod>2018-08-18T03:04:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/20/severe-php-exploit-threatens-wordpress-sites-with-remote-code-execution/</loc>
		<lastmod>2018-08-20T02:56:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/21/new-feature-in-gmail-sending-confidential-self-destructing-messages/</loc>
		<lastmod>2018-08-21T01:37:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/21/trump-moderates-us-rules-on-cyberattacks/</loc>
		<lastmod>2018-08-21T01:40:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/21/apple-removes-25k-gambling-apps-from-its-china-app-store/</loc>
		<lastmod>2018-08-21T01:42:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/21/13m-usd-theft-in-atm-cash-out/</loc>
		<lastmod>2018-08-21T01:45:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/22/fake-fortnite-installers-in-android-extends-malware-in-global-campaign/</loc>
		<lastmod>2018-08-22T02:11:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/22/china-develops-new-ways-to-spy-on-its-citizens/</loc>
		<lastmod>2018-08-22T02:40:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/22/lynis-2-6-7-security-scan-tool-for-unix-linux/</loc>
		<lastmod>2018-08-22T02:46:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/22/federal-agents-ask-facebook-to-install-a-backdoor-in-messenger/</loc>
		<lastmod>2018-08-22T02:49:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/23/vulnerability-in-smart-plugs-puts-enterprise-networks-at-risk/</loc>
		<lastmod>2018-08-23T03:27:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/23/battle-against-fraudulent-online-operations-in-australia/</loc>
		<lastmod>2018-08-23T03:30:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/23/dark-tequila-a-threat-for-mexican-bank-clients/</loc>
		<lastmod>2018-08-23T03:32:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/23/massive-social-network-account-deletion-because-of-unusual-content/</loc>
		<lastmod>2018-08-23T03:34:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/23/new-usb-attack-variant-via-usb-charging-cable/</loc>
		<lastmod>2018-08-23T03:37:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/24/chrome-vulnerability-allows-hackers-to-find-facebook-users-data/</loc>
		<lastmod>2018-08-24T03:30:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/24/animoto-alerts-on-possible-data-breach/</loc>
		<lastmod>2018-08-24T03:34:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/24/serious-vulnerabilities-in-philips-medical-devices/</loc>
		<lastmod>2018-08-24T03:36:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/24/ryuk-ransomware-attacks-business-networks/</loc>
		<lastmod>2018-08-24T03:39:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/25/50-of-smes-dont-think-they-could-be-cybercriminals-victims/</loc>
		<lastmod>2018-08-25T03:01:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/25/lazarus-group-launches-mac-malware-for-the-first-time/</loc>
		<lastmod>2018-08-25T03:07:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/25/1m-usd-per-minute-is-lost-due-to-cybercrime/</loc>
		<lastmod>2018-08-25T03:10:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/25/hack-on-t-mobile-data-theft-of-2-million-customers/</loc>
		<lastmod>2018-08-25T03:12:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/28/zte-and-huawei-face-ban-in-australia/</loc>
		<lastmod>2018-08-28T02:03:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/28/the-pirate-bay-remains-down/</loc>
		<lastmod>2018-08-28T02:06:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/28/data-breach-in-babysitting-app/</loc>
		<lastmod>2018-08-28T02:09:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/28/open-source-components-time-saving-and-security-problem/</loc>
		<lastmod>2018-08-28T02:12:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/29/smart-bulbs-could-be-exploited-in-new-cyberattack/</loc>
		<lastmod>2018-08-29T03:01:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/29/how-the-13-million-dollar-robbery-occurred-in-cosmos-bank/</loc>
		<lastmod>2018-08-29T03:03:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/29/how-to-hack-a-doorbell/</loc>
		<lastmod>2018-08-29T03:06:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/29/hacker-reveals-zero-day-vulnerability-in-windows/</loc>
		<lastmod>2018-08-29T03:10:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/30/abbyy-leaks-over-203k-client-documents-on-mongodb-server/</loc>
		<lastmod>2018-08-30T01:25:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/30/notpetya-the-weapon-that-caused-over-10-billion-usd-in-losses/</loc>
		<lastmod>2018-08-30T01:28:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/30/how-to-find-what-your-router-exposes-on-the-internet/</loc>
		<lastmod>2018-08-30T01:31:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/30/data-breach-in-cryptocurrency-investment-platform/</loc>
		<lastmod>2018-08-30T01:40:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/30/spyware-trading-company-gets-hacked/</loc>
		<lastmod>2018-08-30T01:42:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/31/ddos-attack-at-spains-central-bank/</loc>
		<lastmod>2018-08-31T02:45:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/31/over-20k-stolen-passports-of-air-canada-users/</loc>
		<lastmod>2018-08-31T02:48:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/31/critical-vulnerability-solved-in-php-packagist/</loc>
		<lastmod>2018-08-31T02:50:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/31/hacker-sells-data-of-130m-chinese-hotel-costumers-in-dark-web/</loc>
		<lastmod>2018-08-31T02:52:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/08/31/facebook-vulnerability-allowed-remote-code-execution/</loc>
		<lastmod>2018-08-31T02:54:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/01/is-cryptojacking-as-lucrative-as-it-seems/</loc>
		<lastmod>2018-09-01T02:48:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/01/a-cisco-software-vulnerability-could-allow-unauthorized-access-to-sensitive-information/</loc>
		<lastmod>2018-09-01T02:50:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/01/over-80-of-app-users-in-china-have-suffered-the-leaking-of-their-data/</loc>
		<lastmod>2018-09-01T02:53:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/01/new-instagram-security-measures-are-not-that-secure/</loc>
		<lastmod>2018-09-01T02:56:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/04/google-has-been-purchasing-your-mastercard-data/</loc>
		<lastmod>2018-09-04T03:43:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/04/five-eyes-group-demands-access-to-crime-suspects-data-through-encryption-backdoors/</loc>
		<lastmod>2018-09-04T03:45:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/04/google-could-be-selling-compromised-security-tool-titan-security-key/</loc>
		<lastmod>2018-09-04T03:46:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/04/microsoft-launches-cumulative-windows-10-updates/</loc>
		<lastmod>2018-09-04T03:47:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/04/federal-prosecutors-indict-20-year-old-youngster-behind-satori-botnet/</loc>
		<lastmod>2018-09-04T03:49:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/05/payment-card-data-stealing-malware-campaign-affects-dozens-of-websites-each-day/</loc>
		<lastmod>2018-09-05T03:31:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/05/opsview-publishes-new-vulnerabilities-report/</loc>
		<lastmod>2018-09-05T03:33:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/05/parental-control-app-gets-hacked-exposing-281gb-of-data/</loc>
		<lastmod>2018-09-05T03:36:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/05/camubot-banking-malware-is-able-to-bypass-biometric-authentication/</loc>
		<lastmod>2018-09-05T03:38:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/06/julian-assange-associate-goes-missing-in-norway/</loc>
		<lastmod>2018-09-06T03:11:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/06/malicious-emails-use-advisorsbot-to-compromise-attacked-companies/</loc>
		<lastmod>2018-09-06T03:14:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/06/silence-a-new-group-of-hackers-with-alleged-links-to-the-cybersecurity-industry/</loc>
		<lastmod>2018-09-06T03:17:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/06/experts-ask-google-for-clarifications-about-backdoor-in-titan-security-key/</loc>
		<lastmod>2018-09-06T03:19:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/06/mega-chrome-extension-was-hijacked-to-steal-personal-information/</loc>
		<lastmod>2018-09-06T03:22:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/07/the-changing-environment-of-vulnerability-analysis/</loc>
		<lastmod>2018-09-07T06:57:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/07/vulnerability-in-schneider-plc-allows-serious-disruptions-in-industrial-environments/</loc>
		<lastmod>2018-09-07T06:59:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/07/deadline-to-comply-with-cybersecurity-legislation-in-new-york/</loc>
		<lastmod>2018-09-07T07:01:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/07/active-campaign-exploiting-apache-struts-2-vulnerability/</loc>
		<lastmod>2018-09-07T07:07:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/08/us-department-of-justice-accuses-north-korea-of-spying-on-sony/</loc>
		<lastmod>2018-09-08T02:50:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/08/data-theft-in-british-airways-over-300k-users-affected/</loc>
		<lastmod>2018-09-08T02:53:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/08/bitcoin-gets-15-down-in-just-a-day/</loc>
		<lastmod>2018-09-08T02:57:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/08/are-ip-addresses-personal-data/</loc>
		<lastmod>2018-09-08T03:01:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/08/usb-drives-shipped-with-schneider-solar-products-are-infected-with-malware/</loc>
		<lastmod>2018-09-08T03:03:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/12/microsoft-identity-bounty-program-2/</loc>
		<lastmod>2018-09-12T02:47:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/12/british-airways-reveals-details-about-data-breach/</loc>
		<lastmod>2018-09-12T02:50:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/13/types-of-soc-2-reports-and-their-differences/</loc>
		<lastmod>2018-09-13T03:14:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/13/mongo-lock-the-attack-that-deletes-mongodb-databases/</loc>
		<lastmod>2018-09-13T03:23:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/13/mongo-lock-the-attack-that-deletes-mongodb-databases-2/</loc>
		<lastmod>2018-09-13T03:25:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/13/vodafone-says-its-hacked-clients-must-pay-for-stolen-money/</loc>
		<lastmod>2018-09-13T03:27:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/14/europe-just-approved-new-copyright-rules-that-could-change-the-internet/</loc>
		<lastmod>2018-09-14T03:02:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/14/court-dictates-that-gchq-data-collection-policy-violated-human-rights/</loc>
		<lastmod>2018-09-14T03:05:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/14/law-firm-begins-legal-action-for-data-theft-in-british-airways/</loc>
		<lastmod>2018-09-14T03:07:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/14/russian-citizen-indicted-over-massive-hacking-against-americans/</loc>
		<lastmod>2018-09-14T03:09:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/15/amazon-could-share-payment-information-from-its-users-with-indian-government/</loc>
		<lastmod>2018-09-15T02:13:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/15/google-has-removed-cryptocurrency-wallet-apps-from-its-play-store/</loc>
		<lastmod>2018-09-15T02:16:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/15/multiple-vulnerabilities-in-fuji-electric-v-server/</loc>
		<lastmod>2018-09-15T02:18:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/15/new-trumps-executive-order-against-possible-election-intervention/</loc>
		<lastmod>2018-09-15T02:24:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/15/has-your-twitter-account-been-hacked/</loc>
		<lastmod>2018-09-15T02:26:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/18/token-securities-the-new-alternative-in-the-cryptocurrency-market/</loc>
		<lastmod>2018-09-18T03:17:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/18/failures-in-ios-devices-and-macos-because-of-css-based-attack/</loc>
		<lastmod>2018-09-18T03:21:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/18/mobile-apps-the-most-used-fraud-method/</loc>
		<lastmod>2018-09-18T03:24:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/18/lawmakers-in-the-us-propose-the-cyber-ready-workforce-act/</loc>
		<lastmod>2018-09-18T03:26:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/18/ransomware-attack-causes-blackout-on-screens-of-bristol-airport/</loc>
		<lastmod>2018-09-18T03:29:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/19/new-ransomware-campaign-encrypts-files-even-if-the-ransom-is-paid/</loc>
		<lastmod>2018-09-19T03:28:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/19/the-best-practices-to-secure-your-web-applications/</loc>
		<lastmod>2018-09-19T04:52:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/19/zero-day-vulnerability-allows-access-to-cctv-cameras/</loc>
		<lastmod>2018-09-19T04:55:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/19/amazon-investigates-its-employees-for-alleged-confidential-data-sale/</loc>
		<lastmod>2018-09-19T04:59:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/19/veeam-gets-hacked-data-management-enterprise-exposes-database-with-more-than-400-million-emails/</loc>
		<lastmod>2018-09-19T05:05:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/20/identifying-botnets-before-an-attack-the-new-darpa-challenge/</loc>
		<lastmod>2018-09-20T02:57:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/20/vulnerability-in-my-cloud-devices-exposes-sensitive-information/</loc>
		<lastmod>2018-09-20T02:59:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/20/mirai-botnet-developers-collaborate-with-the-fbi/</loc>
		<lastmod>2018-09-20T03:01:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/20/newegg-hacked-the-new-victim-of-magecart-malware/</loc>
		<lastmod>2018-09-20T03:03:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/21/electronic-vote-is-approved-despite-fear-of-cyberattacks/</loc>
		<lastmod>2018-09-21T02:33:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/21/500k-fine-for-equifax-2017-data-breach/</loc>
		<lastmod>2018-09-21T02:35:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/21/frequent-flyer-miles-stolen-are-on-sale-on-dark-web/</loc>
		<lastmod>2018-09-21T02:38:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/21/the-most-used-email-subjects-used-in-phishing-attacks/</loc>
		<lastmod>2018-09-21T02:41:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/22/nss-labs-sues-antivirus-developers/</loc>
		<lastmod>2018-09-22T03:29:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/22/data-theft-in-us-state-department-email-system/</loc>
		<lastmod>2018-09-22T03:31:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/22/thousands-of-compromised-websites-on-sale-in-black-market/</loc>
		<lastmod>2018-09-22T03:34:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/22/vpn-services-to-use-netflix-without-location-restrictions/</loc>
		<lastmod>2019-09-11T00:00:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/25/gmail-user-data-still-available-to-app-developers/</loc>
		<lastmod>2018-09-25T03:22:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/25/japanese-cryptocurrency-exchange-suffers-60m-usd-theft/</loc>
		<lastmod>2018-09-25T03:26:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/25/the-role-of-human-factor-in-the-analysis-of-computer-risks/</loc>
		<lastmod>2018-09-25T03:30:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/25/vulnerability-in-macos-mojave-allows-access-to-protected-files/</loc>
		<lastmod>2018-09-25T03:32:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/26/malware-campaign-attacks-freelancers/</loc>
		<lastmod>2018-09-26T03:17:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/26/14-years-sentence-for-scan4you-operator/</loc>
		<lastmod>2018-09-26T03:20:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/26/hacking-attack-in-port-of-barcelona/</loc>
		<lastmod>2018-09-26T03:22:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/26/vulnerability-affects-cisco-video-surveillance-manager/</loc>
		<lastmod>2018-09-26T03:25:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/26/engineer-is-fined-because-hotel-hacking/</loc>
		<lastmod>2018-09-26T03:27:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/27/disturbing-plans-in-china-revealed-by-a-former-google-employee/</loc>
		<lastmod>2018-09-27T03:27:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/27/19-year-old-youngster-hacks-local-police-systems/</loc>
		<lastmod>2018-09-27T03:29:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/27/two-years-in-prison-for-attacking-us-army-servers/</loc>
		<lastmod>2018-09-27T03:31:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/27/uber-begins-security-breach-investigation-in-2016/</loc>
		<lastmod>2018-09-27T03:33:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/27/how-to-disable-a-home-security-system-using-universal-radio-hacker/</loc>
		<lastmod>2018-09-27T03:35:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/28/fragmentsmack-vulnerability-in-linux-kernel-affects-88-cisco-products/</loc>
		<lastmod>2018-09-28T03:24:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/28/eu-approves-offensive-cyber-operations-against-possible-foreign-attacks/</loc>
		<lastmod>2018-09-28T03:28:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/28/united-nations-data-exposed-online/</loc>
		<lastmod>2018-09-28T03:30:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/28/critical-linux-kernel-vulnerability-gives-attackers-root-access/</loc>
		<lastmod>2018-09-28T03:32:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/29/gdpr-and-the-generation-of-best-practices-in-data-protection/</loc>
		<lastmod>2018-09-29T03:03:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/29/pirated-episodes-of-game-of-thrones-the-most-popular-malware-bait/</loc>
		<lastmod>2018-09-29T03:04:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/29/apple-mdm-tool-weakness-allows-access-to-sensitive-information/</loc>
		<lastmod>2018-09-29T03:07:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/29/vulnerability-discovered-in-wifi-routers/</loc>
		<lastmod>2018-09-29T03:10:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/09/29/facebook-asks-for-your-phone-number-for-security-but-its-used-for-advertising/</loc>
		<lastmod>2018-09-29T03:12:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/02/sites-that-use-facebook-login-could-be-affected-by-hack/</loc>
		<lastmod>2018-10-02T02:54:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/02/jailbreak-for-the-ios-12-system-in-the-new-apple-iphone-xs/</loc>
		<lastmod>2018-10-02T02:56:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/02/us-secret-service-warns-of-new-atm-attacks/</loc>
		<lastmod>2018-10-02T02:58:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/02/according-to-facebook-50-million-accounts-have-been-affected-by-hacking/</loc>
		<lastmod>2018-10-02T03:06:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/02/telegram-vulnerability-causes-ip-address-leaking/</loc>
		<lastmod>2018-10-02T03:09:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/02/taiwanese-hacker-cancels-plan-to-delete-mark-zuckerbergs-facebook-profile/</loc>
		<lastmod>2018-10-02T03:12:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/03/byob-build-your-own-botnet/</loc>
		<lastmod>2018-10-03T03:13:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/03/enormous-botnet-used-to-hijack-traffic-destined-for-brazilian-banks/</loc>
		<lastmod>2018-10-03T03:16:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/03/estonia-sues-gemalto-for-e152m-for-the-flaws-in-the-identification-cards-issued-by-the-company/</loc>
		<lastmod>2018-10-03T03:19:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/03/facebook-faces-legal-actions-after-data-breach/</loc>
		<lastmod>2018-10-08T23:42:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/03/vulnerabilities-expose-iomega-and-lenovoemc-nas-devices-to-attacks/</loc>
		<lastmod>2018-10-08T23:44:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/03/famous-youtubers-blame-cryptocurrency-wallet-in-app-store-of-robbery/</loc>
		<lastmod>2018-10-03T03:27:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/04/two-men-arrested-for-cryptocurrency-robbery-of-up-to-14m-usd/</loc>
		<lastmod>2018-10-04T03:01:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/04/california-governor-signs-iot-cybersecurity-bill/</loc>
		<lastmod>2018-10-04T03:03:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/04/a-google-bug-breaks-the-search-results-in-safari/</loc>
		<lastmod>2018-10-04T03:05:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/04/experts-recommend-avoiding-single-step-logins/</loc>
		<lastmod>2018-10-04T03:08:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/04/foxit-pdf-reader-fixes-serious-remote-code-execution-vulnerability/</loc>
		<lastmod>2018-10-04T03:10:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/04/wifi-6-the-next-generation-of-wifi-connectivity/</loc>
		<lastmod>2018-10-04T03:13:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/05/hacker-faces-years-in-prison-after-attacking-multiple-us-government-sites/</loc>
		<lastmod>2018-10-05T03:17:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/05/lojax-the-new-threat-developed-by-fancy-bear/</loc>
		<lastmod>2018-10-05T03:20:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/05/north-korean-hacking-operation-behind-swift-attacks/</loc>
		<lastmod>2018-10-05T03:22:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/05/china-used-small-microchips-to-infiltrate-into-american-companies/</loc>
		<lastmod>2018-10-05T03:26:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/05/phantom-secures-ceo-pleads-guilty-to-selling-encrypted-phones-to-criminals/</loc>
		<lastmod>2018-10-05T03:28:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/06/california-prohibits-use-of-weak-default-passwords/</loc>
		<lastmod>2018-10-06T02:27:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/06/new-tool-to-fight-fake-news/</loc>
		<lastmod>2018-10-08T23:34:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/06/windows-incidents-response-basics/</loc>
		<lastmod>2018-10-08T23:36:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/06/how-to-hack-with-webex/</loc>
		<lastmod>2018-10-08T23:39:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/08/hackers-exploit-vulnerability-in-bitcoin-code-2/</loc>
		<lastmod>2018-10-08T23:41:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/09/nearly-90-of-routers-contain-vulnerable-code/</loc>
		<lastmod>2018-10-09T03:16:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/09/us-department-of-justice-explains-rise-on-accusations-related-to-cyberespionage/</loc>
		<lastmod>2018-10-09T03:19:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/09/google-shut-down-for-data-exposure/</loc>
		<lastmod>2018-10-09T03:21:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/09/critical-vulnerability-in-sony-bravia-smart-tv/</loc>
		<lastmod>2018-10-09T15:32:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/09/federal-autorices-accuse-7-russian-men-of-hacking/</loc>
		<lastmod>2018-10-09T15:29:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/10/facebook-knows-portal-its-smart-speaker-does-not-generate-confidence/</loc>
		<lastmod>2018-10-10T03:06:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/10/new-android-policies-from-now-on-only-default-apps-can-access-the-calls-and-sms-data/</loc>
		<lastmod>2018-10-10T03:09:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/10/shopper-approved-the-new-victim-of-the-magecart-hacking-group/</loc>
		<lastmod>2018-10-10T03:11:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/10/hacker-steals-over-30k-usd-in-cryptocurrency-of-spankchain/</loc>
		<lastmod>2018-10-10T03:13:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/10/how-to-become-an-expert-in-digital-forensics/</loc>
		<lastmod>2018-10-10T03:16:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/11/russian-and-chinese-hackers-two-different-approaches-to-cybercrime/</loc>
		<lastmod>2018-10-11T02:59:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/11/fine-for-heathrow-airport-for-missing-memory-stick/</loc>
		<lastmod>2018-10-11T03:02:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/11/a-simple-videocall-could-compromise-your-whatsapp-account/</loc>
		<lastmod>2018-10-11T03:05:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/11/google-abandons-the-race-for-the-10-billion-contract-with-the-pentagon/</loc>
		<lastmod>2018-10-11T03:08:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/11/new-version-of-the-wpa-krack-attack/</loc>
		<lastmod>2018-10-11T03:10:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/12/vulnerability-allows-hijacking-of-software-installed-in-macos/</loc>
		<lastmod>2018-10-12T05:23:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/12/cryptomining-software-is-hidden-as-flash-update/</loc>
		<lastmod>2018-10-12T05:26:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/12/microsoft-cloud-will-be-able-to-host-us-government-secret-information/</loc>
		<lastmod>2018-10-12T05:28:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/12/the-biggest-cctv-manufacturer-left-at-least-9-million-devices-opened-to-everyones-eyes/</loc>
		<lastmod>2018-10-12T05:31:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/12/weapons-controlling-systems-of-the-us-army-could-be-easily-hacked/</loc>
		<lastmod>2018-10-12T05:33:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/13/30-million-facebook-users-affected-by-hacking/</loc>
		<lastmod>2018-10-13T02:05:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/13/hp-computers-crash-after-installing-windows-10-updates/</loc>
		<lastmod>2018-10-13T02:07:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/13/vulnerabilities-affect-shopify-tinder-and-many-other-sites/</loc>
		<lastmod>2018-10-13T02:09:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/13/hackers-use-googlebot-in-mining-malware-attacks/</loc>
		<lastmod>2018-10-13T02:11:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/16/juniper-networks-launches-multiple-solutions-for-junos-os-vulnerabilities/</loc>
		<lastmod>2018-10-16T03:06:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/16/three-out-of-four-employees-represent-a-security-risk-for-organizations-in-us/</loc>
		<lastmod>2018-10-16T03:09:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/16/notpetya-linked-to-the-industroyer-attack-against-energy-infrastructure-in-ukraine/</loc>
		<lastmod>2018-10-16T03:17:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/16/data-breach-in-pentagons-service-provider-affected-30k-people/</loc>
		<lastmod>2018-10-16T03:20:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/16/cryptojacking-attacks-against-iphone-devices-increase/</loc>
		<lastmod>2018-10-16T03:22:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/17/vulnerability-in-apple-voiceover-allows-hackers-access-to-user-photos/</loc>
		<lastmod>2018-10-17T01:32:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/17/hidden-cameras-in-road-signs/</loc>
		<lastmod>2018-10-17T01:34:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/17/over-30-million-voter-registrations-for-sale-in-a-hacking-forum/</loc>
		<lastmod>2018-10-17T01:36:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/17/vulnerability-in-voting-machines-has-not-been-corrected-after-11-years/</loc>
		<lastmod>2018-10-17T01:38:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/17/there-will-be-no-identity-theft-protection-for-users-affected-by-facebook-hacking/</loc>
		<lastmod>2018-10-17T01:40:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/18/google-removes-restrictions-for-android-device-manufacturers/</loc>
		<lastmod>2018-10-18T01:23:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/18/seo-pollution-campaign-affects-web-searches-related-to-eu-midterm-elections/</loc>
		<lastmod>2018-10-18T01:25:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/18/united-kingdom-faces-10-cyberattacks-per-week/</loc>
		<lastmod>2018-10-18T01:28:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/18/luminositylink-tool-creator-sentenced-to-30-months-in-prison/</loc>
		<lastmod>2018-10-18T01:30:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/18/playstation-4-consoles-collapse-due-to-text-bomb/</loc>
		<lastmod>2018-10-18T01:32:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
</urlset><!-- <p>Please edit wp-db.inc.php in wp-includes and set SAVEQUERIES to true if you want to see the queries.</p> --> <!-- Request ID: 99b6ce29f4f298953897ee95bfaffe7d; Queries for sitemap: 2; Total queries: 51; Seconds: 0.09; Memory for sitemap: 2MB; Total memory: 16MB -->
