<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet type='text/xsl' href='https://www.securitynewspaper.com/snnews_pl/google-sitemap-generator/sitemap.xsl'?><!-- sitemap-generator-url='http://www.arnebrachhold.de' sitemap-generator-version='4.1.23' -->
<!-- generated-on='May 17, 2026 4:17 am' -->
<urlset xmlns:xsi='http://www.w3.org/2001/XMLSchema-instance' xsi:schemaLocation='http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd' xmlns='http://www.sitemaps.org/schemas/sitemap/0.9'>	<url>
		<loc>https://www.securitynewspaper.com/2018/10/19/authorities-seize-properties-of-creators-of-infamous-cheat-code-for-gta-v/</loc>
		<lastmod>2018-10-19T02:14:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/19/three-critical-vulnerabilities-can-be-chained-to-take-full-control-of-d-link-routers/</loc>
		<lastmod>2018-10-19T02:17:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/19/the-pentagon-is-looking-for-new-talents-in-it/</loc>
		<lastmod>2018-10-19T02:19:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/19/vulnerability-in-tumblr-could-have-compromise-users-account-data/</loc>
		<lastmod>2018-10-19T02:24:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/19/the-main-browsers-will-stop-using-tls-1-0-and-tls-1-1-heading-to-2022/</loc>
		<lastmod>2018-10-19T02:25:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/20/vulnerabilities-in-telepresence-robots-allow-access-to-image-and-video/</loc>
		<lastmod>2018-10-20T02:32:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/20/manager-who-worked-for-equifax-is-convicted-because-insider-information-abuse/</loc>
		<lastmod>2018-10-20T02:41:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/20/hackers-have-their-eyes-on-keyless-cars/</loc>
		<lastmod>2021-04-26T15:36:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/23/security-check-in-facebook/</loc>
		<lastmod>2018-10-23T03:20:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/23/live555-streaming-library-affected-by-remote-code-execution-vulnerability/</loc>
		<lastmod>2018-10-23T03:22:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/23/possible-risks-electronic-voting-technology-is-facing/</loc>
		<lastmod>2018-10-23T03:25:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/23/hacking-operations-with-darkpulsar-and-other-tools-developed-by-the-nsa/</loc>
		<lastmod>2018-10-23T03:27:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/24/a-jquery-plugin-has-been-exploitable-for-8-years/</loc>
		<lastmod>2018-10-24T02:06:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/24/data-sharing-in-apps-lacks-of-any-control/</loc>
		<lastmod>2018-10-24T02:02:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/24/over-9-million-fake-comments-on-net-neutrality/</loc>
		<lastmod>2018-10-24T02:04:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/24/china-asks-blockchain-based-service-providers-to-control-user-information/</loc>
		<lastmod>2018-10-24T02:06:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/24/ethical-hackers-the-us-governments-alternative-to-secure-medical-devices/</loc>
		<lastmod>2018-10-24T02:08:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/25/west-haven-pays-2k-usd-because-of-ransomware-attack/</loc>
		<lastmod>2018-10-25T03:01:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/25/windows-10-bug-overwrites-files-without-confirmation/</loc>
		<lastmod>2018-10-25T03:02:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/25/twitter-intelligence/</loc>
		<lastmod>2018-10-25T03:06:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/25/hackers-steal-a-tesla-model-s-using-just-a-tablet/</loc>
		<lastmod>2018-10-25T03:09:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/25/emergency-in-banco-de-mexico-because-of-hacking-against-axa/</loc>
		<lastmod>2018-10-25T03:10:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/25/windows-zero-day-by-sandboxescaper/</loc>
		<lastmod>2018-10-25T16:38:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/25/beware-of-android-utility-apps/</loc>
		<lastmod>2018-10-25T16:51:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/26/russian-sabotage-in-saudi-petrochemicals/</loc>
		<lastmod>2018-10-26T02:01:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/26/second-attack-against-british-airways-is-disclosed/</loc>
		<lastmod>2018-10-26T02:02:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/26/zero-day-vulnerability-in-windows-allows-privileges-escalation/</loc>
		<lastmod>2018-10-26T02:04:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/26/hackers-attack-cathay-pacific/</loc>
		<lastmod>2018-10-26T02:06:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/26/recondog-v2-0/</loc>
		<lastmod>2018-10-26T02:08:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/27/trumps-smartphone-might-be-the-way-to-the-biggest-known-security-breach/</loc>
		<lastmod>2018-10-27T02:30:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/27/cisco-launches-patches-for-vulnerabilities-in-webex-meetings-app/</loc>
		<lastmod>2018-10-27T02:37:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/27/decrypt-files-attacked-with-the-latest-versions-of-gandcrab-ransomware/</loc>
		<lastmod>2018-10-27T02:40:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/27/the-pentagon-expands-the-scope-of-its-vulnerability-bounty-program/</loc>
		<lastmod>2018-10-27T02:42:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/27/video-come-to-life-with-5g-technology/</loc>
		<lastmod>2018-10-27T02:46:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/30/attacking-a-website-just-for-a-few-dollars/</loc>
		<lastmod>2018-10-30T02:57:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/30/feature-to-attach-video-to-word-files-could-be-used-to-send-malicious-code/</loc>
		<lastmod>2018-10-30T03:00:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/30/malicious-hackers-and-their-interest-in-bypassing-captcha/</loc>
		<lastmod>2018-10-30T03:11:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/30/multiple-linux-distributions-affected-by-new-vulnerability/</loc>
		<lastmod>2018-10-30T03:13:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/31/pornhub-and-its-method-to-bypass-indias-porn-sites-ban/</loc>
		<lastmod>2018-10-31T03:01:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/31/12-malicious-libraries-found-in-python-pypi/</loc>
		<lastmod>2018-10-31T03:02:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/31/altering-digital-rights-to-modify-devices-will-be-allowed-in-the-us/</loc>
		<lastmod>2018-10-31T03:05:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/31/windows-10-universal-windows-platform-vulnerability/</loc>
		<lastmod>2018-10-31T03:07:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/10/31/a-dhcpv6-package-could-compromise-a-vulnerable-linux-system/</loc>
		<lastmod>2018-10-31T03:10:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/01/government-employee-who-used-to-watch-porn-at-work-alleged-guilty-of-infecting-with-malware-a-network/</loc>
		<lastmod>2018-11-01T12:44:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/01/tips-to-avoid-computer-fraud/</loc>
		<lastmod>2018-11-01T12:46:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/01/australian-intelligence-backs-prohibition-against-huawei-and-zte/</loc>
		<lastmod>2018-11-01T12:49:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/01/uk-considers-banning-cryptocurrencies-for-their-lack-of-intrinsic-value/</loc>
		<lastmod>2018-11-01T12:55:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/01/united-states-chinese-spies-are-behind-massive-hacking-that-stole-aviation-secrets/</loc>
		<lastmod>2018-11-01T12:58:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/02/search-for-installing-chrome-on-bing-can-lead-to-malicious-content/</loc>
		<lastmod>2018-11-02T03:02:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/02/trading-with-cryptocurrencies-without-losing-self-control/</loc>
		<lastmod>2018-11-02T03:03:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/02/iran-has-become-victim-of-a-cyberattack-campaign/</loc>
		<lastmod>2018-11-02T03:05:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/02/85-million-voter-records-on-sale/</loc>
		<lastmod>2018-11-02T03:06:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/02/data-theft-at-radisson-hotel-group/</loc>
		<lastmod>2018-11-02T03:07:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/02/find-hidden-subdomains-with-dnsmap/</loc>
		<lastmod>2019-04-26T19:01:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/02/dns-enumeration/</loc>
		<lastmod>2019-04-26T19:01:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/06/two-zero-day-vulnerabilities-expose-millions-of-access-points/</loc>
		<lastmod>2018-11-06T02:05:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/06/over-80k-messages-of-hacked-facebook-accounts-for-sale/</loc>
		<lastmod>2018-11-06T02:07:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/06/us-senator-gets-ready-to-submit-bill-against-user-privacy-violation/</loc>
		<lastmod>2018-11-06T02:13:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/06/vulnerability-in-icecast-can-collapse-online-radio-stations/</loc>
		<lastmod>2018-11-06T02:12:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/06/30-spies-have-died-because-of-irans-cyberattacks-against-the-cia/</loc>
		<lastmod>2018-11-06T02:18:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/07/vulnerabilities-in-self-encrypted-ssd-allow-attackers-to-bypass-disk-encryption/</loc>
		<lastmod>2018-11-07T02:24:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/07/five-guys-suffers-employees-data-theft/</loc>
		<lastmod>2018-11-07T02:26:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/07/tool-to-find-vulnerable-cameras/</loc>
		<lastmod>2018-11-07T02:28:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/07/linux-servers-and-iot-devices-main-targets-of-shellbot-botnet/</loc>
		<lastmod>2018-11-07T02:30:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/07/personal-data-of-police-and-ministries-employees-leaked-by-anonymous-italy/</loc>
		<lastmod>2018-11-07T02:32:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/08/hsbc-confirms-data-theft-in-the-united-states/</loc>
		<lastmod>2018-11-08T05:41:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/08/by-decree-of-russian-government-the-users-of-messaging-services-must-be-identified/</loc>
		<lastmod>2018-11-08T05:44:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/08/security-breach-at-statcounter/</loc>
		<lastmod>2018-11-08T05:48:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/08/animal-traffic-via-darknet-is-increasing-in-india/</loc>
		<lastmod>2018-11-08T05:50:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/08/apache-struts-developers-beg-users-to-update-library/</loc>
		<lastmod>2018-11-08T05:53:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/09/hack-the-air-force-3-0-new-vulnerability-bounty-program/</loc>
		<lastmod>2018-11-09T03:04:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/09/exposed-data-of-nearly-700k-american-express-india-customers/</loc>
		<lastmod>2018-11-09T03:06:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/09/tatooine-the-us-armys-cyber-training-facilities/</loc>
		<lastmod>2018-11-09T03:07:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/09/combination-of-bugs-in-wordpress-and-woocommerce-allows-website-hijacking/</loc>
		<lastmod>2018-11-09T03:10:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/10/fifa-is-hacked-once-again/</loc>
		<lastmod>2018-11-10T02:51:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/10/vulnerabilities-in-dji-drone-manufacturer/</loc>
		<lastmod>2018-11-10T02:53:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/10/pakistani-banks-suffer-data-breach/</loc>
		<lastmod>2018-11-10T02:55:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/10/botnet-infects-over-400krouters-for-spam-campaign/</loc>
		<lastmod>2018-11-10T02:57:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/10/researchers-reveal-the-malware-used-by-north-korean-hackers-to-attack-atms/</loc>
		<lastmod>2018-11-10T02:59:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/13/illegal-cryptocurrency-mining/</loc>
		<lastmod>2018-11-13T02:43:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/13/compromised-security-in-millions-of-cards-in-the-us/</loc>
		<lastmod>2018-11-13T02:46:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/13/zero-day-vulnerability-in-virtualbox-is-disclosed/</loc>
		<lastmod>2018-11-13T02:48:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/13/steam-error-allowed-people-to-download-any-game-for-free/</loc>
		<lastmod>2018-11-13T02:51:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/13/webmap-a-web-dashboard-for-nmap-xml-report/</loc>
		<lastmod>2018-11-13T02:56:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/13/footprinting-with-dnsrecon/</loc>
		<lastmod>2018-11-13T05:32:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/13/find-fake-names-of-your-websites/</loc>
		<lastmod>2018-11-13T05:41:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/14/controller-and-processor-responsibilities-a-crucial-part-of-the-gdpr/</loc>
		<lastmod>2018-11-14T17:47:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/14/google-services-collapsed-due-to-bgp-leak/</loc>
		<lastmod>2018-11-14T17:48:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/14/it-took-six-months-for-cathay-pacific-to-reveal-security-breach/</loc>
		<lastmod>2018-11-14T17:49:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/14/hidden-cameras-in-streetlights/</loc>
		<lastmod>2018-11-14T17:51:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/14/find-hidden-directories-on-web-server/</loc>
		<lastmod>2018-11-14T18:01:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/14/dns-enumeration-using-dnstracer/</loc>
		<lastmod>2018-11-14T18:07:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/14/hacking-websites-with-w3af/</loc>
		<lastmod>2018-11-14T18:10:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/15/hacking-an-atm-as-easy-as-using-windows-xp/</loc>
		<lastmod>2018-11-15T02:51:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/15/63-new-vulnerabilities-found-in-windows/</loc>
		<lastmod>2018-11-15T02:53:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/15/data-breach-at-nordstrom/</loc>
		<lastmod>2018-11-15T02:54:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/15/facebook-fixed-a-new-security-bug/</loc>
		<lastmod>2018-11-15T11:28:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/15/scan-websites-with-wapiti/</loc>
		<lastmod>2018-11-15T03:00:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/15/find-vulnerabilities-using-nikto/</loc>
		<lastmod>2018-11-15T03:06:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/15/clone-any-website-with-httrack/</loc>
		<lastmod>2018-11-15T03:08:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/16/germany-seeks-to-ban-chinese-companies-from-its-5g-structure-implementation/</loc>
		<lastmod>2018-11-16T02:41:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/16/new-variants-of-meltdown-and-spectre-cause-information-leaks/</loc>
		<lastmod>2018-11-16T02:42:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/16/pwn2own-tokyo-2018-ethical-hacking-event/</loc>
		<lastmod>2018-11-16T02:43:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/16/metadata-what-is-it-and-why-is-it-important/</loc>
		<lastmod>2018-11-16T09:47:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/16/find-employees-working-in-a-company/</loc>
		<lastmod>2019-04-26T19:02:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/17/misconfigurations-on-docker-services-allow-cryptojacking-attacks/</loc>
		<lastmod>2018-11-17T03:03:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/17/japanese-cybersecurity-minister-has-never-used-a-computer/</loc>
		<lastmod>2018-11-17T03:04:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/17/court-attributes-john-mcafee-liability-for-the-death-of-a-neighbor/</loc>
		<lastmod>2018-11-17T03:06:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/17/us-approves-bill-for-creation-of-new-cybersecurity-agency/</loc>
		<lastmod>2018-11-17T06:36:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/19/wpscan/</loc>
		<lastmod>2019-04-26T19:02:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/19/inspects-the-deep-web-url-with-onioff/</loc>
		<lastmod>2019-04-26T19:03:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/19/extract-info-from-windows-machine-using-enum4linux/</loc>
		<lastmod>2019-04-26T19:03:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/19/footprinting-a-target-with-datasploit/</loc>
		<lastmod>2019-04-26T19:03:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/19/create-wordlist-from-twitter-using-twofi/</loc>
		<lastmod>2021-07-23T20:58:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/20/scan-joomla-websites-using-joomscan/</loc>
		<lastmod>2019-04-26T17:43:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/20/scan-your-lan-for-vulnerabilities/</loc>
		<lastmod>2019-04-26T17:43:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/21/how-to-find-is-link-malicious-url-or-not/</loc>
		<lastmod>2019-04-26T17:43:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/21/what-is-that-website-whatweb/</loc>
		<lastmod>2019-04-26T17:55:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/21/evade-using-proxychains/</loc>
		<lastmod>2019-04-26T17:45:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/21/tor-exit-relay-scanner-using-exitmap/</loc>
		<lastmod>2019-04-26T17:53:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/21/uncover-virtual-hosts-of-domain-with-fierce/</loc>
		<lastmod>2019-04-26T17:47:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/21/german-government-issues-recommendations-on-router-security/</loc>
		<lastmod>2018-11-21T03:28:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/21/two-hackers-imprisoned-for-the-attack-against-talktalk-in-2015/</loc>
		<lastmod>2018-11-21T03:29:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/21/malaysias-largest-media-company-becomes-victim-of-a-ransomware-attack/</loc>
		<lastmod>2018-11-21T03:31:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/21/security-breach-at-radisson-reward-program/</loc>
		<lastmod>2018-11-21T03:33:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/22/chaos-in-amazon-days-before-black-friday/</loc>
		<lastmod>2018-11-22T01:01:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/22/a-javascript-could-spy-on-browser-tabs-to-find-out-what-sites-the-user-visits/</loc>
		<lastmod>2018-11-22T01:00:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/22/instagram-security-error-exposes-users-passwords/</loc>
		<lastmod>2018-11-22T00:58:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/22/data-breaches-in-schools-how-should-an-academic-institution-report-a-security-incident/</loc>
		<lastmod>2018-11-22T00:54:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/22/use-dig-for-footprinting/</loc>
		<lastmod>2019-04-26T17:48:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/22/ssl-vulnerability-scanner-massbleed/</loc>
		<lastmod>2019-04-26T17:48:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/23/how-could-passwordless-internet-work/</loc>
		<lastmod>2018-11-23T00:47:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/23/success-in-cbp-facial-recognition-program/</loc>
		<lastmod>2018-11-23T00:50:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/23/over-500k-play-store-users-have-installed-13-games-that-contain-malware/</loc>
		<lastmod>2018-11-23T00:52:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/23/60-million-users-data-were-exposed-by-the-us-postal-service/</loc>
		<lastmod>2018-11-23T00:55:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/23/use-nslookup-for-footprinting/</loc>
		<lastmod>2019-04-26T17:49:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/23/recon-ng-good-tool-for-information-gathering/</loc>
		<lastmod>2019-04-26T17:50:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/23/eu-asks-allies-to-boycott-chinese-companies/</loc>
		<lastmod>2018-11-23T22:40:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/23/data-breach-in-osisoft/</loc>
		<lastmod>2018-11-23T22:42:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/25/babysploit-an-beginner-pentesting-tool/</loc>
		<lastmod>2019-04-25T19:04:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/27/united-kingdom-seizes-internal-facebook-documents/</loc>
		<lastmod>2018-11-27T00:33:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/27/a-very-simple-spotify-phishing-campaign/</loc>
		<lastmod>2018-11-27T00:36:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/27/linux-mining-software-could-steal-passwords-and-disable-antivirus/</loc>
		<lastmod>2018-11-27T00:39:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/27/find-webcams-databases-boats-in-the-sea-using-shodan/</loc>
		<lastmod>2019-04-25T19:05:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/27/crack-windows-password-with-john-the-ripper/</loc>
		<lastmod>2021-07-05T10:15:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/28/facebook-will-pay-you-40k-usd-for-reporting-bug/</loc>
		<lastmod>2018-11-28T00:23:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/28/leaking-data-with-smart-bulbs/</loc>
		<lastmod>2018-11-28T00:26:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/28/1-2m-usd-fine-for-uber-because-of-delay-of-data-breach-report/</loc>
		<lastmod>2018-11-28T00:29:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/28/netbios-over-tcp-ip-nbtstat-usage-in-detail/</loc>
		<lastmod>2019-04-25T19:05:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/28/create-your-own-wordlist-with-crunch/</loc>
		<lastmod>2021-07-23T20:57:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/28/the-fbi-shuts-down-a-millionaire-online-fraud-campaign/</loc>
		<lastmod>2018-11-28T23:49:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/28/pirated-smash-bros-ultimate-copy-for-sale-in-mexico-before-launching-date/</loc>
		<lastmod>2018-11-28T23:54:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/28/data-breach-in-atrium-health-exposes-nearly-3-million-records/</loc>
		<lastmod>2018-11-28T23:58:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/29/track-people-on-internet-trape-demo-tutorial/</loc>
		<lastmod>2019-04-25T19:05:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/29/xss-shell-cross-site-scripting/</loc>
		<lastmod>2019-04-25T19:06:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/30/security-breach-at-dells-website/</loc>
		<lastmod>2018-11-30T00:05:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/30/lenovo-must-pay-7-3m-usd-for-installing-adware-on-thousands-of-laptops/</loc>
		<lastmod>2018-11-30T00:09:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/11/30/marriott-hotel-group-gets-hacked-500-million-customers-affected/</loc>
		<lastmod>2018-12-01T21:06:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/01/critical-zoom-vulnerability-allows-series-of-malicious-actions/</loc>
		<lastmod>2018-12-01T00:01:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/02/how-to-be-anonymous-on-internet/</loc>
		<lastmod>2019-04-25T19:07:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/04/sky-brazil-hacked-over-30-million-users-affected/</loc>
		<lastmod>2018-12-04T00:26:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/04/massive-printer-hacking-to-spread-pro-youtuber-campaign/</loc>
		<lastmod>2018-12-04T00:32:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/04/aclu-asks-court-to-unseal-docs-on-us-government-demands-to-facebook/</loc>
		<lastmod>2018-12-04T00:35:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/04/detect-web-application-firewall-waf-before-you-attack/</loc>
		<lastmod>2019-04-25T19:07:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/05/pharmaceutical-companies-cybercriminals-favorite-targets/</loc>
		<lastmod>2018-12-05T01:50:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/05/quora-gets-hacked-millions-of-users-affected/</loc>
		<lastmod>2018-12-05T01:51:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/05/users-infected-with-ransomware-will-not-be-able-to-pay-to-recover-their-files/</loc>
		<lastmod>2018-12-05T01:52:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/06/hackers-stole-payment-card-data-of-1-800-flowers-website/</loc>
		<lastmod>2018-12-06T00:47:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/06/thousands-of-pcs-infected-with-new-ransomware-variant-in-china/</loc>
		<lastmod>2018-12-06T00:58:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/07/governments-are-spying-whatsapp-and-telegram-chat-groups-via-silent-members/</loc>
		<lastmod>2018-12-07T00:39:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/08/new-car-hacking-tool-developed-by-toyota/</loc>
		<lastmod>2018-12-08T01:07:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/08/linux-users-with-limited-privileges-could-execute-any-command/</loc>
		<lastmod>2018-12-08T01:11:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/08/anti-encryption-bill-is-approved-in-australia/</loc>
		<lastmod>2018-12-08T01:15:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/08/spying-on-3g-5g-users-with-just-a-1-5k-usd-investment/</loc>
		<lastmod>2018-12-08T01:19:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/08/start-hacking-any-company-with-infoga/</loc>
		<lastmod>2019-04-25T17:56:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/08/search-sensitive-data-through-metagoofil/</loc>
		<lastmod>2019-04-25T17:57:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/10/network-analyzer-p0f/</loc>
		<lastmod>2019-04-25T17:58:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/10/list-of-all-open-ftp-servers-in-the-world/</loc>
		<lastmod>2021-07-05T10:13:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/11/a-new-wifi-hacking-method-for-wpa-wpa2/</loc>
		<lastmod>2018-12-11T00:39:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/11/worldwide-universities-attacked-by-north-korean-hackers/</loc>
		<lastmod>2018-12-11T00:43:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/11/massive-arrest-of-currency-counterfeiters-operating-in-dark-web/</loc>
		<lastmod>2018-12-11T00:45:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/11/marriott-will-pay-cost-of-new-passport-process-to-users-affected-by-data-breach/</loc>
		<lastmod>2018-12-11T00:48:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/11/scan-crack-passwords-using-sparta/</loc>
		<lastmod>2019-04-25T17:59:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/12/critical-vulnerabilities-in-phpmyadmin/</loc>
		<lastmod>2018-12-12T00:50:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/12/certification-authorities-a-weak-point-for-web-cryptography/</loc>
		<lastmod>2018-12-12T00:53:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/12/google-to-be-shut-down-before-expected-due-to-new-bug/</loc>
		<lastmod>2018-12-12T00:55:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/12/citrix-forced-its-users-to-change-passwords-due-to-cyberattack-threat/</loc>
		<lastmod>2018-12-12T01:01:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/13/11m-usd-fine-for-facebook-for-non-compliance-with-privacy-rules/</loc>
		<lastmod>2018-12-13T00:29:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/13/ticketmaster-claims-that-data-breach-on-its-website-was-not-its-fault/</loc>
		<lastmod>2018-12-13T00:33:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/13/126-vulnerabilities-patched-in-microsoft-and-adobe-this-december-2018/</loc>
		<lastmod>2018-12-13T00:37:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/13/is-pentagons-military-cloud-cyberwar-cloud-security-in-the-hands-of-a-russian-provider/</loc>
		<lastmod>2018-12-13T00:42:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/14/sharpshooter-cyberattack-campaign-against-critical-infrastructure-in-u-s-and-latin-america/</loc>
		<lastmod>2018-12-14T00:28:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/14/microsoft-bug-exposes-400-million-outlook-and-office-360-accounts/</loc>
		<lastmod>2018-12-14T00:32:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/14/keep-your-data-secured-when-using-social-networks/</loc>
		<lastmod>2018-12-14T00:38:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/14/medusa-crack-windows-password/</loc>
		<lastmod>2019-04-25T18:00:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/14/monitor-traffic-using-mitm-man-in-the-middle-attack/</loc>
		<lastmod>2019-04-25T18:00:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/15/gitlab-offers-exclusive-rewards-in-its-vulnerability-bounty-program/</loc>
		<lastmod>2018-12-15T00:56:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/15/spam-posts-threaten-with-detonating-bombs-if-bitcoins-are-not-paid/</loc>
		<lastmod>2018-12-15T00:59:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/15/vulnerability-in-samsung-exposed-user-accounts/</loc>
		<lastmod>2018-12-15T01:01:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/15/over-100-million-records-of-brazilian-taxpayers-breached/</loc>
		<lastmod>2018-12-15T01:05:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/15/taylor-swift-uses-facial-recognition-in-one-of-her-concerts/</loc>
		<lastmod>2018-12-15T01:08:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/17/do-reconnaissance-on-the-target-using-maltego/</loc>
		<lastmod>2019-04-25T18:00:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/17/the-robot-future-of-terminals/</loc>
		<lastmod>2019-04-25T18:01:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/18/u-s-ballistic-missile-defense-systems-vulnerable-to-cyberattacks/</loc>
		<lastmod>2018-12-18T00:19:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/18/printerhack2-hackers-attack-again-and-compromise-100k-printers/</loc>
		<lastmod>2018-12-18T00:26:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/18/critical-vulnerability-in-sqlite-you-should-update-now/</loc>
		<lastmod>2018-12-18T00:32:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/18/london-police-set-to-test-face-recognition-technology-on-citizens/</loc>
		<lastmod>2018-12-18T00:37:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/18/please-delete-your-files-facebook-exposes-private-photos-of-millions-of-users-again/</loc>
		<lastmod>2018-12-18T00:42:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/18/hire-for-ddos-service-for-just-20/</loc>
		<lastmod>2019-04-25T18:02:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/19/hackers-used-memes-posted-on-twitter-to-control-malware/</loc>
		<lastmod>2018-12-19T01:46:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/19/cyberattack-against-twitter-might-have-been-sponsored-by-a-government/</loc>
		<lastmod>2018-12-19T01:44:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/19/kingdom-hearts-3copies-were-leaked-in-u-s-and-latin-america/</loc>
		<lastmod>2018-12-19T01:51:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/19/delete-your-personal-information-from-the-internet-and-recover-your-privacy/</loc>
		<lastmod>2018-12-19T01:56:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/20/captcha-is-not-enough-to-stop-spambots/</loc>
		<lastmod>2018-12-20T00:43:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/20/these-are-worst-cyberthreats-of-2018/</loc>
		<lastmod>2018-12-20T00:51:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/20/windows-sandbox-the-new-way-to-open-malicious-files-on-windows-10/</loc>
		<lastmod>2018-12-20T00:55:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/20/european-union-diplomatic-communications-got-hacked/</loc>
		<lastmod>2018-12-20T01:01:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/20/nasa-gets-hacked-employees-personal-data-leaked/</loc>
		<lastmod>2018-12-20T21:05:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/20/facebook-shares-users-private-data-with-spotify-netflix-microsoft-and-amazon/</loc>
		<lastmod>2018-12-20T21:15:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/20/zero-day-vulnerability-in-microsoft-internet-explorer-update-your-system-now/</loc>
		<lastmod>2018-12-20T21:14:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/21/fbi-seizes-multiple-websites-offering-ddos-attacks-for-hire/</loc>
		<lastmod>2018-12-21T23:52:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/21/huawei-router-used-in-u-s-and-latin-america-vulnerable-to-new-attack/</loc>
		<lastmod>2018-12-21T23:57:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/22/cryptocurrency-mining-increased-4000-this-year/</loc>
		<lastmod>2018-12-22T00:02:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/22/iot-malware-grows-over-200-during-2018/</loc>
		<lastmod>2018-12-22T00:05:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/23/list-of-credit-cards-proxies-on-deep-web/</loc>
		<lastmod>2019-04-25T18:05:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/25/zoomeye-find-open-servers-webcams-porn-sites-vulnerabilities/</loc>
		<lastmod>2019-04-24T19:44:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/26/hosting-your-own-onion-domain/</loc>
		<lastmod>2019-04-24T19:26:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/26/thousands-of-orange-routers-are-leaking-wifi-passwords/</loc>
		<lastmod>2018-12-26T23:45:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/26/data-breach-affects-over-500k-students-and-employees/</loc>
		<lastmod>2018-12-26T23:49:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/26/how-to-identify-and-remove-social-network-virus-off-your-devices/</loc>
		<lastmod>2018-12-26T23:54:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/26/%ef%bb%bfnew-version-of-wordpress-now-available-please-update-your-website/</loc>
		<lastmod>2018-12-26T23:58:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/27/pocsuite-remote-vulnerability-tester/</loc>
		<lastmod>2019-04-24T19:08:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/28/linux-servers-infected-with-new-ransomware-variant/</loc>
		<lastmod>2018-12-28T00:11:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/28/records-of-thousands-of-children-and-teenagers-for-sale-in-dark-web-forums/</loc>
		<lastmod>2018-12-28T00:15:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/28/cybercriminals-attack-hewlett-packard-and-ibm-networks-and-servers/</loc>
		<lastmod>2018-12-28T00:20:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/29/hackers-take-control-over-online-accounts-using-voicemail-services/</loc>
		<lastmod>2018-12-29T00:32:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/29/playstation-classic-easy-to-hack-due-to-cryptographic-flaws/</loc>
		<lastmod>2018-12-29T00:35:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/29/researchers-managed-to-hack-hardware-wallets/</loc>
		<lastmod>2018-12-29T00:40:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/29/guardzilla-security-cameras-are-leaking-users-recordings/</loc>
		<lastmod>2018-12-29T00:44:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2018/12/31/do-you-know-what-is-malvertising/</loc>
		<lastmod>2019-04-24T19:00:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/01/hack-any-website-with-all-in-one-tool/</loc>
		<lastmod>2021-09-28T12:15:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/02/do-hacking-with-simple-python-script/</loc>
		<lastmod>2019-09-04T03:31:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/02/fake-any-website-in-seconds-facebook-snapchat-instagram/</loc>
		<lastmod>2021-07-05T10:16:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/03/cyberattacks-against-newspapers-continue/</loc>
		<lastmod>2019-01-03T00:50:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/03/zero-day-vulnerability-in-windows-allows-files-overwriting/</loc>
		<lastmod>2019-01-03T00:54:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/03/open-source-software-vulnerability-bounty-program/</loc>
		<lastmod>2019-01-03T00:57:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/03/hacker-group-launches-cyberattack-campaign-against-lawyer-firms/</loc>
		<lastmod>2019-01-03T01:01:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/03/casthack-thousands-of-chromecast-google-home-and-smart-tvs-hacked/</loc>
		<lastmod>2019-01-03T01:07:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/04/cloud-service-providers-servers-infected-with-ransomware/</loc>
		<lastmod>2019-01-04T00:04:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/04/abine-exposes-nearly-3-million-users-information/</loc>
		<lastmod>2019-01-04T00:10:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/04/hack-any-twitter-account-with-tinfoleak/</loc>
		<lastmod>2019-04-24T18:54:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/05/answering-a-skype-call-allows-taking-control-of-any-android-smartphone/</loc>
		<lastmod>2019-01-05T00:32:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/05/tripadvisor-yelp-kayak-travel-apps-share-details-of-your-trips-with-facebook/</loc>
		<lastmod>2019-01-05T00:38:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/05/data-breach-in-town-of-salem-videogame-affects-over-7-million-users/</loc>
		<lastmod>2019-01-05T00:40:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/05/new-usb-c-protocols-offer-protection-against-malware-and-malicious-devices/</loc>
		<lastmod>2019-01-05T00:44:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/05/necuno-new-linux-smartphone-with-better-security-and-privacy/</loc>
		<lastmod>2019-01-05T00:47:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/07/one-php-script-to-gather-information-about-any-target/</loc>
		<lastmod>2019-04-24T18:52:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/07/hack-secret-keys-emails-subdomains-dns-of-any-company-website/</loc>
		<lastmod>2019-04-24T18:52:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/08/emergency-messaging-system-is-hacked-citizens-information-data-breach/</loc>
		<lastmod>2019-01-08T00:51:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/08/weather-channel-weather-app-are-selling-users-location-data/</loc>
		<lastmod>2019-01-08T00:54:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/08/hundreds-of-german-politicians-hacked-personal-data-exposed-online/</loc>
		<lastmod>2019-01-08T00:58:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/09/%ef%bb%bftwitter-api-reveals-users-location/</loc>
		<lastmod>2019-01-09T00:43:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/09/cyberattack-against-ethereum-classic-cryptocurrency-will-be-removed-from-coinbase/</loc>
		<lastmod>2019-01-09T00:51:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/09/u-s-senate-introduces-bill-against-chinese-cyberthreats/</loc>
		<lastmod>2019-01-09T00:56:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/09/the-germany-politicians-hacker-is-just-an-angry-20-years-old-man/</loc>
		<lastmod>2019-01-09T01:01:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/09/hackers-attack-manufacturing-companies-costumers-payment-information-stolen/</loc>
		<lastmod>2019-01-09T01:45:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/10/recently-found-critical-vulnerabilities-in-sap-system/</loc>
		<lastmod>2019-01-10T00:40:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/10/%ef%bb%bftelecom-companies-are-selling-users-location-data-again/</loc>
		<lastmod>2019-01-10T00:45:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/10/vulnerabilities-in-automobiles-affect-their-resale-price/</loc>
		<lastmod>2019-01-10T00:51:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/11/over-200-million-jobseekers-get-their-information-exposed-online/</loc>
		<lastmod>2019-01-11T00:36:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/11/%ef%bb%bfhotel-group-launches-its-own-vulnerability-bounty-program/</loc>
		<lastmod>2019-01-11T00:41:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/11/who-hepled-the-fbi-cracking-the-encrypted-chats-of-el-chapo-guzman/</loc>
		<lastmod>2019-01-11T00:55:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/11/a-new-tool-that-allows-you-to-bypass-two-factor-authentication/</loc>
		<lastmod>2019-01-11T01:03:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/11/start-hacking-with-browser-extension/</loc>
		<lastmod>2019-01-11T17:07:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/11/get-location-of-anyone-in-just-300/</loc>
		<lastmod>2019-01-11T17:48:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/12/should-insurer-pay-damages-caused-by-ransomware/</loc>
		<lastmod>2019-01-12T00:16:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/12/pre-installed-malware-on-alcatel-smartphones-makes-online-transactions/</loc>
		<lastmod>2019-01-12T00:20:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/12/users-should-choose-between-using-smart-speakers-or-their-privacy/</loc>
		<lastmod>2020-01-27T08:26:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/12/windows-7-computers-brick-after-microsoft-update/</loc>
		<lastmod>2019-01-12T00:26:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/13/get-geolocation-of-anybody-in-just-few-mins/</loc>
		<lastmod>2019-04-24T18:52:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/15/a-tesla-runs-over-a-transient-robot-terminator-war/</loc>
		<lastmod>2019-01-15T01:16:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/15/do-you-have-the-required-skills-to-work-for-cybercriminals/</loc>
		<lastmod>2019-01-15T01:19:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/16/find-hacked-email-addresses/</loc>
		<lastmod>2019-04-24T18:51:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/16/the-end-of-windows-7-is-near-the-next-year-microsoft-will-stop-launching-support/</loc>
		<lastmod>2019-01-16T01:35:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/16/36-year-old-vulnerabilities-in-scp/</loc>
		<lastmod>2019-01-16T01:38:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/16/police-will-not-be-able-to-unlock-confiscated-smartphones-without-owners-permission/</loc>
		<lastmod>2019-01-16T01:41:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/16/a-ransomware-claiming-to-use-the-money-to-fund-children-cancer-treatments%ef%bb%bf/</loc>
		<lastmod>2019-01-16T01:45:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/16/%ef%bb%bfvulnerability-in-amadeus-systems-exposes-travel-records-of-millions-of-people/</loc>
		<lastmod>2019-01-16T20:13:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/17/vulnerability-in-fortnite-authentication-system-affects-user-accounts/</loc>
		<lastmod>2019-01-17T00:40:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/17/kidnappers-demand-a-ransom-of-almost-1m-usd-in-bitcoins-2/</loc>
		<lastmod>2019-01-17T00:46:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/17/es-file-explorer-file-management-app-for-android-exposes-users-data/</loc>
		<lastmod>2019-01-17T00:51:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/17/how-to-earn-good-money-in-stock-market-with-the-help-of-hackers/</loc>
		<lastmod>2019-01-17T00:57:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/18/millions-of-passwords-exposed-in-dark-web/</loc>
		<lastmod>2019-01-18T01:02:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/18/critical-vulnerabilities-found-in-drupal/</loc>
		<lastmod>2019-01-18T01:05:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/18/over-200-vulnerabilities-found-in-oracle/</loc>
		<lastmod>2019-01-18T01:09:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/18/scan-github-popular-tools-for-hacking/</loc>
		<lastmod>2019-04-24T18:51:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/18/critical-vulnerability-in-cisco-devices-exposes-networks-of-thousands-of-smes%ef%bb%bf/</loc>
		<lastmod>2019-01-18T19:53:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/18/vulnerabilities-found-in-wifi-chips-firmware/</loc>
		<lastmod>2019-01-18T22:33:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/18/twitter-your-private-tweets-were-public-for-years/</loc>
		<lastmod>2019-01-18T23:15:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/19/5-reasons-for-not-doing-the-facebook-10yearchallenge/</loc>
		<lastmod>2019-01-19T00:54:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/20/find-hidden-malware-in-net-program/</loc>
		<lastmod>2019-04-24T18:50:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/20/buy-993-36-gb-of-email-ids-and-passwords-in-40/</loc>
		<lastmod>2019-01-20T20:47:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/21/regulators-impose-e50m-fine-for-google-because-of-privacy-issues/</loc>
		<lastmod>2019-01-21T19:42:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/21/a-bank-was-hacked-using-linkedin-and-skype/</loc>
		<lastmod>2019-01-21T22:21:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/21/whatsapp-vs-fake-news-the-app-will-limit-message-forwarding-to-avoid-misinformation/</loc>
		<lastmod>2019-01-21T23:50:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/22/online-casinos-expose-users-information/</loc>
		<lastmod>2019-01-22T22:07:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/22/users-have-until-february-13th-to-stop-using-tls-sin-01-in-lets-encrypt/</loc>
		<lastmod>2019-01-22T22:26:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/22/phobos-the-new-ransomware-of-dharma-group-infects-hundreds-of-organizations/</loc>
		<lastmod>2019-01-22T23:52:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/23/drug-traffickers-operating-on-dark-web-were-sentenced-to-40-years-in-jail%ef%bb%bf/</loc>
		<lastmod>2019-01-23T00:38:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/23/mysql-vulnerability-allows-servers-files-access/</loc>
		<lastmod>2019-01-23T01:16:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/23/vulnerabilities-allow-remote-access-in-safari-for-iphone-x/</loc>
		<lastmod>2019-01-23T20:16:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/23/thousands-of-web-domains-were-hijacked-due-to-godaddy-vulnerability/</loc>
		<lastmod>2019-01-23T22:09:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/23/hackers-compromised-nest-cameras-trigger-alerts-on-fake-missile-attacks/</loc>
		<lastmod>2019-01-23T23:44:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/24/critical-vulnerability-on-linux-apt-get-in-debian-ubuntu-and-mint-distros/</loc>
		<lastmod>2019-01-24T00:46:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/24/moodys-will-include-cybersecurity-risks-in-corporate-credit-ratings/</loc>
		<lastmod>2019-01-24T16:41:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/24/activists-announce-massive-leaking-of-russian-politicians-emails-on-distributed-denial-of-secrets/</loc>
		<lastmod>2019-01-24T19:57:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/24/vulnerability-in-sky-go-could-leak-users-sensitive-information/</loc>
		<lastmod>2019-01-24T22:28:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/24/anatova-the-new-ransomware-infecting-hundreds-of-devices-around-the-world/</loc>
		<lastmod>2019-01-24T23:54:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/25/attention-torrents-downloaded-from-the-pirate-bay-contain-a-dangerous-malware/</loc>
		<lastmod>2019-01-25T01:28:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/25/jok3r-one-tool-to-do-all-hacking/</loc>
		<lastmod>2019-04-24T18:50:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/25/millions-of-loans-and-mortgages-banking-files-exposed-online/</loc>
		<lastmod>2019-01-25T01:37:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/25/new-ransomware-demands-users-to-pay-10-bitcoin-or-infect-another-thousand-mining-devices/</loc>
		<lastmod>2019-01-25T19:27:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/25/hackers-are-using-network-tunneling-to-bypass-the-firewall-instead-of-rdp/</loc>
		<lastmod>2019-01-25T20:18:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/25/new-malvertising-campaign-attacks-apple-device-users/</loc>
		<lastmod>2019-01-25T23:13:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/26/distributed-denial-o-secrets-a-new-competitor-for-wikileaks/</loc>
		<lastmod>2019-01-26T00:00:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/26/get-hidden-details-of-any-linux-processes-using-procdump/</loc>
		<lastmod>2019-04-24T18:50:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/28/police-departments-decide-to-encrypt-their-radio-communications-press-and-criminals-seem-worried/</loc>
		<lastmod>2019-01-28T19:49:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/28/japan-is-planning-massive-hacking-of-citizens-iot-devices/</loc>
		<lastmod>2019-01-28T22:41:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/28/critical-vulnerabilities-in-cisco-routers-affect-thousands-of-companies-in-the-entire-world/</loc>
		<lastmod>2019-01-28T23:51:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/29/microsoft-365-service-error-causes-outlook-and-exchange-disruption/</loc>
		<lastmod>2019-01-29T00:35:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/29/huawei-accused-of-technological-espionage-and-sanctions-violation/</loc>
		<lastmod>2019-01-29T19:09:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/29/systems-managers-and-ceo-are-dismissed-and-sued-after-massive-health-data-breach/</loc>
		<lastmod>2019-01-29T20:27:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/29/facetime-vulnerability-allows-spying-on-apple-users/</loc>
		<lastmod>2019-01-29T22:50:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/30/data-breach-affects-discover-card-users/</loc>
		<lastmod>2019-01-30T00:06:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/30/new-nintendo-switch-firmware-was-hacked-the-same-day-it-was-released/</loc>
		<lastmod>2019-01-30T21:59:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/30/facebook-spy-on-teens-using-a-vpn/</loc>
		<lastmod>2019-01-30T23:48:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/31/court-rejects-yahoos-proposal-on-massive-data-breach/</loc>
		<lastmod>2019-01-31T00:57:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/31/microsoft-exchange-vulnerability-alert/</loc>
		<lastmod>2019-01-31T01:07:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/31/hack-windows-android-mac-using-thefatrat-step-by-step-tutorial/</loc>
		<lastmod>2021-08-01T17:53:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/31/check-your-microsoft-azure-database-some-of-them-were-mistakenly-deleted/</loc>
		<lastmod>2019-01-31T22:29:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/01/31/skyscanner-launches-its-own-vulnerability-bounty-program/</loc>
		<lastmod>2019-01-31T23:05:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/01/airbus-has-been-hacked-thousands-of-employees-data-stolen/</loc>
		<lastmod>2019-02-01T00:12:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/01/ethical-hacker-faces-prison-time-for-exposing-vulnerabilities-in-a-telecom-company/</loc>
		<lastmod>2019-02-01T20:23:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/01/a-new-malware-using-google-app-engine-to-create-malicious-pdf-files/</loc>
		<lastmod>2019-02-01T21:48:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/01/critical-vulnerabilities-affect-3g-4g-and-upcoming-5g-protocol/</loc>
		<lastmod>2019-02-01T23:20:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/01/massive-data-breach-at-state-bank-of-india/</loc>
		<lastmod>2019-02-01T23:25:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/04/best-forensic-tools-to-hide-secrets-passwords-and-recover-files/</loc>
		<lastmod>2019-04-24T18:48:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/05/top-linux-flavors-for-hacking-security-and-privacy/</loc>
		<lastmod>2019-02-05T03:32:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/05/biometric-analysis-the-new-whatsapp-security-feature/</loc>
		<lastmod>2019-02-05T19:55:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/05/metro-bank-admits-massive-data-breach-with-ss7-attack/</loc>
		<lastmod>2019-02-05T20:26:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/05/police-acts-against-website-offering-for-hire-cyberattack-services/</loc>
		<lastmod>2019-02-05T23:43:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/06/system-manager-steals-1m-usd-using-atm-vulnerability/</loc>
		<lastmod>2019-02-06T00:47:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/06/a-new-dangerous-linux-backdoor-could-trigger-severe-attacks/</loc>
		<lastmod>2019-02-06T01:07:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/06/vulnerability-allows-hacking-an-android-smartphone-using-only-a-png-image/</loc>
		<lastmod>2019-02-06T20:12:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/06/an-energy-company-suffers-data-breach-after-videogame-installation/</loc>
		<lastmod>2019-02-06T20:31:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/07/microsoft-confirms-critical-exchange-vulnerability/</loc>
		<lastmod>2019-02-07T00:13:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/07/duckduckgo-browsers-and-web-pages-dont-respect-do-not-track-request/</loc>
		<lastmod>2019-02-07T01:10:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/07/airlines-expose-board-pass-data/</loc>
		<lastmod>2019-02-07T01:16:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/07/apple-removes-do-not-track-from-the-safari-browser/</loc>
		<lastmod>2019-02-07T20:24:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/07/matrix-the-ransomware-that-analyzes-the-victims-files-to-define-the-ransom-payment/</loc>
		<lastmod>2019-02-07T22:34:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/08/hackers-attacked-bangladesh-bank-over-100m-usd-stolen/</loc>
		<lastmod>2019-02-08T00:51:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/08/dating-app-leaks-millions-of-users-photos/</loc>
		<lastmod>2019-02-08T00:49:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/08/apple-will-grant-a-reward-to-the-teenager-who-discovered-the-facetime-bug-vulnerabilities-will-be-patched/</loc>
		<lastmod>2019-02-08T20:01:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/08/caution-a-phishing-page-using-google-translate/</loc>
		<lastmod>2019-02-08T22:03:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/08/australian-parliament-was-hacked/</loc>
		<lastmod>2019-02-08T22:37:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/09/switzerland-offers-bounties-to-anyone-who-hacks-its-e-voting-system/</loc>
		<lastmod>2019-02-09T01:09:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/09/wells-fargo-service-outage-affects-thousands-of-customers/</loc>
		<lastmod>2019-02-09T19:54:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/09/criminals-in-darknet-seek-to-recruit-business-employees-how-to-prevent/</loc>
		<lastmod>2019-02-09T19:56:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/11/malware-changes-host-files-so-users-cant-update-their-antivirus/</loc>
		<lastmod>2019-02-11T20:21:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/11/malware-found-in-play-store-changes-bitcoin-and-ethereum-addresses-in-your-wallets/</loc>
		<lastmod>2019-02-11T21:46:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/11/new-attack-removes-tls-protocol-encryption/</loc>
		<lastmod>2019-02-11T22:51:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/12/authorities-order-facebook-to-adjust-its-data-collection-policies/</loc>
		<lastmod>2019-02-12T00:00:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/12/users-report-data-breach-in-okcupid-dating-service/</loc>
		<lastmod>2019-02-12T01:05:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/12/russia-will-be-disconnected-from-the-internet-worldwide/</loc>
		<lastmod>2019-02-12T01:36:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/12/vfemail-is-set-to-shut-after-suffering-attack-that-wiped-its-servers/</loc>
		<lastmod>2019-02-12T20:01:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/12/vulnerability-in-xiaomi-scooters-could-put-the-users-life-at-risk/</loc>
		<lastmod>2019-02-12T21:42:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/12/hundreds-of-millions-of-stolen-accounts-for-sale-in-dark-web-forums/</loc>
		<lastmod>2019-02-12T22:59:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/13/v3ntex-new-jailbreak-available-for-ios-12/</loc>
		<lastmod>2019-02-13T00:09:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/13/linux-red-hat-amazon-and-azure-users-using-runtime-container-runc-affected-by-new-vulnerability/</loc>
		<lastmod>2019-02-13T00:59:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/12/easy-ways-to-reset-windows-password/</loc>
		<lastmod>2019-04-23T18:05:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/13/accessing-viewing-or-clicking-on-online-terrorist-content-now-its-a-crime/</loc>
		<lastmod>2019-02-13T19:56:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/13/cibanco-detected-ransomware-attack-some-operations-have-been-restricted%ef%bb%bf/</loc>
		<lastmod>2019-02-13T21:47:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/13/500px-data-breach-exposes-millions-of-users-to-multiple-cyberattacks/</loc>
		<lastmod>2019-02-13T22:47:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/13/the-first-intel-sgx-malware-has-arrived/</loc>
		<lastmod>2019-02-13T23:11:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/13/critical-vulnerability-in-cisco-network-management-tool-network-assurance-engine/</loc>
		<lastmod>2019-02-14T00:05:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/13/safari-vulnerability-allows-stealing-your-browsing-history/</loc>
		<lastmod>2019-02-14T01:18:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/13/find-vulnerability-of-any-target-to-hack/</loc>
		<lastmod>2019-04-23T18:04:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/14/how-to-skip-youtube-ads-on-macbook-pro-devices/</loc>
		<lastmod>2019-02-14T19:26:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/14/data-and-photo-breach-in-dating-app-coffee-meets-bagel/</loc>
		<lastmod>2019-02-14T20:30:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/14/snapd-vulnerability-allows-privileges-escalation-on-linux-systems/</loc>
		<lastmod>2019-02-14T23:25:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/14/14302/</loc>
		<lastmod>2019-02-14T23:38:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/14/hackers-try-to-steal-a-bank-in-malta-security-operation-shutdown-is-implemented/</loc>
		<lastmod>2019-02-15T01:39:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/15/users-lose-followers-because-of-instagram-error/</loc>
		<lastmod>2019-02-15T19:57:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/15/government-agencies-universities-and-political-parties-in-spain-suffer-hacking-attack/</loc>
		<lastmod>2019-02-15T21:43:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/15/it-support-firms-around-the-world-infected-with-gandcrab-ransomware/</loc>
		<lastmod>2019-02-15T22:08:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/15/hack-all-images-of-network-users-and-find-out-what-users-are-accessing-on-network/</loc>
		<lastmod>2019-04-23T18:03:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/17/shodan-gets-more-simpler-using-shodansploit/</loc>
		<lastmod>2019-04-23T18:02:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/17/find-any-exploit-with-one-command/</loc>
		<lastmod>2021-07-23T20:21:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/18/over-90-million-of-stolen-accounts-for-sale-on-dark-web/</loc>
		<lastmod>2019-02-18T20:15:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/18/facebook-grants-25k-usd-bounty-for-critical-vulnerability-report/</loc>
		<lastmod>2019-02-18T21:41:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/18/china-exposes-millions-of-citizens-data/</loc>
		<lastmod>2019-02-18T22:36:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/18/hijack-any-user-using-trevorc2/</loc>
		<lastmod>2019-04-23T16:41:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/18/create-your-own-botnet-step-by-step-tutorial/</loc>
		<lastmod>2019-04-23T16:41:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/19/new-version-of-kali-linux-2019-1-with-metasploit-5-0-available/</loc>
		<lastmod>2019-02-19T19:37:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/19/a-new-tool-to-remove-gandcrab-ransomware-encryption/</loc>
		<lastmod>2019-02-19T20:02:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/19/traffic-of-android-apps-in-tor-network-could-be-detected-with-an-algorithm/</loc>
		<lastmod>2019-02-19T23:33:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/19/according-to-mit-blockchain-is-not-safe-anymore/</loc>
		<lastmod>2019-02-20T20:05:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/19/top-open-source-windows-forensics-tools/</loc>
		<lastmod>2019-02-20T03:38:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/20/critical-vulnerabilities-have-been-impacting-winrar-for-almost-20-years/</loc>
		<lastmod>2019-02-20T20:19:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/20/russian-hackers-compromise-systems-faster-than-chinese-and-north-korean-hackers/</loc>
		<lastmod>2019-02-20T20:30:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/20/microsoft-offers-up-to-30k-usd-on-github-vulnerability-bounty-program/</loc>
		<lastmod>2019-02-21T23:34:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/20/vulnerability-exposes-the-information-of-stanford-university-students/</loc>
		<lastmod>2019-02-21T00:50:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/20/someone-is-watching-you-check-your-mobile-browsers-today/</loc>
		<lastmod>2019-04-23T16:39:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/21/new-url-filter-evasion-method-for-phishing-campaigns/</loc>
		<lastmod>2019-02-21T20:09:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/21/hackers-disable-toyota-email-servers/</loc>
		<lastmod>2019-02-21T21:46:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/21/one-million-streeteasy-accounts-for-sale-on-dark-web/</loc>
		<lastmod>2019-02-21T23:45:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/21/stock-market-and-brokers-are-attacked-with-new-malware/</loc>
		<lastmod>2019-02-21T23:55:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/22/vulnerability-in-new-whatsapp-biometrics-feature-is-found/</loc>
		<lastmod>2019-02-22T20:00:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/22/adobe-must-launch-a-new-patch-to-correct-a-critical-vulnerability/</loc>
		<lastmod>2019-02-22T20:31:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/22/hidden-cameras-on-airlines-touch-screens-make-users-concern/</loc>
		<lastmod>2019-02-22T23:11:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/22/google-nest-has-a-built-in-microphone-and-users-did-not-know/</loc>
		<lastmod>2019-02-22T23:40:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/22/honeypot-use-it-for-catching-hackers/</loc>
		<lastmod>2019-04-23T15:17:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/23/vulnerability-in-iis-generates-dos-condition/</loc>
		<lastmod>2019-02-23T21:04:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/23/onionshare-share-files-over-the-tor-network/</loc>
		<lastmod>2019-02-23T21:11:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/25/%ef%bb%bfnew-attack-variant-against-4g-and-5g-networks/</loc>
		<lastmod>2019-02-25T20:08:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/25/a-10k-usd-bounty-for-the-hacker-who-reported-critical-vulnerability-in-yahoo-mail/</loc>
		<lastmod>2019-02-25T21:43:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/25/fake-recaptcha-hides-malware-in-android-apps/</loc>
		<lastmod>2019-02-25T23:50:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/25/instagram-users-become-victims-of-fake-investment-campaign/</loc>
		<lastmod>2019-02-26T00:46:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/25/%ef%bb%bfhackers-attack-websites-exploiting-new-vulnerability-in-drupal/</loc>
		<lastmod>2019-02-26T00:55:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/25/multi-hop-proxy-for-penetration-testers-step-by-step-tutorial/</loc>
		<lastmod>2019-04-22T19:37:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/26/icann-suggests-implementing-dnssec-technology-immediately/</loc>
		<lastmod>2019-02-26T20:31:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/26/how-to-check-if-your-dubsmash-coffee-meets-bagel-or-myfitnesspal-accounts-were-hacked/</loc>
		<lastmod>2019-02-26T22:31:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/26/spectre-and-meltdown-vulnerabilities-cant-be-corrected-with-software-implementations/</loc>
		<lastmod>2019-02-27T00:32:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/26/data-breach-at-turbotax-exposes-users-information/</loc>
		<lastmod>2019-02-27T02:17:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/27/elasticsearch-versions-1-4-2-and-earlier-vulnerable-to-malware-infections/</loc>
		<lastmod>2019-02-27T21:55:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/27/a-new-cisco-webex-privilege-escalation-vulnerability/</loc>
		<lastmod>2019-02-27T22:20:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/27/critical-vulnerability-in-shareit-for-android-exposes-users-information/</loc>
		<lastmod>2019-02-27T22:44:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/27/be-careful-your-dedicated-server-in-the-cloud-could-have-a-malware-installed-by-previous-owners/</loc>
		<lastmod>2019-02-28T00:09:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/27/zephyr-the-linux-operating-system-for-iot-devices/</loc>
		<lastmod>2019-02-28T01:15:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/27/find-all-wifi-hotspots-running-over-the-internet-using-your-mobile/</loc>
		<lastmod>2021-07-23T20:47:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/28/hackers-steal-users-information-by-exploiting-a-chrome-zero-day-vulnerability/</loc>
		<lastmod>2019-02-28T22:02:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/28/hacker-pleads-guilty-to-operating-for-hire-ddos-sites/</loc>
		<lastmod>2019-02-28T23:41:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/28/a-25-years-old-earned-17m-usd-a-seaside-home-and-luxury-cars-by-selling-drugs-in-dark-web/</loc>
		<lastmod>2019-03-01T00:09:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/02/28/attention-new-viral-challenge-that-encourages-children-to-hurt-themselves-experts-consider-it-might-be-a-scam/</loc>
		<lastmod>2019-03-01T00:59:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/01/wireshark-3-is-launched-with-new-package-capture-driver/</loc>
		<lastmod>2019-03-01T22:07:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/01/nvidia-fixes-eight-critical-vulnerabilities/</loc>
		<lastmod>2019-03-01T22:55:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/01/ubuntu-launches-an-unexpected-security-update-for-v-16-04/</loc>
		<lastmod>2019-03-01T23:06:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/01/dow-jones-suffers-massive-sensitive-information-leaking/</loc>
		<lastmod>2019-03-02T00:02:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/04/generate-android-app-in-2-mins-and-hack-any-android-mobile/</loc>
		<lastmod>2019-09-04T03:35:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/04/bypass-antivirus-detection-with-phantom-payloads/</loc>
		<lastmod>2021-07-23T20:42:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/04/armor-games-admits-massive-data-breach/</loc>
		<lastmod>2019-03-04T21:48:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/04/linux-kernel-5-0-is-now-available-here-are-some-novelties-described/</loc>
		<lastmod>2019-03-04T21:58:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/04/do-you-want-get-free-flights-for-a-year-delete-all-your-instagram-posts/</loc>
		<lastmod>2019-03-04T23:19:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/04/cyberattack-campaign-against-various-cisco-router-models/</loc>
		<lastmod>2019-03-04T23:46:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/05/intel-cpus-affected-by-speculative-execution-vulnerability/</loc>
		<lastmod>2019-03-05T22:09:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/05/massive-attack-against-israeli-websites-multiple-service-shutdowns/</loc>
		<lastmod>2019-03-05T23:10:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/05/vulnerabilities-expose-thunderbolt-ports/</loc>
		<lastmod>2019-03-06T01:43:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/06/vulnerability-in-windows-deployment-services-allows-server-hijacking/</loc>
		<lastmod>2019-03-06T22:32:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/06/one-of-the-most-common-and-vulnerable-passwords-is-ji32k7au4a83/</loc>
		<lastmod>2019-03-06T23:19:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/07/caller-id-app-exposes-information-of-millions-of-users/</loc>
		<lastmod>2019-03-07T22:50:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/07/hacking-against-iot-devices-and-cryptocurrency-platforms-in-japan-increases-100/</loc>
		<lastmod>2019-03-07T22:53:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/07/cisco-asks-switch-nexus-users-to-disable-some-features-the-company-alleges-security-reasons/</loc>
		<lastmod>2019-03-08T01:20:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/08/critical-zero-day-vulnerability-in-windows-operating-systems/</loc>
		<lastmod>2019-03-08T23:53:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/08/buffer-overflow-vulnerability-found-in-british-airways-flight-screens/</loc>
		<lastmod>2019-03-08T23:58:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/08/a-facebook-messenger-vulnerability-reveals-who-youve-been-writing-to/</loc>
		<lastmod>2019-03-09T00:14:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/08/phishing-attacks-capable-of-bypassing-multi-factor-authentication-increase/</loc>
		<lastmod>2019-03-09T00:30:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/11/private-colleges-applicants-suffer-ransomware-attack/</loc>
		<lastmod>2019-03-12T00:34:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/11/local-government-officials-pay-half-a-million-dollars-to-regain-access-to-their-systems-ransomware/</loc>
		<lastmod>2019-03-12T00:40:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/11/two-billion-records-exposed-by-unsecured-database/</loc>
		<lastmod>2019-03-12T01:32:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/11/citrix-suffers-massive-data-breach/</loc>
		<lastmod>2019-03-12T01:42:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/12/samsung-galaxy-s10-facial-recognition-is-not-that-safe/</loc>
		<lastmod>2019-03-12T22:30:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/12/hacker-receives-a-10k-usd-bounty-for-reporting-a-gif-attack-in-facebook-messenger/</loc>
		<lastmod>2019-03-12T22:34:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/12/a-dangerous-malware-that-steals-banking-information/</loc>
		<lastmod>2019-03-13T00:49:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/12/new-vulnerability-in-microsoft-office/</loc>
		<lastmod>2019-03-13T00:53:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/12/firefox-send-mozillas-secure-file-sharing-service/</loc>
		<lastmod>2019-03-13T01:37:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/13/chinese-hackers-install-backdoors-in-three-videogame-companies/</loc>
		<lastmod>2019-03-13T23:06:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/13/simbad-adware-affects-millions-of-android-users/</loc>
		<lastmod>2019-03-13T23:09:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/13/an-individual-is-arrested-for-selling-one-million-spotify-and-netflix-passwords/</loc>
		<lastmod>2019-03-14T01:47:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/14/a-new-windows-vulnerability-affects-versions-8-and-10/</loc>
		<lastmod>2019-03-14T20:22:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/14/whatsapp-launches-feature-to-fight-fake-news/</loc>
		<lastmod>2019-03-14T23:52:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/14/a-hospital-suffers-a-ransomware-infection/</loc>
		<lastmod>2019-03-14T23:51:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/14/a-hacker-deploys-malware-using-an-old-videogame/</loc>
		<lastmod>2019-03-15T00:30:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/15/glitchpos-the-malware-that-steals-credit-card-numbers-at-points-of-sales/</loc>
		<lastmod>2019-03-15T19:13:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/15/%ef%bb%bfe-commerce-websites-impacted-with-credit-card-skimming-malware/</loc>
		<lastmod>2019-03-16T00:05:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/18/which-are-the-best-antivirus-apps-for-smartphones/</loc>
		<lastmod>2019-03-18T19:22:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/19/hackers-are-compromising-office-365-and-g-suite-accounts-using-imap-protocol/</loc>
		<lastmod>2019-03-19T19:51:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/19/one-of-the-largest-aluminum-producer-suffers-severe-ransomware-infection/</loc>
		<lastmod>2019-03-19T22:52:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/19/hacker-demands-ransom-in-bitcoin-for-not-disclosing-data-of-20-million-people/</loc>
		<lastmod>2019-03-20T00:25:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/20/critical-vulnerability-in-a-popular-php-library/</loc>
		<lastmod>2019-03-20T18:57:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/20/intel-launches-security-patches-to-fix-critical-vulnerabilities/</loc>
		<lastmod>2019-03-20T22:15:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/20/facebook-faces-criminal-investigation-for-violating-privacy-agreements/</loc>
		<lastmod>2019-03-20T23:16:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/20/critical-key-exchange-vulnerability-in-putty/</loc>
		<lastmod>2019-03-20T23:38:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/20/google-photos-could-leak-location-history-of-its-users/</loc>
		<lastmod>2019-03-21T00:29:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/21/teslas-autonomous-vehicle-source-code-was-stolen/</loc>
		<lastmod>2019-03-21T19:06:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/21/tornado-alert-systems-in-texas-were-hacked/</loc>
		<lastmod>2019-03-21T22:50:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/21/an-individual-stole-100m-usd-of-facebook-and-google/</loc>
		<lastmod>2019-03-21T23:03:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/21/some-nokia-smartphones-include-a-backdoor-that-sends-data-to-servers-in-china/</loc>
		<lastmod>2019-03-22T00:00:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/22/piewdiepie-ransomware-encrypted-files-until-youtuber-reaches-100-million-subscribers/</loc>
		<lastmod>2019-03-22T21:40:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/22/police-organization-suffers-ransomware-infection/</loc>
		<lastmod>2019-03-22T22:18:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/22/piratematryoshka-the-malware-that-infects-the-pirate-bay-users/</loc>
		<lastmod>2019-03-22T22:34:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/22/change-your-facebook-password-and-use-multi-factor-authentication-experts-recommend/</loc>
		<lastmod>2019-03-23T00:10:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/22/remote-execution-vulnerability-in-cisco-ip-phone-7800-series-and-8800-series/</loc>
		<lastmod>2019-03-23T00:21:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/25/asus-laptops-users-dont-update-your-software-as-new-update-has-a-backdoor/</loc>
		<lastmod>2019-03-25T22:26:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/25/telegram-users-will-be-able-to-delete-any-messages-sent-or-received-at-any-time/</loc>
		<lastmod>2019-03-25T22:48:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/25/it-employee-was-fired-and-deletes-all-his-former-employers-aws-cloud-servers/</loc>
		<lastmod>2019-03-26T00:19:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/25/government-agency-exposes-millions-of-records-of-victims-of-natural-disasters/</loc>
		<lastmod>2019-03-26T00:28:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/25/build-your-own-php-remote-backdoor/</loc>
		<lastmod>2021-07-23T20:05:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/26/automate-your-initial-phase-of-pentesting/</loc>
		<lastmod>2019-04-22T18:38:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/26/how-to-detect-spy-cameras-in-trial-rooms-atms-hotels-other-areas/</loc>
		<lastmod>2019-04-22T18:03:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/26/attention-a-function-in-uc-browser-allows-hackers-to-compromise-android-devices/</loc>
		<lastmod>2019-03-26T21:59:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/26/apple-fixes-critical-vulnerabilities-in-its-latest-ios-update/</loc>
		<lastmod>2019-03-26T22:13:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/26/new-copyright-legislation-a-severe-blow-to-freedom-of-expression-on-the-internet/</loc>
		<lastmod>2019-03-26T23:15:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/26/ransomware-attack-against-norsk-hydro-has-cost-40m-usd/</loc>
		<lastmod>2019-03-26T23:59:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/27/dream-market-famous-dark-web-market-is-being-monitored-by-the-police-enter-with-caution/</loc>
		<lastmod>2019-03-27T20:20:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/27/users-will-be-able-to-send-bitcoin-and-ethereum-via-whatsapp/</loc>
		<lastmod>2019-03-27T21:52:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/27/russia-sends-cybersecurity-team-to-venezuela-for-protection-against-u-s-hackers/</loc>
		<lastmod>2019-03-28T00:03:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/27/unknown-person-hacked-a-judges-computer-to-know-before-anyone-a-ruling-in-a-trial/</loc>
		<lastmod>2019-03-28T00:22:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/28/researchers-find-36-security-vulnerabilities-in-lte-standard/</loc>
		<lastmod>2019-03-28T22:01:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/28/the-government-wants-to-stop-robocalling-services/</loc>
		<lastmod>2019-03-28T22:14:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/28/thousands-of-huawei-routers-are-exposed-to-cyberattacks/</loc>
		<lastmod>2019-03-29T00:01:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/29/office-depot-had-to-pay-a-35m-usd-fine-for-sending-fake-ransomware-infection-alerts-to-its-customers/</loc>
		<lastmod>2019-03-29T22:01:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/29/cryptocurrency-exchange-platform-in-singapore-gets-hacked/</loc>
		<lastmod>2019-03-29T22:09:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/29/nearly-one-billion-email-addresses-exposed-one-of-the-biggest-data-breaches-ever/</loc>
		<lastmod>2019-03-29T22:15:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/29/toyota-suffers-second-data-breach-in-the-last-month/</loc>
		<lastmod>2019-03-30T00:25:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/03/29/europol-and-its-global-investigation-against-dark-web-forum-users/</loc>
		<lastmod>2019-03-30T00:28:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/01/thousands-of-kibana-implementations-using-elasticsearch-are-exposed-online/</loc>
		<lastmod>2019-04-01T21:56:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/01/saudi-arabia-government-hacked-amazon-ceo-jeff-bezoss-phone/</loc>
		<lastmod>2019-04-01T22:11:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/02/critical-vulnerability-in-apache-allows-privilege-escalation-to-root/</loc>
		<lastmod>2019-04-02T20:34:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/02/new-york-city-suffers-massive-ransomware-attack-against-several-government-institutions/</loc>
		<lastmod>2019-04-02T21:53:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/02/critical-sql-injection-vulnerability-in-magento-update-please/</loc>
		<lastmod>2019-04-02T23:16:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/02/%ef%bb%bfremote-code-execution-vulnerability-in-cisco-webex-browser-extensions/</loc>
		<lastmod>2019-04-02T23:54:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/02/russia-is-spoofing-its-regional-gps-to-hide-military-bases/</loc>
		<lastmod>2019-04-03T00:33:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/03/a-big-beverage-company-suffers-massive-ransomware-attack/</loc>
		<lastmod>2019-04-03T22:12:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/03/data-breach-at-georgia-tech-university-compromise-millions-of-records/</loc>
		<lastmod>2019-04-03T22:29:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/03/attention-grindr-users-your-confidential-information-is-in-the-hands-of-chinese-companies/</loc>
		<lastmod>2019-04-03T22:35:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/03/deletefacebook-the-social-network-asks-its-new-users-to-provide-the-password-for-their-email-account/</loc>
		<lastmod>2019-04-04T00:22:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/03/unnam3d-the-ransomware-that-demands-amazon-gift-cards/</loc>
		<lastmod>2019-04-04T00:30:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/04/new-york-michigan-and-california-under-massive-ransomware-attack/</loc>
		<lastmod>2019-04-04T22:16:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/04/critical-vulnerability-in-xiaomi-smartphones-pre-installed-security-app/</loc>
		<lastmod>2019-04-04T22:26:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/04/bayer-pharmaceutical-company-claims-it-was-hacking-targeted-by-chinese-groups/</loc>
		<lastmod>2019-04-04T22:40:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/04/matebook-huawei-laptop-contains-a-backdoor-like-vulnerability/</loc>
		<lastmod>2019-04-05T00:24:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/04/controversial-social-media-content-legislation-in-australia-requires-actions-in-less-than-an-hour/</loc>
		<lastmod>2019-04-05T00:33:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/05/what-will-happen-to-wikileaks-julian-assange-will-be-expelled-from-ecuador-embassy-in-the-next-few-hours/</loc>
		<lastmod>2019-04-05T18:56:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/05/fortnite-official-twitter-account-was-hacked/</loc>
		<lastmod>2019-04-05T20:00:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/05/dns-hijacking-campaign-is-stealing-netflix-gmail-and-other-services-accounts/</loc>
		<lastmod>2019-04-05T22:48:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/05/basbanke-the-new-malware-that-steals-banking-information-of-android-users/</loc>
		<lastmod>2019-04-05T23:35:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/05/fileless-malware-attacks-users-of-financial-institutions/</loc>
		<lastmod>2019-04-06T00:28:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/08/a-critical-vulnerability-in-mikrotik-routers-allow-hackers-to-deploy-dos-attacks/</loc>
		<lastmod>2019-04-08T19:12:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/08/could-gps-systems-suddenly-stop-working-after-this-month-gps-rollover/</loc>
		<lastmod>2019-04-08T19:18:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/08/bitcoin-could-reach-10k-usd-over-the-next-month/</loc>
		<lastmod>2019-04-08T21:37:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/09/chinese-government-to-prohibit-the-mining-of-bitcoin-and-other-cryptocurrencies/</loc>
		<lastmod>2019-04-09T18:01:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/09/new-zero-day-vulnerability-in-tp-link-routers-exposes-devices-to-cyberattacks/</loc>
		<lastmod>2019-04-09T19:27:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/09/a-hacker-claims-to-have-stolen-israeli-voters-information/</loc>
		<lastmod>2019-04-09T21:35:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/09/an-individual-is-arrested-for-blackmailing-adult-websites-visitors/</loc>
		<lastmod>2019-04-09T23:19:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/09/microsoft-paid-over-2m-usd-in-its-vulnerability-bounty-program-last-year/</loc>
		<lastmod>2019-04-09T23:25:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/10/critical-vulnerabilities-in-intel-mini-pc-and-media-sdk/</loc>
		<lastmod>2019-04-10T18:42:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/10/tajmahal-the-advanced-spyware-developed-by-unknown-hackers/</loc>
		<lastmod>2019-04-10T19:29:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/10/an-individual-gets-a-two-year-sentence-for-operating-a-non-regulated-bitcoin-exchange-platform/</loc>
		<lastmod>2019-04-10T21:06:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/10/mozilla-firefox-is-automatically-blocking-browser-based-cryptojacking/</loc>
		<lastmod>2019-04-10T23:09:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/10/sophisticated-dos-attack-against-electrum-a-popular-bitcoin-wallet/</loc>
		<lastmod>2019-04-10T23:15:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/10/how-to-scan-whole-country-ip-addresses-in-a-while/</loc>
		<lastmod>2019-04-22T18:16:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/11/dragonblood-a-set-of-vulnerabilities-that-affect-wifi-wpa3-standard/</loc>
		<lastmod>2019-04-11T19:22:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/11/google-will-allow-android-smartphones-to-work-as-a-google-key-for-multifactor-authentication-method/</loc>
		<lastmod>2019-04-11T20:35:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/11/what-will-happen-with-wikileaks-julian-assange-is-arrested-by-british-authorities/</loc>
		<lastmod>2019-04-11T21:51:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/11/did-you-know-iran-is-the-best-place-to-establish-a-cryptocurrency-farm/</loc>
		<lastmod>2019-04-11T23:29:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/11/telegram-ton-blockchain-network-a-tors-alternative-will-be-launched-soon/</loc>
		<lastmod>2019-04-11T23:35:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/12/the-webpage-of-vsdc-popular-video-editing-software-is-hacked-users-get-infected-with-trojan/</loc>
		<lastmod>2019-04-12T19:09:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/12/juniper-switch-vulnerability-exposes-login-credentials/</loc>
		<lastmod>2019-04-12T21:31:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/12/pulse-secure-cisco-f5-networks-and-palo-alto-networks-business-vpn-services-present-security-vulnerabilities-says-homeland-security/</loc>
		<lastmod>2019-04-12T21:57:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/12/ransomware-attack-cripples-the-south-carolina-u-s-systems/</loc>
		<lastmod>2019-04-12T22:44:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/12/how-ship-satellite-communications-are-hacked-and-how-to-keep-them-safe/</loc>
		<lastmod>2019-04-22T17:07:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/15/microsoft-was-hacked-outlook-and-employees-accounts-have-been-hacked/</loc>
		<lastmod>2019-04-15T19:18:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/15/new-internet-explorer-zero-day-vulnerability-would-allow-local-file-theft%ef%bb%bf/</loc>
		<lastmod>2019-04-15T19:25:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/15/apache-tomcat-remote-code-execution-vulnerability/</loc>
		<lastmod>2019-04-15T22:31:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/16/wipro-is-hacked/</loc>
		<lastmod>2019-04-22T16:40:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/16/massive-cyberattacks-against-ecuador-government-after-julian-assanges-arrest/</loc>
		<lastmod>2019-04-16T18:58:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/16/hack-whatsapp-account-of-your-friend/</loc>
		<lastmod>2021-05-04T19:46:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/16/data-breach-in-blue-cross-insurance-organization-compromise-health-information-of-thousands-of-people/</loc>
		<lastmod>2019-04-16T19:11:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/16/hack-in-wipro-hackers-use-the-companys-systems-to-attack-its-own-customers/</loc>
		<lastmod>2019-04-16T22:33:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/17/iphone-security-is-not-working-new-malware-campaign-has-infected-over-500-million-users/</loc>
		<lastmod>2019-04-17T18:08:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/22/data-breach-at-chipotle-fast-food-restaurant-dozens-of-app-accounts-were-hacked/</loc>
		<lastmod>2019-04-22T19:01:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/22/cyberattack-interrupts-the-weather-channel-live-broadcasting/</loc>
		<lastmod>2019-04-22T19:11:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/22/over-60-million-linkedin-users-records-exposed-in-leaked-database/</loc>
		<lastmod>2019-04-22T22:15:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/22/millions-of-instagram-users-affected-by-facebook-security-incident/</loc>
		<lastmod>2019-04-22T22:27:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/22/researchers-develop-patch-to-deceive-surveillance-cameras/</loc>
		<lastmod>2019-04-22T23:28:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/23/zero-day-vulnerability-in-internet-explorer-is-being-used-to-steal-cryptocurrency/</loc>
		<lastmod>2019-04-23T18:55:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/23/data-breach-in-fitness-website-bodybuilding-com/</loc>
		<lastmod>2019-04-23T19:05:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/23/wifi-finder-an-android-os-app-exposes-millions-of-passwords-to-internet-access-points/</loc>
		<lastmod>2019-04-23T22:16:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/23/critical-vulnerability-in-jquery-exposes-millions-of-websites/</loc>
		<lastmod>2019-04-23T22:24:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/23/attention-if-you-receive-this-message-your-whatsapp-account-will-be-hacked/</loc>
		<lastmod>2019-04-23T23:17:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/24/top-6-hacking-mobile-apps-must-have/</loc>
		<lastmod>2021-05-04T19:44:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/24/critical-vulnerabilities-in-social-warfare-a-plugin-for-wordpress-sites/</loc>
		<lastmod>2019-04-24T18:50:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/24/hackers-deceive-millions-of-mobile-device-users-to-launch-massive-dos-attack/</loc>
		<lastmod>2019-04-24T19:01:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/24/losses-due-to-internet-crimes-reached-nearly-3-billion-usd-in-2018-fbi/</loc>
		<lastmod>2019-04-24T22:20:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/24/ransomware-attack-cripples-an-important-manufacturing-company/</loc>
		<lastmod>2019-04-24T22:29:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/25/qualcomm-chips-vulnerability-puts-android-devices-at-risk/</loc>
		<lastmod>2019-04-25T18:48:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/25/zero-day-vulnerability-in-oracle-weblogic-servers/</loc>
		<lastmod>2019-04-25T18:56:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/25/microsoft-will-remove-password-expiration-policy-they-think-its-useless/</loc>
		<lastmod>2019-04-25T21:26:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/26/wall-street-market-drug-sales-site-on-dark-web-was-suddenly-closed/</loc>
		<lastmod>2019-04-26T20:50:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/26/multiple-android-apps-infected-with-adware-30-million-users-affected/</loc>
		<lastmod>2019-04-26T20:53:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/26/police-agencies-will-be-able-to-force-you-to-unlock-your-smartphone-using-fingerprints-and-face-id/</loc>
		<lastmod>2019-04-26T23:13:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/26/never-use-alexa-and-amazon-echo-if-you-value-your-privacy/</loc>
		<lastmod>2019-04-26T23:22:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/29/%ef%bb%bfdata-breach-at-docker-hackers-steal-access-keys-for-almost-200k-accounts/</loc>
		<lastmod>2019-04-29T18:54:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/29/critical-vulnerability-in-woocommerce-wordpress-plugin/</loc>
		<lastmod>2019-04-29T19:10:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/29/critical-vulnerabilities-compromise-millions-of-iot-devices/</loc>
		<lastmod>2019-04-29T22:25:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/29/ransomware-attack-at-cleveland-hopkins-airport-in-the-u-s/</loc>
		<lastmod>2019-05-08T17:35:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/29/new-way-to-detect-the-malware-hidden-in-hardware/</loc>
		<lastmod>2019-05-08T17:35:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/30/hackers-use-botnet-to-attack-electrum-bitcoin-wallet-over-4m-usd-stolen/</loc>
		<lastmod>2019-05-08T17:35:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/30/massive-database-exposes-information-of-over-80-million-people-in-the-u-s/</loc>
		<lastmod>2019-04-30T19:28:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/30/if-youre-worried-about-your-online-privacy-try-brave-browser/</loc>
		<lastmod>2019-05-08T17:33:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/30/hackers-steal-microsoft-outlook-login-credentials-to-steal-bitcoin/</loc>
		<lastmod>2019-04-30T23:19:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/04/30/linux-parrot-4-6-new-version-of-the-operating-system-for-pentesters/</loc>
		<lastmod>2019-04-30T23:45:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/01/send-fake-mail-to-hack-your-friends/</loc>
		<lastmod>2019-05-01T15:50:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/01/convert-any-malicious-ip-into-url-to-hack-your-friend/</loc>
		<lastmod>2019-05-02T02:46:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/02/find-details-of-any-mobile-number-email-id-ip-address-in-the-world-step-by-step/</loc>
		<lastmod>2019-05-02T15:38:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/02/vulnerability-found-in-preinstalled-tool-on-dell-computers-allows-remote-access/</loc>
		<lastmod>2019-05-08T17:32:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/02/programmer-is-sent-to-jail-for-leaking-source-code-of-chinese-drone-maker-dji/</loc>
		<lastmod>2019-05-02T19:11:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/02/sap-vulnerabilities-put-thousands-of-companies-worldwide-at-risk/</loc>
		<lastmod>2019-05-08T17:33:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/02/hackers-publish-videos-of-brazilian-stripper-in-cartoon-network-websites/</loc>
		<lastmod>2019-05-10T17:07:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/03/top-5-tools-used-by-cyber-criminals-recently/</loc>
		<lastmod>2019-05-03T14:05:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/03/critical-vulnerability-found-in-cisco-nexus-9000-switch-update-now/</loc>
		<lastmod>2019-05-10T17:10:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/03/d-link-wifi-camera-vulnerabilities-allow-access-to-user-recordings/</loc>
		<lastmod>2019-05-03T19:23:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/06/countdown-to-know-the-identity-of-satoshi-nakamoto-the-man-behind-bitcoin%ef%bb%bf/</loc>
		<lastmod>2019-05-06T19:06:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/06/mozilla-digital-signature-verification-flaw-causes-browser-extensions-fails/</loc>
		<lastmod>2019-05-06T19:17:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/06/hackers-steal-source-code-from-hundreds-of-github-repositories-and-demand-ransom/</loc>
		<lastmod>2019-05-06T23:18:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/06/denial-of-service-condition-interrupted-power-company-operations-in-the-u-s/</loc>
		<lastmod>2019-05-06T23:24:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/07/nsa-hacking-tools-were-leaked-by-chinese-hackers-since-2016/</loc>
		<lastmod>2019-05-07T19:17:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/07/if-your-children-use-smartphones-please-remove-these-three-dating-apps/</loc>
		<lastmod>2019-05-07T19:22:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/07/microsoft-will-launch-wsl2-a-real-linux-kernel-for-windows-10/</loc>
		<lastmod>2019-05-07T22:46:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/07/multiple-vulnerabilities-affecting-sierra-wireless-airlink-routers/</loc>
		<lastmod>2019-05-07T22:54:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/07/israel-claims-to-have-destroyed-hamas-cyber-operations-center/</loc>
		<lastmod>2019-05-07T23:32:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/08/binance-cryptocurrency-exchange-platform-was-hacked-40m-usd-stolen/</loc>
		<lastmod>2019-05-08T18:40:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/08/critical-vulnerabilities-impacting-cisco-elastic-services-controller/</loc>
		<lastmod>2019-05-08T18:51:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/08/ransomware-attack-against-maryland-and-texas-cities/</loc>
		<lastmod>2019-05-08T22:07:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/08/new-phishing-campaign-targeted-against-youtube-content-creators/</loc>
		<lastmod>2019-05-08T22:16:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/09/malware-affects-users-of-tax-payment-software-wolters-kluwer/</loc>
		<lastmod>2019-05-09T19:04:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/09/data-breach-at-wyzant-a-website-for-hiring-online-tutors/</loc>
		<lastmod>2019-05-09T19:14:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/09/lightneuron-the-backdoor-designed-especially-for-microsoft-exchange/</loc>
		<lastmod>2019-05-09T23:28:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/09/three-antivirus-companies-were-hacked-and-their-source-cold-was-sold/</loc>
		<lastmod>2019-05-09T23:33:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/09/samsung-leaks-confidential-source-code-and-private-keys-by-mistake/</loc>
		<lastmod>2019-05-09T23:44:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/11/hackers-steal-money-from-multiple-amazon-vendors/</loc>
		<lastmod>2019-05-11T17:35:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/11/vulnerability-exposes-websites-in-drupal-joomla-and-typo3/</loc>
		<lastmod>2019-05-11T17:47:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/13/smart-way-of-discovering-computer-on-network-using-arping/</loc>
		<lastmod>2019-05-13T15:57:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/13/light-weight-packets-analyzer-is-here/</loc>
		<lastmod>2019-05-13T16:24:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/13/hackers-are-exploiting-a-microsoft-sharepoint-vulnerability-in-the-wild-update-now/</loc>
		<lastmod>2019-05-13T20:42:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/13/5-0-8-and-previous-linux-kernel-versions-vulnerable-to-remote-code-execution/</loc>
		<lastmod>2019-05-13T20:57:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/13/hackers-sent-to-jail-for-stealing-over-2m-usd-in-cryptocurrency-with-sim-hijacking-attack/</loc>
		<lastmod>2019-05-13T23:07:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/13/%ef%bb%bfmorpheus-a-new-and-impossible-to-hack-processor/</loc>
		<lastmod>2019-05-13T23:30:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/14/cisco-router-critical-vulnerability-could-generate-security-issues-worldwide/</loc>
		<lastmod>2019-05-14T18:57:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/14/spyware-hacks-dozens-of-smartphones-via-whatsapp/</loc>
		<lastmod>2019-05-14T19:08:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/14/%ef%bb%bfunhackable-usb-has-been-hacked-by-a-group-of-experts/</loc>
		<lastmod>2019-05-14T22:40:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/14/vulnerability-in-linksys-routers-exposes-devices-sensitive-information/</loc>
		<lastmod>2019-05-14T22:47:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/14/bitcoin-surpasses-the-8k-usd-limit-for-the-first-time-since-2017/</loc>
		<lastmod>2019-05-14T23:35:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/14/watch-top-5-cyber-security-in-10-minutes/</loc>
		<lastmod>2019-06-04T22:35:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/15/intel-cpu-attack-protection-decreases-40-of-mac-performance/</loc>
		<lastmod>2019-05-15T19:29:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/15/mds-vulnerabilities-force-google-to-reduce-chrome-os-performance/</loc>
		<lastmod>2019-05-15T19:36:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/15/security-issues-affecting-titan-googles-security-key/</loc>
		<lastmod>2019-05-15T23:15:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/15/it-was-all-a-hoax-the-countdown-to-meet-satoshi-nakamoto-has-ended/</loc>
		<lastmod>2019-05-15T23:20:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/15/intel-zombieload-vulnerability-correction-slows-computer-equipment/</loc>
		<lastmod>2019-05-15T23:33:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/16/microsoft-puts-its-bing-browser-algorithm-available-to-the-public-as-open-software/</loc>
		<lastmod>2019-05-16T19:23:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/16/u-s-prohibits-telecom-companies-to-buy-foreign-technology/</loc>
		<lastmod>2019-05-16T19:30:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/16/critical-vulnerability-in-microsoft-remote-desktop-services-update-now/</loc>
		<lastmod>2019-05-16T23:39:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/16/russian-government-leaks-information-of-over-two-million-citizens/</loc>
		<lastmod>2019-05-16T23:42:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/17/group-of-hackers-is-arrested-in-mexico-they-stole-nearly-40m-usd-to-local-banks/</loc>
		<lastmod>2019-05-17T18:31:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/17/hackers-install-backdoor-on-asus-computers-using-company-update/</loc>
		<lastmod>2019-05-17T18:38:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/17/hackers-accessed-stack-overflow-private-systems/</loc>
		<lastmod>2019-05-17T20:22:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/20/solution-to-spamming-check-any-unknown-email-id-existence/</loc>
		<lastmod>2019-05-20T18:08:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/20/microsoft-update-causes-restart-fails-in-windows-10/</loc>
		<lastmod>2019-05-20T19:22:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/20/top-cyber-security-news-16-may-19/</loc>
		<lastmod>2019-06-04T22:35:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/20/huawei-can-no-longer-use-android-system-on-its-smartphones/</loc>
		<lastmod>2019-05-20T19:35:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/20/teamviewer-was-target-of-a-cyberattack-campaign-in-2016/</loc>
		<lastmod>2019-05-20T23:24:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/20/massive-outage-in-salesforce-systems-last-weekend/</loc>
		<lastmod>2019-05-20T23:31:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/20/critical-vulnerability-affecting-various-cisco-devices/</loc>
		<lastmod>2019-05-20T23:38:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/21/patches-for-spectre-and-meltdown-reduce-performance-of-intel-processors-5-times/</loc>
		<lastmod>2019-05-21T19:18:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/21/data-breach-exposes-confidential-information-at-it-company-hcl/</loc>
		<lastmod>2019-05-21T19:33:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/21/cyberattacks-against-hospitals-increased-over-1000-last-year/</loc>
		<lastmod>2019-05-21T23:20:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/21/will-microsoft-stop-launching-windows-updates-for-huawei-laptops/</loc>
		<lastmod>2019-05-21T23:26:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/22/hackers-can-take-control-of-your-pc-due-to-new-zero-day-vulnerability-in-windows-10/</loc>
		<lastmod>2019-05-22T19:27:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/22/huawei-is-working-on-its-own-operating-system-it-will-be-launched-this-fall/</loc>
		<lastmod>2019-05-22T19:34:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/22/tor-browser-now-has-a-mobile-version-for-android-devices/</loc>
		<lastmod>2019-05-22T23:35:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/22/corporate-mail-breach-at-gmail-google-stored-unencrypted-g-suite-user-passwords-for-almost-15-years/</loc>
		<lastmod>2019-05-22T23:41:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/23/data-breach-affects-over-10-million-australian-people/</loc>
		<lastmod>2019-05-23T14:49:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/23/top-cyber-security-news21-may-19/</loc>
		<lastmod>2019-06-04T22:36:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/23/these-are-the-new-opportunities-that-hackers-have-to-work-in-the-british-government/</loc>
		<lastmod>2019-05-23T19:36:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/23/data-breach-an-instagram-50-million-registers-exposed-online/</loc>
		<lastmod>2019-05-23T20:54:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/23/craig-wright-is-not-satoshi-nakamoto-creator-of-bitcoin-u-s-copyright-office/</loc>
		<lastmod>2019-05-23T21:04:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/23/should-the-government-of-baltimore-or-not-pay-ransom-from-cyberattack/</loc>
		<lastmod>2019-05-23T23:25:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/23/hikvision-and-dahuatech-the-largest-manufacturers-of-surveillance-cameras-in-the-world-have-been-banned-by-the-u-s/</loc>
		<lastmod>2019-05-23T23:30:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/24/talk-secretly-with-your-friends-everything-about-steganography/</loc>
		<lastmod>2019-05-24T17:36:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/24/new-windows-zero-day-vulnerabilities-revealed-for-third-day-in-a-row/</loc>
		<lastmod>2019-05-24T20:15:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/24/new-way-to-collect-data-through-iphone-and-google-pixel-sensors/</loc>
		<lastmod>2019-05-24T20:27:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/24/u-s-government-charges-18-accusations-against-julian-assange-for-espionage-act-violations/</loc>
		<lastmod>2019-05-24T22:21:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/24/banking-malware-grew-60-this-year-how-to-protect-your-bank-accounts/</loc>
		<lastmod>2019-05-24T22:27:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/27/top-cyber-security-news26-may-19/</loc>
		<lastmod>2019-06-04T22:36:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/27/hackers-infect-mysql-servers-with-gandcrab-ransomware/</loc>
		<lastmod>2019-05-27T18:52:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/27/data-breach-in-canva-over-100-million-users-were-affected/</loc>
		<lastmod>2019-05-27T19:08:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/27/millions-of-users-affected-by-data-breach-at-truecaller/</loc>
		<lastmod>2019-05-27T22:39:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/27/huawei-will-not-be-able-to-use-microsd-memory-cards-in-its-future-designs/</loc>
		<lastmod>2019-05-27T22:44:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/27/data-breach-at-perceptics-vehicle-plate-scanner-manufacturer/</loc>
		<lastmod>2019-05-27T23:25:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/28/teenager-who-hacked-apple-has-been-spared-avoids-prison-time/</loc>
		<lastmod>2019-05-28T19:10:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/28/just-like-facebook-and-google-apple-is-selling-users-information-to-third-parties/</loc>
		<lastmod>2019-05-28T19:19:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/28/critical-remote-access-vulnerability-in-windows-10-prior-versions/</loc>
		<lastmod>2019-05-28T22:21:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/28/vulnerability-in-apple-allows-malicious-apps-execution-on-macos/</loc>
		<lastmod>2019-05-28T22:28:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/29/top-cyber-security-news29-may-19/</loc>
		<lastmod>2019-06-06T16:20:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/29/killshot-to-hack-any-website/</loc>
		<lastmod>2021-07-23T20:30:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/29/pubg-how-i-hacked-and-locked-my-account-for-3650-days/</loc>
		<lastmod>2019-05-29T18:41:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/29/data-breach-flipboard-hackers-commit-user-information/</loc>
		<lastmod>2019-05-29T18:52:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/29/latest-microsoft-update-crashes-windows-sandbox/</loc>
		<lastmod>2019-05-29T19:00:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/29/massive-personal-and-financial-data-leaking-in-a-major-u-s-financial-company/</loc>
		<lastmod>2019-05-29T22:34:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/29/cryptojacking-campaign-has-infected-over-50k-servers/</loc>
		<lastmod>2019-05-29T22:47:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/30/a-new-critical-race-condition-vulnerability-in-docker/</loc>
		<lastmod>2019-05-30T19:21:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/30/experts-found-new-way-to-combat-ransomware-and-recover-files-without-paying-ransom/</loc>
		<lastmod>2019-06-10T14:54:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/30/massive-data-breach-millions-of-dating-apps-registers-found-online/</loc>
		<lastmod>2019-05-30T22:29:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/31/astra-linux-the-new-secure-os-used-by-the-russian-army/</loc>
		<lastmod>2019-06-18T11:55:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/31/hiddenwasp-a-dangerous-malware-that-affects-linux-systems/</loc>
		<lastmod>2019-06-10T19:06:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/05/31/millions-of-torrent-sites-have-been-taken-down-from-the-internet/</loc>
		<lastmod>2019-05-31T20:54:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/01/top-cyber-security-news1-june-19/</loc>
		<lastmod>2019-06-10T05:05:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/03/vulnerability-in-macos-allows-hackers-to-perform-artificial-clicks/</loc>
		<lastmod>2019-06-14T05:37:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/03/experts-discovered-cloud-services-hardware-vulnerabilities/</loc>
		<lastmod>2019-06-14T05:38:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/03/hackers-can-generate-fake-taps-on-a-smartphones-touchscreen/</loc>
		<lastmod>2019-06-03T23:01:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/03/u-s-government-to-demand-five-years-of-social-media-information-for-visa-applicants/</loc>
		<lastmod>2019-06-12T14:04:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/04/data-breach-in-clinical-analysis-company-quest-diagnostics-12m-affected-users/</loc>
		<lastmod>2019-06-04T18:54:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/04/source-code-of-tools-used-by-malicious-hackers-from-iran-is-exposed/</loc>
		<lastmod>2019-06-04T19:04:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/04/apple-launches-apple-id-login-to-protect-users-privacy/</loc>
		<lastmod>2019-06-14T05:35:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/04/data-breach-in-westpac-bank-nearly-100k-users-affected/</loc>
		<lastmod>2019-06-04T23:24:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/05/data-breach-at-labcorp-more-than-seven-million-affected-users/</loc>
		<lastmod>2019-06-05T19:26:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/05/sim-swap-attacks-have-increased-in-the-last-year-how-hackers-steal-money-using-sim-card/</loc>
		<lastmod>2019-06-12T14:03:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/05/new-vulnerability-in-windows-rdp-bluekeep-patch-is-not-working/</loc>
		<lastmod>2019-06-10T16:25:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/05/jailbreak-for-ios-13-is-disclosed-just-one-day-after-its-launching/</loc>
		<lastmod>2019-06-18T11:55:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/06/top-cyber-security-news6-june-19/</loc>
		<lastmod>2019-06-12T14:02:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/06/new-command-execution-vulnerability-affects-half-of-email-servers/</loc>
		<lastmod>2019-06-06T19:12:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/06/specialists-detect-new-and-dangerous-cryptocurrency-mining-malware-in-asia-and-u-s/</loc>
		<lastmod>2019-06-06T19:28:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/06/microsoft-removes-massive-face-recognition-database-storing-10m-registers/</loc>
		<lastmod>2019-06-06T22:44:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/06/china-is-hacking-universities-from-india-u-s-and-australia/</loc>
		<lastmod>2019-06-18T11:54:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/07/a-hacker-trick-google-to-install-a-backdoor-on-android-phones-around-the-world-how-did-he-do-it/</loc>
		<lastmod>2019-06-18T11:53:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/07/new-zero-day-vulnerability-in-windows-10-and-windows-server-2019-is-disclosed/</loc>
		<lastmod>2019-06-18T11:53:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/07/critical-remote-code-execution-vulnerability-in-cisco-industrial-software/</loc>
		<lastmod>2019-06-07T22:43:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/07/an-atm-suddenly-starts-throwing-money-away-what-really-happened/</loc>
		<lastmod>2019-06-07T22:53:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/10/top-cyber-security-news10-june-19/</loc>
		<lastmod>2019-06-18T16:08:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/10/vulnerability-allows-code-execution-in-atms-to-get-free-money-withdrawals/</loc>
		<lastmod>2019-06-18T19:25:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/10/china-is-hijacking-europes-mobile-traffic-to-spy-on-users/</loc>
		<lastmod>2019-06-18T19:24:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/10/one-of-the-biggest-gaming-forums-has-been-hacked-over-1m-affected-users/</loc>
		<lastmod>2019-06-10T23:12:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/10/critical-vulnerabilities-found-in-vlc-player-update-as-soon-as-possible/</loc>
		<lastmod>2019-06-10T23:17:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/10/u-s-customs-data-and-travellers-photos-for-sale-u-s-immigrayion-system-hacked/</loc>
		<lastmod>2019-06-18T19:24:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/11/this-guy-earned-1-million-usd-from-atm-hacking-of-500-bank-accounts/</loc>
		<lastmod>2019-06-18T19:26:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/11/vulnerability-in-linux-allows-hacking-a-system-by-simply-opening-a-vim-file/</loc>
		<lastmod>2019-06-11T19:15:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/11/hackers-steal-radiohead-recordings-demand-a-150k-usd-ransom/</loc>
		<lastmod>2019-06-11T23:10:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/11/twenty-years-in-prison-for-hackers-founders-of-mariposa-botnet-and-bitcoin-platform-nicehash/</loc>
		<lastmod>2019-06-11T23:18:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/12/cyber-security-trends12-june-19/</loc>
		<lastmod>2019-06-20T17:34:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/12/rambleed-new-variant-of-rowhammer-attack-to-steal-ram-memory-information/</loc>
		<lastmod>2019-06-12T19:04:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/12/first-it-was-baltimore-now-philadelphia-is-under-malware-attack/</loc>
		<lastmod>2019-06-12T19:14:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/12/companies-with-oracle-weblogic-must-be-careful-cryptomining-malware-affects-servers/</loc>
		<lastmod>2019-06-12T23:02:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/12/new-zero-day-cryptographic-vulnerability-found-in-windows-10/</loc>
		<lastmod>2019-06-12T23:10:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/12/how-to-open-unknown-files-that-have-malware-in-windows-10-with-sandbox/</loc>
		<lastmod>2019-06-12T23:30:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/13/telegram-suffers-dos-attack-the-company-says-the-china-government-is-behind-the-hacking/</loc>
		<lastmod>2019-06-13T19:16:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/13/evernote-extension-for-chrome-vulnerability-allows-confidential-information-theft/</loc>
		<lastmod>2019-06-13T19:27:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/13/amazon-is-sued-for-storing-unauthorized-child-recordings/</loc>
		<lastmod>2019-06-13T22:44:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/13/cyberattacks-against-gamer-community-keep-growing/</loc>
		<lastmod>2019-06-13T22:51:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/14/data-breach-against-symantec-and-its-costumers/</loc>
		<lastmod>2019-06-14T19:28:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/14/quantum-cryptography-new-way-to-encrypt-private-communications/</loc>
		<lastmod>2019-06-14T20:58:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/14/ransomware-attack-cripples-operations-at-asco-aircraft-parts-manufacturer/</loc>
		<lastmod>2019-06-14T23:01:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/14/hackers-exploit-vulnerability-to-maliciously-alter-medical-devices/</loc>
		<lastmod>2019-06-14T23:10:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/14/why-are-hackers-interested-in-peoples-medical-history/</loc>
		<lastmod>2019-06-14T23:27:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/17/power-blackout-in-argentina-uruguay-paraguay-and-brazil-is-this-the-biggest-cyberattack-ever/</loc>
		<lastmod>2019-06-20T09:17:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/17/cias-biggest-cyber-espionage-network-hacked-by-iran/</loc>
		<lastmod>2019-06-20T09:18:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/17/oneplus-smartphones-are-leaking-information-of-thousands-of-users/</loc>
		<lastmod>2019-06-17T23:27:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/17/your-iot-devices-such-as-cameras-washing-machines-nas-storage-will-be-affected-by-this-new-malware/</loc>
		<lastmod>2019-06-17T23:33:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/18/cyber-security-trends17-june-19/</loc>
		<lastmod>2019-06-20T17:35:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/18/samsung-smart-tvs-infected-with-malware-variant/</loc>
		<lastmod>2019-06-18T14:54:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/18/users-could-go-to-prison-for-forwarding-messages-on-whatsapp/</loc>
		<lastmod>2019-06-18T19:36:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/18/new-tool-to-remove-gandcrab-ransomware-encryption/</loc>
		<lastmod>2019-06-18T19:46:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/18/ubuntu-is-set-to-abandon-support-for-32-bit-systems-starting-with-version-19-10/</loc>
		<lastmod>2019-06-18T23:14:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/18/facebook-announces-the-launching-of-libra-its-own-cryptocurrency/</loc>
		<lastmod>2019-06-21T18:17:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/18/u-s-government-hacked-into-russian-electricity-network/</loc>
		<lastmod>2019-06-21T18:17:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/19/whatsapp-could-allow-messages-traceability-governments-could-know-the-source-of-a-message/</loc>
		<lastmod>2019-06-19T18:47:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/19/new-vulnerabilities-found-on-linux-and-freebsd-devices/</loc>
		<lastmod>2019-06-19T18:59:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/19/plurox-the-all-in-one-malware-infecting-computers-around-the-world/</loc>
		<lastmod>2019-06-19T23:04:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/19/the-biggest-medical-data-breach-ever-led-amca-to-bankruptcy/</loc>
		<lastmod>2019-06-19T23:11:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/19/critical-firefox-vulnerability-update-mozilla-immediately/</loc>
		<lastmod>2019-06-25T10:37:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/20/cyber-security-trends-20-june-19/</loc>
		<lastmod>2019-06-24T06:38:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/20/create-windows-10-fud-fully-undetectable-payload/</loc>
		<lastmod>2019-06-21T18:25:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/20/ransomware-attacks-five-major-health-companies-in-the-us/</loc>
		<lastmod>2019-06-20T19:08:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/20/hacker-steals-intimate-photos-of-american-actress-bella-thorne/</loc>
		<lastmod>2019-06-20T19:20:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/20/a-city-in-florida-pays-hackers-a-600k-usd-ransom-to-decrypt-its-systems/</loc>
		<lastmod>2019-06-20T23:13:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/20/a-raspberry-pi-device-was-used-to-hack-nasa-labs/</loc>
		<lastmod>2019-06-20T23:20:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/21/cyber-security-trends-21-june-19/</loc>
		<lastmod>2019-06-25T10:35:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/21/financial-data-of-2-9-million-canadian-breached-in-credit-union-hack/</loc>
		<lastmod>2019-06-21T18:49:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/21/your-outlook-app-may-be-allowing-hackers-to-enter-your-android-smartphone/</loc>
		<lastmod>2019-06-21T18:57:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/21/walmart-uses-artificial-intelligence-to-catch-shoplifters-in-us-stores/</loc>
		<lastmod>2019-06-25T10:36:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/21/another-zero-day-found-in-mozilla-firefox-its-causing-unrest-among-tor-users/</loc>
		<lastmod>2019-06-25T10:36:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/21/cisco-dna-allowed-unauthorized-users-access-to-enterprise-networks-for-a-long-time/</loc>
		<lastmod>2019-06-21T23:29:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/24/cyber-security-trends-24-june-19/</loc>
		<lastmod>2019-06-26T18:52:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/24/having-problem-with-windows-10-updates-disable-in-2-minutes/</loc>
		<lastmod>2019-07-03T12:40:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/24/cyber-warfare-between-the-us-and-iran-has-begun/</loc>
		<lastmod>2019-06-26T18:56:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/24/how-to-trace-and-prevent-the-use-of-a-stolen-mobile-phone/</loc>
		<lastmod>2019-06-24T19:18:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/24/dell-laptops-are-not-secure-another-vulnerability-in-dell-software/</loc>
		<lastmod>2019-06-24T23:07:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/24/huawei-to-use-russian-operating-system-on-its-smart-phones/</loc>
		<lastmod>2019-06-24T23:14:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/24/bitcoin-crosses-11k-usd-time-to-buy-bitcoins-again/</loc>
		<lastmod>2019-06-26T18:57:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/25/cyber-security-trends-video-25-june19/</loc>
		<lastmod>2019-06-27T15:42:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/25/ps-vita-jailbreak-how-to-use-the-new-trinity-exploit/</loc>
		<lastmod>2019-06-25T19:08:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/25/multiple-telecomm-companies-hacked-call-and-location-data-of-millions-of-users-leaked/</loc>
		<lastmod>2019-06-27T15:44:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/25/a-hacker-published-a-new-ios-jailbreak13-with-tfp0-exploit/</loc>
		<lastmod>2019-06-27T15:43:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/25/fake-emergency-alerts-are-launched-via-vulnerability-in-lte/</loc>
		<lastmod>2019-06-25T23:14:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/26/cyber-security-trends-video-26-june19/</loc>
		<lastmod>2019-06-30T14:02:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/26/once-again-florida-suffers-severe-ransomware-attack/</loc>
		<lastmod>2019-06-30T14:05:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/26/5g-signal-will-disrupt-the-weather-satellites-signal-weather-forecast-could-not-work/</loc>
		<lastmod>2019-06-26T19:41:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/26/new-vulnerability-on-mac-is-exploited-with-malware/</loc>
		<lastmod>2019-06-26T23:00:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/26/iran-responds-to-us-cyberattacks-with-malware-that-destroys-iot-devices/</loc>
		<lastmod>2019-06-27T17:12:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/27/cyber-security-trends-video-27-june19/</loc>
		<lastmod>2019-07-02T14:41:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/27/tech-companies-ibm-hp-fujitsu-tcs-ntt-data-dimension-data-and-csc-were-hacked-to-access-client-networks-data/</loc>
		<lastmod>2019-06-30T14:03:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/27/origin-an-ea-platform-exposes-data-of-300-million-users/</loc>
		<lastmod>2019-06-27T19:04:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/27/windows-10-update-causes-slower-device-shutdown/</loc>
		<lastmod>2019-06-27T23:11:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/27/you-can-hack-banks-with-this-microsoft-excel-attack/</loc>
		<lastmod>2019-06-27T23:21:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/27/russia-is-jamming-gps-signals-to-spy-on-government-agencies/</loc>
		<lastmod>2019-06-27T23:25:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/28/secure-your-insulin-pump-before-hackers-alter-your-medication/</loc>
		<lastmod>2019-07-02T14:50:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/28/five-eyes-group-hacks-yandex-the-russian-search-engine/</loc>
		<lastmod>2019-06-28T20:45:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/28/track-this-block-your-browsing-history-from-facebook-with-this-mozilla-firefox-tool/</loc>
		<lastmod>2019-06-28T23:05:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/28/the-meshtalk-network-allows-you-to-talk-to-your-friends-without-wifi-or-bluetooth/</loc>
		<lastmod>2019-06-28T23:21:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/28/millions-of-dollars-in-cryptocurrency-lost-in-a-matter-of-hours/</loc>
		<lastmod>2019-07-02T14:48:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/06/30/cyber-security-trends-video-30-june19/</loc>
		<lastmod>2019-07-03T12:37:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/01/u-s-government-doesnt-want-complete-encryption-for-whatsapp-and-facebook/</loc>
		<lastmod>2019-07-01T19:32:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/01/july-4-and-5-will-be-a-world-wide-social-media-strike-wikipedia/</loc>
		<lastmod>2019-07-04T10:41:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/01/gay-dating-app-to-pay-250k-usd-fine-for-exposing-users-nude-pics/</loc>
		<lastmod>2019-07-04T10:40:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/01/deepfake-app-to-create-nude-pics-of-any-woman-was-deleted/</loc>
		<lastmod>2019-07-01T23:28:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/02/cyber-security-trends-video-2-julio-19/</loc>
		<lastmod>2019-07-07T07:49:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/02/facebook-pages-infecting-thousands-of-user-with-virus/</loc>
		<lastmod>2019-07-04T10:42:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/02/japan-government-willing-to-hack-all-iot-devices-in-the-country/</loc>
		<lastmod>2019-07-02T19:37:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/02/third-ransomware-attack-in-florida-will-the-government-pay-the-ransom-again/</loc>
		<lastmod>2019-07-04T10:42:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/02/vulnerability-in-microsoft-teams-could-allow-hacker-to-gain-complete-control-of-your-infrastructure/</loc>
		<lastmod>2019-07-02T23:08:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/02/steps-to-root-and-hack-amazon-2019-fire-tablet/</loc>
		<lastmod>2023-01-20T15:09:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/03/cyber-security-trends-video-3-julio-19/</loc>
		<lastmod>2019-07-07T07:48:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/03/be-careful-if-you-visit-china-the-government-hacks-phones-of-tourists/</loc>
		<lastmod>2019-07-03T19:09:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/03/u-s-government-will-use-old-tech-in-its-power-grids-new-developments-are-easy-to-hack/</loc>
		<lastmod>2019-07-03T19:21:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/03/d-link-devices-are-the-most-insecure-ftc-has-ordered-to-fix-them/</loc>
		<lastmod>2019-07-03T23:11:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/03/this-hacker-group-attacks-banks-around-the-world-to-cash-out-atms/</loc>
		<lastmod>2019-07-03T23:16:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/04/cyber-security-trends-video-4-julio-19/</loc>
		<lastmod>2019-07-10T11:49:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/04/how-do-you-check-that-a-website-is-unsafe/</loc>
		<lastmod>2019-07-04T19:11:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/04/last-facebook-outage-exposed-users-images-hidden-information/</loc>
		<lastmod>2019-07-04T19:25:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/04/this-pgp-bug-could-allow-hackers-to-control-your-email-servers/</loc>
		<lastmod>2019-07-04T19:32:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/04/tiktok-asks-kids-to-send-money-in-exchange-for-influencers-phone-numbers/</loc>
		<lastmod>2019-07-07T18:33:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/04/social-media-strike-causes-reddit-to-take-down-tech-subreddit/</loc>
		<lastmod>2019-07-04T23:06:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/04/hackers-earn-millions-with-this-atm-cashout-malware/</loc>
		<lastmod>2019-07-07T18:33:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/05/cyber-security-trending-5-julio-19/</loc>
		<lastmod>2019-07-10T11:49:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/05/how-to-analyze-usb-traffic/</loc>
		<lastmod>2019-07-05T18:47:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/05/new-ransomware-infects-windows-machines-even-without-clicking-or-opening-an-email/</loc>
		<lastmod>2019-07-05T18:57:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/05/this-guy-launched-ddos-attacks-against-video-game-companies-like-playstation-xbox-etc/</loc>
		<lastmod>2019-07-05T19:04:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/05/are-you-a-samsung-smartphone-user-you-need-to-check-this-to-secure-your-device/</loc>
		<lastmod>2019-07-09T17:58:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/05/the-biggest-forensics-company-pays-ransom-after-cyberattack/</loc>
		<lastmod>2019-07-05T23:14:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/07/popular-news-video-7-july/</loc>
		<lastmod>2019-07-10T11:49:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/08/excessive-smartphone-use-related-to-the-number-of-sexual-partners/</loc>
		<lastmod>2019-07-09T17:57:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/08/british-airways-to-pay-more-than-180m-fine-after-2018-data-breach/</loc>
		<lastmod>2019-07-08T19:00:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/08/7-eleven-payment-app-was-hacked-500k-usd-stolen/</loc>
		<lastmod>2019-07-10T11:51:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/08/pii-credit-card-numbers-and-cvvs-home-alarm-codes-leaked-in-fieldwork-data-leak/</loc>
		<lastmod>2019-07-08T23:10:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/08/hacking-attempt-against-ubuntu-source-code-to-install-a-backdoor/</loc>
		<lastmod>2019-07-10T11:50:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/08/check-if-your-whatsapp-is-hacked-or-not/</loc>
		<lastmod>2019-07-16T06:11:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/09/popular-news-video-9-july/</loc>
		<lastmod>2019-07-11T12:06:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/09/zoom-video-conferencing-vulnerability-allows-hackers-to-control-users-webcams/</loc>
		<lastmod>2019-07-09T21:04:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/09/your-logitech-mouse-can-allows-hackers-to-hijack-your-computer/</loc>
		<lastmod>2019-07-09T22:08:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/09/marriott-will-be-fined-with-100-million-due-to-data-breach-incident/</loc>
		<lastmod>2019-07-09T23:02:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/09/now-you-can-easily-track-a-stolen-smartphone-with-imei/</loc>
		<lastmod>2019-07-09T23:13:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/09/bank-voice-authentication-can-be-hacked-via-deepfake-audio/</loc>
		<lastmod>2019-07-09T23:26:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/10/popular-news-video-10-july/</loc>
		<lastmod>2019-07-12T12:13:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/10/more-than-25-million-smartphones-infected-with-new-malware-hidden-in-whatsapp/</loc>
		<lastmod>2019-07-10T19:07:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/10/check-your-mobile-security-without-mobile-security-app/</loc>
		<lastmod>2021-07-05T10:16:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/10/hack-top-level-domains-mx-us-to-spy-on-emails-and-make-mitm-attacks/</loc>
		<lastmod>2019-07-10T20:44:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/10/trump-blocks-critics-from-his-twitter-account-theres-no-freedom-of-speech/</loc>
		<lastmod>2019-07-10T22:59:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/10/anesthetic-devices-can-be-hacked-to-make-you-sleep-forever/</loc>
		<lastmod>2019-07-12T06:40:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/10/julian-assange-was-spied-on-while-at-the-ecuadorian-embassy-in-london/</loc>
		<lastmod>2019-07-12T06:39:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/11/popular-news-video-11-july/</loc>
		<lastmod>2019-07-14T04:43:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/11/ctrl-alt-led-the-new-way-to-hack-air-gapped-systems/</loc>
		<lastmod>2019-07-11T18:58:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/11/apple-watch-vulnerability-allows-you-to-spy-on-your-friends-iphone/</loc>
		<lastmod>2019-07-12T19:34:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/11/first-it-was-florida-now-ontario-is-the-victim-of-a-ransomware-attack-should-the-government-pay-the-ransom/</loc>
		<lastmod>2019-07-11T22:48:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/11/google-and-third-parties-are-listening-to-your-google-home-and-assistant-recordings/</loc>
		<lastmod>2019-07-12T19:33:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/11/intel-data-center-ssd-drives-allow-hackers-to-take-complete-control-of-servers/</loc>
		<lastmod>2019-07-11T23:20:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/12/popular-news-video-12-july/</loc>
		<lastmod>2019-07-17T12:30:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/12/you-will-not-be-able-to-login-with-passwords-in-windows-10-as-its-going-passwordless/</loc>
		<lastmod>2019-07-12T21:25:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/12/blue-cross-insurance-will-be-pay-10m-usd-fine-for-data-breach/</loc>
		<lastmod>2019-07-12T22:57:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/12/hackers-encrypt-all-college-computers-with-ransomware-2-million-ransom/</loc>
		<lastmod>2019-07-12T23:03:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/12/facial-recognition-will-be-necessary-at-the-airport-check-in-from-apple-to-airlines-everybody-wants-biometric-data/</loc>
		<lastmod>2019-07-12T23:18:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/13/popular-news-video-13-july/</loc>
		<lastmod>2019-07-19T08:50:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/15/first-it-was-florida-now-indiana-suffers-ransomware-attack-government-had-to-pay-over-100k-usd/</loc>
		<lastmod>2019-07-15T20:46:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/15/should-the-ftc-jail-mark-zuckerberg-instead-of-fining-facebook-with-5-billion-usd/</loc>
		<lastmod>2019-07-17T12:36:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/15/new-york-power-blackout-did-iran-did-performed-a-counter-cyberattack/</loc>
		<lastmod>2019-07-17T12:35:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/15/windows-10-office-365-banned-in-schools-and-colleges-in-germany-for-privacy-issues/</loc>
		<lastmod>2019-07-15T23:19:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/15/new-exploit-allows-hackers-to-access-shared-files-via-whatsapp-and-telegram/</loc>
		<lastmod>2019-07-15T23:26:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/16/5k-bitcoin-atms-worldwide-allow-money-laundering-for-drug-trafficking/</loc>
		<lastmod>2019-07-18T08:39:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/16/donald-trump-is-making-sure-that-the-price-of-bitcoin-goes-down-again/</loc>
		<lastmod>2019-07-18T08:39:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/16/new-ios-13-vulnerability-allows-access-to-passwords-stored-on-your-iphone/</loc>
		<lastmod>2019-07-16T23:06:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/16/ad-inserter-a-wordpress-plugin-allows-remote-code-execution/</loc>
		<lastmod>2019-07-16T23:12:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/16/sprint-company-customer-information-was-breached-by-unknown-hackers/</loc>
		<lastmod>2019-07-16T23:25:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/17/popular-news-video-17-july/</loc>
		<lastmod>2019-07-20T09:30:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/17/iomega-storcenter-lenovo-emc-nas-devices-are-leaking-users-information/</loc>
		<lastmod>2019-07-17T18:57:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/17/faceapp-might-be-sending-pics-of-150-million-people-to-russia-the-main-good-reason-for-not-using-it/</loc>
		<lastmod>2019-07-19T08:50:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/17/grandcrab-ransomware-master-keys-released-by-the-fbi/</loc>
		<lastmod>2019-07-19T08:49:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/17/critical-vulnerability-in-siemens-industrial-control-system/</loc>
		<lastmod>2019-07-17T23:09:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/17/100-loan-apps-leaking-pii-gps-locations-call-logs-of-all-the-4-6-million-customers/</loc>
		<lastmod>2019-07-18T13:04:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/18/popular-news-video-18-july/</loc>
		<lastmod>2019-07-24T15:34:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/18/thousands-of-microsoft-customer-accounts-compromised-due-to-corporate-surveillance-and-data-theft/</loc>
		<lastmod>2019-07-18T18:42:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/18/ransomware-next-target-is-your-favorite-radio-stations-and-television-channel-companies/</loc>
		<lastmod>2019-07-18T18:52:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/18/how-to-secure-any-linux-server-automated-server-hardening-script/</loc>
		<lastmod>2021-07-23T19:02:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/18/facebook-is-tracking-when-you-feel-horny-and-which-porn-you-watch/</loc>
		<lastmod>2019-07-20T09:21:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/18/8-methods-for-bypassing-surveillance-cameras-and-facial-recognition-software/</loc>
		<lastmod>2019-07-20T09:21:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/19/popular-news-video-19-july/</loc>
		<lastmod>2019-07-24T15:34:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/19/cylance-ai-based-antivirus-fooled-to-avoid-malware-detection/</loc>
		<lastmod>2019-07-19T20:50:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/19/robocop-glasses-will-be-used-by-police-army-to-identify-suspect-using-facial-recognition/</loc>
		<lastmod>2019-07-24T18:59:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/19/will-other-countries-follow-kazakhstan-in-forcing-users-to-install-certificates-for-https-interception/</loc>
		<lastmod>2019-07-19T22:55:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/19/governments-want-to-install-backdoor-on-5g-technology-to-spy-on-users/</loc>
		<lastmod>2019-07-24T18:58:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/20/popular-news-video-20-july/</loc>
		<lastmod>2019-07-25T15:53:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/22/russian-spy-agency-was-hacked-how-will-russia-respond-to-this-cyber-warfare/</loc>
		<lastmod>2019-07-24T19:03:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/22/iran-retaliates-against-cyber-warfare-using-dangerous-malware-and-phishing-attacks-against-linkedin-users/</loc>
		<lastmod>2019-07-24T19:00:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/22/biggest-credit-reporting-firm-pays-700m-usd-data-breach-fine/</loc>
		<lastmod>2019-07-25T19:35:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/22/after-florida-indiana-canada-the-same-ransomware-infects-china/</loc>
		<lastmod>2019-07-22T23:20:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/22/a-new-surveillance-tool-can-monitor-your-activities-in-facebook-amazon-google-and-apple-cloud/</loc>
		<lastmod>2019-07-22T23:26:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/23/turn-any-android-device-into-an-pentesting-device/</loc>
		<lastmod>2019-07-23T19:27:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/23/new-vulnerability-at-nvidia-allows-remote-code-execution-and-privilege-escalation/</loc>
		<lastmod>2019-07-23T20:49:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/23/equifax-will-be-paying-up-to-23k-usd-to-each-user-whose-data-was-compromised/</loc>
		<lastmod>2019-07-25T19:22:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/23/ransomware-attacks-against-cloud-services-increase-insynq-is-the-most-recent-victim/</loc>
		<lastmod>2019-07-23T22:05:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/24/popular-news-video-23-july/</loc>
		<lastmod>2019-07-26T14:52:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/24/all-new-app-store-for-hackers-kali-nethunter/</loc>
		<lastmod>2019-08-06T23:44:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/24/a-food-delivery-app-was-hacked-and-customers-were-billed-for-food-drinks/</loc>
		<lastmod>2019-07-26T14:57:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/24/hackers-take-control-of-london-police-twitter-account/</loc>
		<lastmod>2019-07-26T14:52:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/24/remote-execution-vulnerability-report-in-vlc-was-fake-news-users-of-this-player-are-secured/</loc>
		<lastmod>2019-07-24T22:28:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/24/now-you-can-sue-your-telecomm-company-in-any-sim-swap-hacking-case/</loc>
		<lastmod>2019-07-24T23:18:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/24/new-android-attack-allows-listening-to-calls-remotely/</loc>
		<lastmod>2019-07-24T23:26:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/25/popular-news-video-24-july/</loc>
		<lastmod>2019-07-31T14:30:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/25/once-again-sky-has-a-data-breach-keep-an-eye-over-your-credit-card-notifications/</loc>
		<lastmod>2019-07-25T19:10:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/25/be-careful-using-robinhood-for-stocks-as-hackers-could-take-away-all-your-money-one-day/</loc>
		<lastmod>2019-07-25T19:21:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/25/windows-exploit-suggester-is-here/</loc>
		<lastmod>2019-07-25T19:55:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/25/google-wants-to-listen-to-your-conversations-with-the-new-sound-amplifier-app/</loc>
		<lastmod>2019-07-25T21:50:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/25/ransomware-attack-causes-blackout-in-johannesburg-south-africa/</loc>
		<lastmod>2019-07-30T23:07:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/25/a-major-malware-attack-in-louisiana-multiple-schools-infected-with-ransomware/</loc>
		<lastmod>2019-07-30T23:06:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/26/popular-news-video-26-july/</loc>
		<lastmod>2019-08-01T15:33:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/26/how-to-do-facial-recognition-from-a-distance-of-1-5-kilometers/</loc>
		<lastmod>2019-07-26T21:05:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/26/alabama-schools-are-the-target-after-louisiana-oklahoma-california-ohio-idaho-ny-is-ransomware-making-america-great-again/</loc>
		<lastmod>2019-07-30T23:05:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/29/has-your-personal-information-been-leaked-in-sephora-databases-breach/</loc>
		<lastmod>2019-07-29T19:22:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/29/vulnerabilities-in-the-vxworks-operating-system-affect-2-billion-devices-in-companies-around-the-world/</loc>
		<lastmod>2019-07-29T19:32:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/29/after-maryland-and-florida-georgia-police-suffer-ransomware-infection/</loc>
		<lastmod>2019-07-29T23:02:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/29/critical-libreoffice-vulnerability-allows-hackers-to-take-control-of-exposed-devices/</loc>
		<lastmod>2019-07-29T23:11:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/29/android-mobile-hacks-with-android-debug-bridgeadb-part-i/</loc>
		<lastmod>2019-07-30T03:21:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/30/100-million-capital-one-customers-hacked-by-this-girl/</loc>
		<lastmod>2019-07-30T21:23:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/30/android-mobile-hacks-with-android-debug-bridgeadb-part-ii/</loc>
		<lastmod>2019-07-30T20:57:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/30/how-private-jets-and-helicopters-can-be-easily-hacked-and-crashed/</loc>
		<lastmod>2019-08-01T05:56:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/30/apples-siri-its-employees-are-listening-to-you-during-sex-encounters-or-talks-with-your-doctor/</loc>
		<lastmod>2019-08-01T05:56:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/30/hackers-attack-los-angeles-police-department-thousands-of-officers-are-blackmailed-using-their-personal-data/</loc>
		<lastmod>2019-07-30T23:17:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/31/popular-news-video-30-july/</loc>
		<lastmod>2019-08-03T22:24:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/31/protect-your-voicemail-hackers-could-spy-on-your-telegram-chats/</loc>
		<lastmod>2019-08-02T05:31:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/07/31/dont-try-the-sex-simulator-app-on-your-android-smartphone-its-a-ransomware/</loc>
		<lastmod>2019-08-02T05:30:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/08/01/popular-news-video-1-aug/</loc>
		<lastmod>2019-08-06T14:46:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/08/01/will-cisco-pay-all-its-customers-for-selling-vulnerable-products-as-it-paid-us-government/</loc>
		<lastmod>2019-08-03T22:08:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/08/01/how-to-replace-the-live-feed-of-a-surveillance-camera-just-like-in-movies/</loc>
		<lastmod>2019-08-03T22:09:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/08/01/to-stop-the-spread-of-fake-news-whatsapp-will-notify-users-when-a-message-has-been-forwarded-multiple-times/</loc>
		<lastmod>2019-08-03T22:08:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/08/01/this-malware-is-stealing-money-from-banks-in-mexico-and-brazil/</loc>
		<lastmod>2019-08-01T23:21:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/08/02/popular-news-video-2-aug/</loc>
		<lastmod>2019-08-08T16:20:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/08/02/hack-your-friends-facebook-account-using-hiddeneye/</loc>
		<lastmod>2019-08-02T15:29:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/08/02/data-breach-in-the-education-sector-pearson-is-the-new-target-of-these-attacks/</loc>
		<lastmod>2019-08-02T19:02:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/08/02/microsoft-office-365-mobile-apps-have-multiple-security-and-privacy-issues/</loc>
		<lastmod>2019-08-02T19:10:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/08/02/the-fbi-can-make-you-millionaire-you-just-have-to-develop-a-social-media-tracking-tool/</loc>
		<lastmod>2019-08-07T21:19:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/08/02/millions-of-teens-are-using-a-new-instagram-trick-that-exposes-their-personal-data/</loc>
		<lastmod>2019-08-02T23:20:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/08/03/popular-news-video-3-aug/</loc>
		<lastmod>2019-08-08T16:28:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/08/06/best-android-apps-to-hack-wifi-networks/</loc>
		<lastmod>2021-08-01T17:42:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/08/06/germanwiper-the-new-ransomware-variant-that-overwrites-data-instead-of-encrypting-it/</loc>
		<lastmod>2019-08-06T19:18:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/08/06/first-they-were-schools-now-hospitals-suffer-ransomware-attacks-louisiana-declares-emergency/</loc>
		<lastmod>2019-08-06T23:23:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/08/06/how-to-check-if-someone-is-spying-on-your-mobile/</loc>
		<lastmod>2019-08-06T20:42:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/08/06/this-child-hacked-his-school-to-change-his-grades-students-are-learning-from-ransomware-attacks/</loc>
		<lastmod>2019-08-06T23:01:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/08/06/how-hackers-are-stealing-peoples-fingerprints-with-their-photos/</loc>
		<lastmod>2019-08-07T21:18:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/08/07/popular-news-video-7-aug/</loc>
		<lastmod>2019-08-13T01:23:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/08/07/critical-vulnerabilities-found-on-cisco-series-220-switches/</loc>
		<lastmod>2019-08-07T19:05:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/08/07/indiana-state-pays-over-130k-usd-due-to-ransomware-attack/</loc>
		<lastmod>2019-08-07T21:45:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/08/07/missouri-police-department-infected-with-ransomware/</loc>
		<lastmod>2019-08-07T23:25:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/08/07/iphones-will-block-background-voice-call-on-whatsapp-and-facebook-messenger/</loc>
		<lastmod>2019-08-08T21:16:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/08/07/new-swapgs-vulnerability-on-windows-affects-intel-and-amd-cpus/</loc>
		<lastmod>2019-08-07T23:17:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/08/08/popular-news-video-8-aug/</loc>
		<lastmod>2019-08-13T01:23:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/08/08/north-carolina-police-systems-infected-with-ransomware-again-will-they-pay-another-ransom/</loc>
		<lastmod>2019-08-08T19:14:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/08/08/critical-zero-day-vulnerability-on-steam-online-gaming-platform/</loc>
		<lastmod>2019-12-20T16:39:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/08/08/critical-sql-injection-vulnerability-in-a-starbucks-enterprise-database/</loc>
		<lastmod>2019-08-08T23:08:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/08/08/simple-reasons-why-the-microsoft-azure-cloud-isnt-secure/</loc>
		<lastmod>2019-08-08T23:13:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/08/09/london-metro-bus-train-ticket-payment-system-hacked/</loc>
		<lastmod>2019-08-09T19:17:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/08/09/3fun-dating-app-for-threesomes-was-hacked-multiple-users-blackmailed/</loc>
		<lastmod>2019-08-09T19:23:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/08/09/air-new-zeland-was-hacked-passengers-personal-information-was-leaked/</loc>
		<lastmod>2019-08-09T21:57:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/08/10/4-browsers-for-safe-anonymous-surfing/</loc>
		<lastmod>2019-09-12T17:50:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/08/10/popular-news-video-10-aug/</loc>
		<lastmod>2019-08-16T00:56:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/08/12/intercepting-avaya-voip-phone-calls-is-possible-now/</loc>
		<lastmod>2019-08-12T19:11:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/08/12/are-you-a-regular-brazzers-pornhub-or-else-visitor-a-new-malware-is-able-to-wait-and-start-recording-when-you-visit-those-sites/</loc>
		<lastmod>2019-08-14T15:28:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/08/12/is-it-possible-to-kill-a-person-by-hacking-a-speaker/</loc>
		<lastmod>2019-08-14T15:29:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/08/12/40-oem-drivers-like-asus-realtek-gigabyte-intel-amd-and-toshiba-are-vulnerable-to-hackers/</loc>
		<lastmod>2019-08-12T23:25:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/08/12/popular-video-12-aug/</loc>
		<lastmod>2019-08-16T00:57:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/08/12/crack-any-wifi-password-with-wifibroot/</loc>
		<lastmod>2021-07-23T19:21:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/08/13/pwc-offered-cybersecurity-services-and-ended-up-being-fined-170k-usd-for-data-privacy-issues/</loc>
		<lastmod>2019-08-29T19:10:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/08/13/british-airways-flaw-allows-hackers-to-change-your-reservations/</loc>
		<lastmod>2019-08-15T00:23:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/08/13/the-1000-most-popular-android-apps-have-serious-vulnerabilities-in-the-cloud/</loc>
		<lastmod>2019-08-13T23:10:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/08/13/7-million-android-phones-sold-with-preinstalled-malware-backdoors/</loc>
		<lastmod>2019-08-13T23:15:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/08/14/popular-video-14-aug/</loc>
		<lastmod>2019-08-19T22:23:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/08/14/check-if-your-biometric-records-fingerprints-facial-recognition-data-are-in-this-data-breach-of-more-than-1-million-people/</loc>
		<lastmod>2019-08-14T19:22:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/08/14/120-hospitals-in-france-affected-by-massive-ransomware-attack-health-systems-are-down/</loc>
		<lastmod>2019-08-14T19:28:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/08/14/facebook-employees-are-listening-to-your-sex-private-talks-through-your-microphone/</loc>
		<lastmod>2019-08-14T23:09:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/08/14/how-amazon-is-selling-your-facial-recognition-data-using-a-doorbell/</loc>
		<lastmod>2019-08-14T23:13:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/08/15/new-bluetooth-vulnerability-allows-hacking-ios-and-android-devices/</loc>
		<lastmod>2019-08-15T19:17:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/08/15/pubg-will-ban-and-publish-names-of-cheating-users-reveal-more-than-a-hundred-names/</loc>
		<lastmod>2019-08-17T23:54:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/08/15/he-made-a-fortune-by-atm-jackpotting-las-vegas-casinos-real-gambler-hacker/</loc>
		<lastmod>2019-08-17T23:53:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2019/08/15/new-clothing-line-to-trick-facial-recognition-cameras-and-avoid-traffic-tickets/</loc>
		<lastmod>2019-08-15T23:11:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
</urlset><!-- <p>Please edit wp-db.inc.php in wp-includes and set SAVEQUERIES to true if you want to see the queries.</p> --> <!-- Request ID: e2d4d0f3b5a8d49cf0c501e075895ac9; Queries for sitemap: 2; Total queries: 51; Seconds: 0.08; Memory for sitemap: 2MB; Total memory: 16MB -->
