<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet type='text/xsl' href='https://www.securitynewspaper.com/snnews_pl/google-sitemap-generator/sitemap.xsl'?><!-- sitemap-generator-url='http://www.arnebrachhold.de' sitemap-generator-version='4.1.23' -->
<!-- generated-on='May 17, 2026 9:02 am' -->
<urlset xmlns:xsi='http://www.w3.org/2001/XMLSchema-instance' xsi:schemaLocation='http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd' xmlns='http://www.sitemaps.org/schemas/sitemap/0.9'>	<url>
		<loc>https://www.securitynewspaper.com/2021/09/14/11-high-severity-including-2-zero-days-vulnerabilities-in-google-chrome-update-your-browser-immediately/</loc>
		<lastmod>2021-09-14T16:16:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/09/14/high-severity-vulnerability-in-matrix-communication-protocol-allows-hackers-to-read-encrypted-chats-on-android-phones/</loc>
		<lastmod>2021-09-14T20:46:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/09/15/unjustified-former-nsa-employees-who-created-pegasus-like-tools-for-uae-will-pay-1-6-million-to-avoid-jail-time/</loc>
		<lastmod>2021-09-15T16:12:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/09/15/4-critical-vulnerabilities-in-azure-linux-vms-patch-quickly/</loc>
		<lastmod>2021-09-15T17:36:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/09/15/sensitive-walgreens-customer-data-leaked-including-covid-19-test-results/</loc>
		<lastmod>2021-09-15T21:50:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/09/16/how-to-hack-and-bypass-a-web-application-firewall-waf-during-penetrating-testing/</loc>
		<lastmod>2021-09-16T13:18:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/09/17/cve-2021-3723-unpatched-command-injection-vulnerability-affects-ibm-system-x3550-m3-and-ibm-system-x-3650-m3/</loc>
		<lastmod>2021-09-17T16:20:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/09/17/how-this-guy-illegally-unlocked-2-million-android-and-iphone-cell-phones/</loc>
		<lastmod>2021-09-17T18:13:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/09/20/how-to-buy-crypto-a-guide-for-the-crypto-beginner/</loc>
		<lastmod>2025-09-24T22:36:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/09/20/new-malware-can-infect-windows-and-linux-devices-70-different-virustotal-antvirus-cant-detect-it/</loc>
		<lastmod>2021-09-20T16:19:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/09/20/how-106-cybercriminals-working-for-italian-and-spanish-mafia-were-hacked-by-europol/</loc>
		<lastmod>2021-09-20T18:14:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/09/20/cve-2019-16651-vulnerability-in-virgin-media-super-hub-3-routers-allow-determining-the-real-ip-address-of-vpn-users/</loc>
		<lastmod>2021-09-20T23:22:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/09/21/this-hacking-group-infected-the-largest-grain-and-meat-supplier-in-the-u-s-with-ransomware-way-more-dangerous-than-colonial-pipeline-attack/</loc>
		<lastmod>2021-09-21T16:15:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/09/21/cve-2021-33035-zero-day-unpatched-vulnerability-in-apache-openoffice-allows-taking-control-of-network-via-rce/</loc>
		<lastmod>2021-09-21T17:22:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/09/21/cve-2021-36260-remotely-hacking-and-spying-on-hikvision-cctv-systems-with-this-zero-click-vulnerability/</loc>
		<lastmod>2021-09-21T22:01:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/09/21/buffer-overflow-and-out-of-bounds-reading-zero-day-vulnerabilities-in-dell-powerpath-for-windows/</loc>
		<lastmod>2021-09-21T23:13:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/09/22/how-xiaomi-mi-10t-huawei-p40-and-oneplus-8t-spy-on-what-users-type-on-their-phones-5-reasons-not-to-buy-these-devices/</loc>
		<lastmod>2021-09-22T16:19:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/09/22/new-google-chrome-update-has-a-dangerous-idle-detection-feature-that-will-track-system-usage-in-detail/</loc>
		<lastmod>2021-09-22T17:15:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/09/22/zero-day-vulnerability-in-apples-new-icloud-private-relay-service-for-ios-15-allows-seeing-user-real-ip-addresses/</loc>
		<lastmod>2021-09-22T22:09:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/09/22/19-critical-vulnerabilities-in-vmware-vcenter-server-patch-immediately/</loc>
		<lastmod>2021-09-22T23:20:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/09/23/how-to-find-password-manager-software-that-can-scale/</loc>
		<lastmod>2025-09-24T22:36:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/09/23/microsoft-exchange-vulnerability-leaks-thousands-of-domain-credentials-check-if-youre-in-the-list/</loc>
		<lastmod>2021-09-23T17:30:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/09/23/france-president-emmanuel-macron-covid-19-passport-qr-code-leaked-on-social-media-suspect-arrested/</loc>
		<lastmod>2021-09-23T21:12:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/09/23/8-techniques-to-protect-your-windows-network-domains-against-mimikatz-credential-stealing-tool/</loc>
		<lastmod>2021-09-23T22:23:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/09/24/my-mac-doesnt-turn-on-first-aid-and-tips/</loc>
		<lastmod>2025-09-24T22:36:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/09/24/clicking-this-whatsapp-backup-notification-can-allow-hackers-to-spy-on-your-conversations/</loc>
		<lastmod>2021-09-24T17:52:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/09/24/2-wordpress-nija-forms-plugins-allow-hacking-millions-wordpress-websites/</loc>
		<lastmod>2021-09-24T18:52:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/09/24/this-mobile-banking-malware-is-targeting-customers-of-27-indian-banks-via-income-tax-refund/</loc>
		<lastmod>2021-09-24T21:46:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/09/27/cybercriminals-are-signing-malware-in-new-way-to-prevent-detection-new-research-via-google-team/</loc>
		<lastmod>2021-09-27T17:36:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/09/27/cve-2020-17148-critical-remote-execution-vulnerability-in-visual-studio-codes-remote-development-extension/</loc>
		<lastmod>2021-09-27T21:51:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/09/27/new-secure-payment-feature-in-upcoming-versions-of-google-chrome/</loc>
		<lastmod>2021-09-27T23:26:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/09/28/4-tips-for-creating-a-secure-digital-agency-environment/</loc>
		<lastmod>2025-09-24T22:36:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/09/28/owasp-top-10-vulnerabilities-for-2021-were-published-including-considerable-changes/</loc>
		<lastmod>2021-09-28T16:15:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/09/28/the-most-dangerous-fraudster-gang-was-finally-arrested-almost-90000-people-scammed/</loc>
		<lastmod>2021-09-28T19:27:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/09/28/how-to-hack-wpa2-psk-wifi-passwords-easily-with-just-10-commands-using-this-tool/</loc>
		<lastmod>2021-09-28T22:51:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/09/29/cve-2021-37973-zero-day-vulnerability-affecting-chrome-browser-allows-hackers-to-spy-on-you/</loc>
		<lastmod>2021-09-29T16:09:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/09/29/critical-privilege-escalation-vulnerability-in-asus-laptops-with-rog-armoury-crate-app-installed/</loc>
		<lastmod>2021-09-29T18:26:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/09/30/how-to-easily-copy-facebook-instagram-twitter-gmail-cookies-and-browser-stored-passwords-to-a-usb-pendrive-all-with-just-15-commands/</loc>
		<lastmod>2021-10-02T10:08:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/10/01/how-to-find-vulnerabilities-in-android-apps-using-mariana-trench-tool-this-tool-is-used-by-facebook-cyber-security-team/</loc>
		<lastmod>2021-10-01T16:21:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/10/01/ghostemperor-new-chinese-virus-to-take-control-of-your-devices-and-make-you-terracotta-slave/</loc>
		<lastmod>2021-10-01T18:24:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/10/02/revealed-how-solana-based-nft-project-stole-130000-usd-from-users/</loc>
		<lastmod>2021-10-01T21:20:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/10/04/cve-2021-1810-vulnerability-in-macos-allows-bypassing-gatekeeper-feature-proof-of-concept-available/</loc>
		<lastmod>2021-10-04T16:00:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/10/05/how-to-do-digital-forensics-and-reverse-engineering-on-windows-registries-with-free-regripper-tool/</loc>
		<lastmod>2021-10-04T22:16:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/10/06/new-research-how-to-steal-data-from-air-gapped-devices-using-ethernet-cable-as-antenna-without-internet/</loc>
		<lastmod>2021-10-06T16:17:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/10/06/three-critical-vulnerabilities-in-axis-cctv-cameras-allow-hackers-to-spy-on-you-patch-immediately/</loc>
		<lastmod>2021-10-06T17:40:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/10/06/three-critical-vulnerabilities-in-industrial-automation-products-honeywell-experion-pks-and-ace-controllers-allow-hackers-to-shut-down-your-manufacturing/</loc>
		<lastmod>2021-10-06T23:26:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/10/07/7-new-techniques-for-nft-theft-this-is-how-they-stole-millions-of-evolved-apes-nft/</loc>
		<lastmod>2021-10-07T16:10:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/10/07/malkamak-the-iranian-hacking-group-targeting-telecommunications-and-aerospace-companies/</loc>
		<lastmod>2021-10-07T22:57:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/10/08/over-14000-gmail-users-fall-victim-to-russian-government-sponsored-phishing-campaign/</loc>
		<lastmod>2021-10-08T17:41:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/10/08/how-the-king-of-dubai-used-money-from-his-country-to-spy-on-his-ex-wife-and-her-lawyers/</loc>
		<lastmod>2021-10-08T22:21:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/10/11/fontonlake-a-killer-backdoor-cocktail-with-a-rootkit-for-linux/</loc>
		<lastmod>2021-10-11T16:25:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/10/11/this-20000-nintendo-game-boy-can-hack-and-steal-any-keyless-mitsubishi-outlander-in-a-minute-never-seen-before-cybercriminal-tool/</loc>
		<lastmod>2021-10-11T17:14:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/10/11/6-critical-vulnerabilities-in-openoffice-make-phishing-attacks-easier-patch-immediately/</loc>
		<lastmod>2021-10-11T21:47:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/10/12/18-critical-vulnerabilities-discovered-in-foxit-pdf-reader-and-foxit-pdf-editor-update-your-software-quickly/</loc>
		<lastmod>2021-10-12T17:59:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/10/12/google-launches-free-cyber-security-advanced-protection-program-for-journalists-human-rights-activist-and-officers-how-to-enroll/</loc>
		<lastmod>2021-10-12T23:23:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/10/13/how-automated-breach-and-attack-simulation-protects-businesses-from-various-threats/</loc>
		<lastmod>2022-06-02T16:59:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/10/13/top-7-cyber-security-research-paper-topics/</loc>
		<lastmod>2025-09-24T22:37:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/10/13/new-technique-for-hacking-nft-crypto-wallets-through-opensea-and-metamask-using-nft-artwork/</loc>
		<lastmod>2021-10-13T18:18:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/10/13/13-important-vulnerabilities-affecting-sap-environmental-compliance-update-immediately/</loc>
		<lastmod>2021-10-13T21:25:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/10/13/how-hacker-group-cryptorom-is-cashing-out-bank-accounts-of-tinder-bumble-grindr-and-facebook-dating-users/</loc>
		<lastmod>2021-10-13T23:12:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/10/14/computer-manufacturer-acer-suffers-massive-cyberattack-cybercriminals-threaten-to-leak-sensitive-data/</loc>
		<lastmod>2021-10-14T16:30:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/10/14/7-eleven-stores-capture-images-of-their-customers-faces-without-their-consent/</loc>
		<lastmod>2021-10-14T18:04:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/10/14/how-to-protect-your-facebook-account-from-hackers-with-new-security-feature-facebook-protect/</loc>
		<lastmod>2021-10-14T21:52:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/10/14/how-docusign-phishing-technique-can-be-used-to-bypass-your-spam-controls/</loc>
		<lastmod>2021-10-14T23:09:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/10/15/india-mexico-nigeria-singapore-south-africa-and-25-other-nations-form-a-taskforce-with-united-states-to-stop-ransomware-payment/</loc>
		<lastmod>2021-10-15T16:21:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/10/16/how-to-do-automatic-vulnerability-analysis-and-assessment-of-your-applications-network-free-of-cost/</loc>
		<lastmod>2021-10-15T22:30:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/10/18/how-hackers-cloned-a-company-directors-voice-and-robbed-35-million-usd-from-his-bank-account/</loc>
		<lastmod>2021-10-18T16:34:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/10/18/billionaire-most-dangerous-hacker-who-even-terrified-the-fbi-finally-got-hacked/</loc>
		<lastmod>2021-10-18T17:41:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/10/18/zero-click-remote-code-execution-exploit-for-fully-patched-ios-15-running-on-iphone-13-demonstrated-by-experts/</loc>
		<lastmod>2021-10-18T23:24:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/10/19/two-critical-http-request-smuggling-vulnerabilities-in-node-js-patch-immediately/</loc>
		<lastmod>2021-10-19T16:09:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/10/19/how-to-hack-into-waf-web-application-firewall-using-xss-attacks/</loc>
		<lastmod>2021-10-19T23:22:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/10/20/hackers-use-cards-from-the-squid-game-series-to-steal-sensitive-data-with-qr-codes/</loc>
		<lastmod>2021-10-20T16:34:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/10/20/critical-vulnerability-in-slack-allows-fingerprinting-attacks-on-users/</loc>
		<lastmod>2021-10-20T17:17:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/10/20/zte-mf971r-lte-low-cost-portable-wi-fi-hotspot-router-patch-the-firmware/</loc>
		<lastmod>2021-10-20T22:51:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/10/20/how-this-former-nfl-player-stole-floridas-peoples-identities-and-money/</loc>
		<lastmod>2021-10-20T23:24:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/10/21/how-china-cyber-security-army-is-using-new-internet-protocol-to-lead-the-cyber-warfare/</loc>
		<lastmod>2021-10-21T16:21:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/10/21/ransomware-attack-disrupts-all-systems-of-a-prestigious-university/</loc>
		<lastmod>2021-10-21T17:26:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/10/21/two-critical-vulnerabilities-affect-millions-of-freerdp-servers-patch-them-before-someone-installs-a-backdoor/</loc>
		<lastmod>2021-10-21T22:57:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/10/21/critical-remote-code-execution-vulnerability-in-winrar-demo-version-update-quickly/</loc>
		<lastmod>2021-10-21T23:19:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/10/22/truth-social-donald-trumps-social-media-platform-was-hacked-during-its-first-days-of-testing/</loc>
		<lastmod>2021-10-22T16:32:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/10/22/if-you-see-a-cell-phone-lying-on-the-street-do-not-pick-it-up-it-is-a-scam-hackers-can-cash-out-your-accounts/</loc>
		<lastmod>2021-10-22T22:01:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/10/22/3-malicious-npm-javascript-libraries-recently-discovered-can-install-crypto-miners-on-windows-linux-and-mac-devices/</loc>
		<lastmod>2021-10-22T22:10:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/10/25/facebook-sues-hacker-who-stole-information-from-its-users-to-sell-it-on-illegal-forums/</loc>
		<lastmod>2021-10-25T17:21:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/10/25/cve-2021-41163-discourse-forum-software-vulnerability-can-be-very-dangerous-warns-cisa/</loc>
		<lastmod>2021-10-25T22:23:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/10/26/google-ads-for-non-amp-websites-intentionally-load-slower-by-a-few-seconds-new-lawsuit-against-google/</loc>
		<lastmod>2021-10-26T17:50:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/10/26/time-to-work-for-sysadmins-adobe-fixes-90-vulnerabilities-in-19-of-its-products/</loc>
		<lastmod>2021-10-26T22:16:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/10/27/cve-2018-9100-cve-2018-9099-vulnerabilities-in-diebold-nixdorf-atms-allow-easily-jackpotting-a-machine-via-a-black-box-attack-banks-should-patch-them-immediately/</loc>
		<lastmod>2021-10-26T23:10:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/10/28/hitler-mickey-mouse-and-spongebob-got-covid-19-vaccination-valid-vaccination-certificates-generated-by-hacking-the-european-vaccination-passport-system/</loc>
		<lastmod>2021-10-28T16:30:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/10/28/phishing-emails-with-qr-codes-can-be-used-to-hack-office-365-accounts/</loc>
		<lastmod>2021-10-28T17:44:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/10/28/how-the-fbi-tracked-a-member-of-the-billionaire-and-dangerous-hacker-group-revil/</loc>
		<lastmod>2021-10-28T23:14:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/10/29/new-vulnerability-in-macos-allows-cyber-criminals-to-hack-macbook-pros-via-rootkits/</loc>
		<lastmod>2021-10-29T17:42:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/10/29/cve-2021-34484-zero-day-vulnerability-affects-billions-of-windows-users-no-patch-available/</loc>
		<lastmod>2021-10-29T18:36:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/01/squid-game-is-back-watch-new-season-before-anyone-else-new-phishing-email-can-hack-your-device-with-malware/</loc>
		<lastmod>2021-11-01T17:19:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/01/how-police-can-try-to-get-your-signal-messaging-apps-records-for-investigation/</loc>
		<lastmod>2021-11-01T18:35:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/01/iranian-hackers-take-revenge-of-a-gas-station-hack-by-defacing-and-leaking-data-of-multiple-israeli-companies-websites/</loc>
		<lastmod>2021-11-01T22:58:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/01/iranian-group-hacks-biggest-israeli-lgbtq-dating-site-hackers-threaten-to-expose-personal-data-of-lgbtq-people/</loc>
		<lastmod>2021-11-02T00:16:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/02/how-the-squid-game-cryptocurrency-rose-from-0-to-thousands-of-dollars-and-then-vanished-to-steal-millions/</loc>
		<lastmod>2021-11-02T17:16:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/02/largest-botnet-with-control-of-millions-of-devices-discovered-the-pink-botnet/</loc>
		<lastmod>2021-11-02T18:08:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/02/multiple-pakistani-banks-under-infrastructure-crippling-cyber-attacks/</loc>
		<lastmod>2021-11-02T22:07:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/03/zero-day-vulnerabilities-found-in-canon-imageclass-and-hp-color-laserjet-pro-printers-at-pwn2own/</loc>
		<lastmod>2021-11-03T17:05:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/03/hackers-stole-usd-139-million-from-bhx-exchange-and-anybody-who-can-help-find-hackers-can-earn-10-million-usd/</loc>
		<lastmod>2021-11-03T18:16:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/03/owtf-penetration-testing-framework-combines-owasp-top-10-ptes-and-nist/</loc>
		<lastmod>2021-11-03T22:17:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/03/new-whatsapp-attack-is-hijacking-hundreds-of-accounts-how-to-prevent-it/</loc>
		<lastmod>2021-11-03T22:57:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/04/5-simple-steps-to-backup-vmware-vms/</loc>
		<lastmod>2025-09-24T22:38:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/04/critical-remote-code-execution-vulnerability-in-linux-kernel-tipc-module-affects-millions-of-devices-patch-immediately/</loc>
		<lastmod>2021-11-04T17:06:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/04/booming-business-in-india-fake-death-and-birth-certificates-hackers-get-into-government-websites-to-generate-800-fake-birth-and-death-certificates/</loc>
		<lastmod>2021-11-04T21:55:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/05/u-s-government-offers-10-million-usd-reward-for-information-leading-to-darkside-ransomware-operators/</loc>
		<lastmod>2021-11-05T18:55:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/05/pii-and-personal-data-of-200k-australians-leaked-by-marketing-company-acquirely/</loc>
		<lastmod>2021-11-05T21:43:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/06/how-to-do-digital-forensics-of-a-hacked-network-with-tcpdump/</loc>
		<lastmod>2021-11-05T22:48:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/08/two-critical-sql-injection-vulnerabilities-in-philips-tasy-emr-used-by-hospitals-worldwide/</loc>
		<lastmod>2021-11-08T18:18:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/08/this-is-how-hackers-cash-out-your-bank-accounts-using-a-new-atm-scam-variant-fbi/</loc>
		<lastmod>2021-11-08T21:11:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/08/europol-arrests-8-partners-of-the-fugitive-billionaire-and-most-dangerous-hacker/</loc>
		<lastmod>2021-11-08T23:46:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/08/police-shuts-down-scam-operation-that-stole-millions-from-hundreds-of-people/</loc>
		<lastmod>2021-11-09T00:40:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/09/how-to-find-a-relative-by-using-big-data-sites/</loc>
		<lastmod>2025-09-24T22:38:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/09/stock-trading-app-robinhood-is-not-safe-anymore-hackers-can-steal-money-from-your-accounts/</loc>
		<lastmod>2021-11-09T17:20:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/09/how-to-do-penetration-testing-of-iot-devices-easily/</loc>
		<lastmod>2021-11-09T23:29:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/10/nucleus13-vulnerabilities-affect-millions-of-iot-devices-update-now/</loc>
		<lastmod>2021-11-10T17:39:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/10/dangerous-hacking-group-attacks-vulnerable-docker-servers-in-cryptocurrency-mining-campaign/</loc>
		<lastmod>2021-11-10T22:07:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/10/patch-these-new-8-critical-vulnerabilities-in-samba/</loc>
		<lastmod>2021-11-10T23:35:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/10/resechers-find-new-way-to-insert-backdoor-in-javascript-code-with-invisible-characters/</loc>
		<lastmod>2021-11-11T00:27:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/11/cve-2021-22048-with-high-severity-rating-affects-vmware-vcenter-server-no-patch-available/</loc>
		<lastmod>2021-11-11T17:09:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/11/threat-actors-penetrate-australian-sunwater-water-supply-systems/</loc>
		<lastmod>2021-11-11T23:26:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/12/how-apple-mac-users-were-spied-upon-easily-according-to-google-cyber-security-team/</loc>
		<lastmod>2021-11-12T17:12:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/12/vulnerabilities-in-apple-pay-samsung-pay-and-google-pay-allow-easy-unauthorized-purchases/</loc>
		<lastmod>2021-11-12T23:36:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/15/3-vulnerabilities-in-zoom-allow-hackers-to-intercept-data-from-meetings-and-attack-customer-infrastructure/</loc>
		<lastmod>2021-11-12T23:51:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/16/defining-the-difference-between-hot-wallets-and-cold-wallets/</loc>
		<lastmod>2025-09-24T22:38:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/16/new-research-aws-api-gateway-could-be-exploited-via-a-http-header-smuggling-attack/</loc>
		<lastmod>2021-11-16T17:23:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/16/3-critical-bios-vulnerabilities-affect-intel-microchips-in-laptops-and-iot-devices/</loc>
		<lastmod>2021-11-16T19:45:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/16/4-critical-vulnerabilities-in-moodle-an-open-source-learning-platform-course-management-system-cms/</loc>
		<lastmod>2021-11-17T00:09:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/16/2-critical-vulnerabilities-in-fortinet-fortiportal/</loc>
		<lastmod>2021-11-17T00:25:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/17/this-is-how-the-new-emotet-spam-email-looks-like/</loc>
		<lastmod>2021-11-17T17:21:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/18/how-to-keep-personal-information-safe-while-gambling-with-crypto/</loc>
		<lastmod>2025-09-24T22:38:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/18/important-it-management-metrics-in-the-remote-workplace/</loc>
		<lastmod>2022-10-26T14:44:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/18/critical-vulnerabilities-in-npm-would-allow-hackers-to-publish-new-versions-of-any-package/</loc>
		<lastmod>2021-11-18T18:46:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/18/very-critical-information-disclosure-vulnerability-in-azure-active-directory-ad-patch-immediately/</loc>
		<lastmod>2021-11-18T17:14:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/18/zero-day-vulnerability-in-fatpipe-sd-wan-solutions-allows-uploading-malicious-files-to-affected-servers/</loc>
		<lastmod>2021-11-18T22:01:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/18/3-unpatched-zero-day-vulnerabilities-in-schneider-electric-guicon-affect-scada-systems-and-critical-infrastructure/</loc>
		<lastmod>2021-11-18T22:42:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/18/these-two-iranian-hackers-interfered-in-2020-us-elections/</loc>
		<lastmod>2021-11-19T00:21:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/19/how-cybersecurity-prevents-terrorism/</loc>
		<lastmod>2025-09-24T22:39:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/19/brazking-an-android-banking-trojan-steals-your-bank-username-and-password-in-seconds/</loc>
		<lastmod>2021-11-19T18:21:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/19/critical-vulnerability-in-popular-posts-plugin-allows-uploading-malicious-file-to-hack-wordpress-websites/</loc>
		<lastmod>2021-11-19T19:52:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/19/3-unpatched-vulnerabilities-in-philips-mri-1-5t-and-3t-machines-allow-leaking-confidential-health-data/</loc>
		<lastmod>2021-11-19T22:05:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/19/2-unpatched-vulnerabilities-identified-in-philips-intellibridge-ec40-and-ec80-hub-that-are-used-to-transfer-data-been-medical-devices/</loc>
		<lastmod>2021-11-19T23:49:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/22/20tb-torrents-containing-every-nft-on-the-internet-available-for-download-biggest-nft-theft-of-the-history/</loc>
		<lastmod>2021-11-22T17:24:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/22/california-pizza-kitchen-restaurant-chain-hacked-confidential-data-leaked/</loc>
		<lastmod>2021-11-22T18:26:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/22/researchers-find-11-malicious-python-packages-in-the-pypi-repository-that-can-steal-access-tokens-passwords-and-create-backdoors/</loc>
		<lastmod>2021-11-22T23:23:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/22/critical-vulnerability-in-cisco-asa-and-cisco-ftd-allows-to-shutdown-the-firewall-vpn-patch-immediately/</loc>
		<lastmod>2021-11-23T00:24:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/23/cve-2021-41379-zero-day-vulnerability-with-no-patch-in-windows-11-windows-10-and-windows-server-2022/</loc>
		<lastmod>2021-11-23T17:47:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/24/top-6-tools-used-by-hackers-for-stealing-windows-domain-cache-credentials-5-alternatives-of-mimikatz/</loc>
		<lastmod>2021-11-24T00:04:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/25/smartphones-with-mediatek-chips-allow-hackers-to-spy-on-users-new-vulnerabilities-discovered/</loc>
		<lastmod>2021-11-25T17:37:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/25/new-research-millions-of-huawei-smartphones-are-inflected-with-malware/</loc>
		<lastmod>2021-11-25T19:14:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/25/tardigrade-the-new-malware-that-only-targets-medicine-and-vaccine-manufacturing-plants/</loc>
		<lastmod>2021-11-25T23:38:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/25/massive-data-breach-at-pakistan-every-single-citizen-affeced/</loc>
		<lastmod>2021-11-26T00:14:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/26/how-to-develop-creative-marketing-strategies/</loc>
		<lastmod>2025-09-24T22:39:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/26/youtube-search-of-free-games-show-trojan-links-be-careful-when-trying-out-the-games/</loc>
		<lastmod>2021-11-26T17:20:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/27/how-interpol-arrested-a-thousand-scammers-gang-that-operated-from-different-countries-and-stole-millions-from-thousands-of-people/</loc>
		<lastmod>2021-11-26T23:08:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/29/everything-about-hybrid-cloud-data-protection-tips/</loc>
		<lastmod>2025-09-24T22:39:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/29/record-shattering-q3-ddos-attack-volume-suggests-the-need-for-better-protection/</loc>
		<lastmod>2025-09-24T22:39:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/29/critical-vulnerability-in-apache-http-actively-exploited-update-now/</loc>
		<lastmod>2021-11-29T17:16:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/29/administrators-of-35-telegram-channels-arrested-for-selling-fake-covid-19-vaccination-certificates/</loc>
		<lastmod>2021-11-29T21:31:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/29/cyber-criminals-who-helped-people-cheat-and-pass-cisco-certifications-comptia-certifications-ec-council-certifications-arrested-new-modus-operandi-discovered/</loc>
		<lastmod>2021-11-30T00:15:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/30/panasonics-network-was-hacked-thousands-of-sensitive-records-leaked/</loc>
		<lastmod>2021-11-30T17:08:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/30/zero-day-vulnerability-in-zoom-affects-linux-windows-apple-and-android-users/</loc>
		<lastmod>2021-11-30T19:36:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/11/30/leaked-fbi-document-reveals-how-the-agency-can-access-data-from-whatsapp-wechat-imessage-telegram-line-signal-wickr-and-facebook-messenger/</loc>
		<lastmod>2021-11-30T21:49:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/12/01/cve-2021-24084-critical-zero-day-vulnerability-in-windows-10-no-patch-available/</loc>
		<lastmod>2021-12-01T17:23:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/12/01/critical-privilege-escalation-vulnerability-affects-almost-all-hp-printers/</loc>
		<lastmod>2021-12-01T18:56:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/12/01/hackers-expose-belarusian-government-corruption-regime-agreed-with-oligarch-for-the-exploitation-of-the-tobacco-industry/</loc>
		<lastmod>2021-12-01T23:50:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/12/01/encrochat-exposes-mafia-that-smuggled-117-millions-of-cigarettes-into-the-uk/</loc>
		<lastmod>2021-12-02T00:23:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/12/02/memory-corruption-vulnerability-affects-all-versions-of-mozilla-released-since-2012/</loc>
		<lastmod>2021-12-02T17:13:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/12/02/how-indian-delhi-police-solved-the-most-interesting-case-of-atm-jackpotting/</loc>
		<lastmod>2021-12-02T19:42:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/12/03/big-electric-company-loses-all-customers-records-and-bills-from-the-last-25-years-after-massive-hack/</loc>
		<lastmod>2021-12-03T18:43:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/12/03/angry-employee-stole-his-companys-data-blackmailed-the-bosses-and-dropped-their-stock-by-20-best-example-of-insider-threat/</loc>
		<lastmod>2021-12-03T19:41:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/12/04/how-to-perform-digital-forensics-of-malicious-pdf-files-easily-checking-if-a-pdf-document-has-malware-or-backdoors/</loc>
		<lastmod>2021-12-03T22:36:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/12/06/how-does-surfshark-vpn-stand-up-against-its-competitors/</loc>
		<lastmod>2022-10-26T14:46:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/12/06/hackers-are-taking-control-of-enterprise-printers-to-share-anti-work-and-pro-union-messages/</loc>
		<lastmod>2021-12-06T17:57:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/12/06/this-free-tool-allows-you-to-discover-side-channel-vulnerabilities-in-browser-and-os-xs-leaks-tool/</loc>
		<lastmod>2021-12-06T21:56:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/12/06/how-scammers-stole-20-million-usd-from-youtube-via-faking-background-music-ownership-rights/</loc>
		<lastmod>2021-12-06T23:51:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/12/07/a-company-that-sends-sms-otp-codes-on-behalf-of-google-twitter-facebook-etc-also-helps-governments-to-get-precise-locations-of-users/</loc>
		<lastmod>2021-12-07T18:11:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/12/07/how-microsoft-counter-attacked-the-infrastructure-used-by-chinese-military-hackers/</loc>
		<lastmod>2021-12-07T22:06:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/12/07/cyber-attack-causes-complete-it-failure-for-spar-a-7-eleven-like-express-store-chain/</loc>
		<lastmod>2021-12-07T23:08:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/12/08/rce-csrf-and-other-critical-vulnerabilities-in-fortios-and-fortiproxy-affect-various-fortinet-products/</loc>
		<lastmod>2021-12-08T17:38:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/12/08/secure-phone-pinephone-pro-is-now-available-an-open-source-hardware-phone-that-government-agencies-cant-spy/</loc>
		<lastmod>2021-12-08T20:23:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/12/08/important-privilege-escalation-flaw-in-sonicwall-global-vpn-client-patch-immediately/</loc>
		<lastmod>2021-12-09T00:02:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/12/08/information-disclosure-vulnerability-in-fortisandbox-fortiweb-and-fortiadc-patch-immediately/</loc>
		<lastmod>2023-05-19T22:42:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/12/09/in-2021-maximum-security-vulnerabilities-were-reported-as-compared-to-past-according-to-nist/</loc>
		<lastmod>2021-12-09T18:27:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/12/09/17-malicious-packages-in-the-node-js-package-manager-npm-code-repository-were-looking-to-harvest-discord-tokens/</loc>
		<lastmod>2021-12-09T19:34:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/12/09/british-telco-virgin-media-fined-50k-penalty-for-sending-spam-emails-to-more-than-400000-clients-who-opted-out-of-marketing-emails/</loc>
		<lastmod>2021-12-09T21:45:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/12/10/this-new-crypto-scam-is-focusing-only-on-football-fans-worldwide/</loc>
		<lastmod>2021-12-10T17:20:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/12/10/zero-day-vulnerability-in-log4j-affects-millions-of-apache-minecraft-and-other-applications-users-exploit-code-published/</loc>
		<lastmod>2021-12-10T19:39:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/12/10/world-largest-logistic-company-suffers-massive-cyber-attack/</loc>
		<lastmod>2021-12-10T21:54:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/12/13/canada-shuts-down-4000-government-websites-fearing-cyberattacks-exploiting-a-critical-vulnerability-in-log4j/</loc>
		<lastmod>2021-12-13T17:15:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/12/13/hackers-encrypt-the-vaccination-certificates-of-the-brazilian-population-with-ransomware/</loc>
		<lastmod>2021-12-13T19:12:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/12/13/how-to-check-if-you-have-log4j-installed-on-your-servers-fix-the-vulnerability-in-seconds-by-setting-the-log4j2-formatmsgnolookups-variable-to-true/</loc>
		<lastmod>2021-12-13T21:39:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/12/14/the-future-of-cloud-security/</loc>
		<lastmod>2025-09-24T22:40:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/12/14/how-to-install-exchange-server-2019-cu11-update/</loc>
		<lastmod>2025-09-24T22:40:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/12/14/ransomware-attack-targeting-kronos-hr-systems-will-affect-the-salary-and-work-hours-of-millions-of-employees-in-multiple-companies/</loc>
		<lastmod>2021-12-14T17:28:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/12/14/critical-vulnerability-in-cardiology-medical-devices-would-allow-hackers-to-provoke-heart-attacks-on-victims/</loc>
		<lastmod>2021-12-14T22:51:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/12/14/how-to-perform-kubernetes-pentesting-and-secure-it/</loc>
		<lastmod>2021-12-15T00:03:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/12/15/the-biggest-crypto-scam-in-instagram-history/</loc>
		<lastmod>2021-12-15T17:57:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/12/15/this-12kb-sized-ransomware-can-exploit-log4j-critical-vulnerability-and-encrypt-your-network/</loc>
		<lastmod>2021-12-15T21:32:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/12/15/how-hackers-stole-billions-from-russian-banks-in-just-seconds/</loc>
		<lastmod>2021-12-15T23:36:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/12/16/details-of-cve-2021-44228-cve-2021-45046-the-two-new-log4j-vulnerabilities-affecting-millions-of-devices/</loc>
		<lastmod>2021-12-16T17:46:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/12/16/darkwatchman-this-advanced-fileless-malware-only-writes-data-in-windows-registry-thus-cant-be-detected-by-security-solutions/</loc>
		<lastmod>2021-12-16T22:14:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/12/16/cybercriminals-are-exploiting-owowa-iis-module-to-take-control-of-exposed-servers/</loc>
		<lastmod>2021-12-16T23:40:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/12/17/if-you-talk-about-some-of-these-100-topics-chinese-government-will-start-spying-on-you/</loc>
		<lastmod>2021-12-17T18:06:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/12/20/cybercriminals-are-using-spider-man-no-way-home-film-to-steal-banking-credentials/</loc>
		<lastmod>2021-12-20T17:10:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/12/20/critical-vulnerability-with-9-10-score-in-vmware-products-allows-hackers-to-take-full-control-of-their-networks/</loc>
		<lastmod>2021-12-20T19:27:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/12/20/new-log4j-attack-allows-hacking-devices-that-are-not-exposed-to-internet-via-localhost/</loc>
		<lastmod>2021-12-20T23:14:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/12/20/new-exploit-for-critical-vulnerabilities-in-active-directory-microsoft-recommends-that-you-patching-asap/</loc>
		<lastmod>2021-12-21T00:21:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/12/21/will-blockchain-actually-change-the-world/</loc>
		<lastmod>2025-09-24T22:40:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/12/21/police-finds-dictionary-with-225-million-passwords-after-taking-control-of-hacker-group-servers/</loc>
		<lastmod>2021-12-21T17:25:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/12/21/new-critical-vulnerabilities-discovered-in-2g-3g-4g-lte-5g-networks/</loc>
		<lastmod>2021-12-21T19:04:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/12/21/two-severe-vulnerabilities-in-sonicwall-sma-100-patch-asap/</loc>
		<lastmod>2021-12-21T23:23:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/12/22/fbi-arrests-the-king-of-stock-market-a-famous-hacker-in-underground-markets/</loc>
		<lastmod>2021-12-22T20:17:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/12/23/microsoft-azure-cloud-exposed-customers-confidential-source-code-since-2017/</loc>
		<lastmod>2021-12-23T17:16:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/12/23/dont-buy-this-fisher-price-phone-for-kids-anyone-can-use-its-bluetooth-to-spy-on-your-family/</loc>
		<lastmod>2021-12-23T20:15:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/12/24/heres-how-hackers-remotely-attack-smartphones-taking-control-of-victims-camera-and-microphone-using-just-11-commands/</loc>
		<lastmod>2021-12-23T22:01:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/12/27/vulnerabilities-in-thousands-of-evlink-electric-vehicle-charging-stations-could-reduce-your-car-to-ashes/</loc>
		<lastmod>2021-12-27T17:20:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/12/27/conti-ransomware-hits-120-vmware-esxi-servers-on-shutterfly-networks/</loc>
		<lastmod>2021-12-27T22:49:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/12/27/data-breach-affects-major-logistics-firm-millions-of-records-leaked/</loc>
		<lastmod>2021-12-27T23:26:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/12/28/severe-remote-code-execution-vulnerability-in-apache-http-server/</loc>
		<lastmod>2021-12-28T17:17:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/12/28/thousands-of-hack-proof-secure-cell-phones-confiscated-from-scotland-prisons/</loc>
		<lastmod>2021-12-28T18:30:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/12/28/new-kind-of-bomb-attacks-to-cash-out-atms-discovered-in-switzerland/</loc>
		<lastmod>2021-12-28T21:46:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/12/28/lastpass-customers-master-passwords-breached-change-your-master-password-before-hackers-do/</loc>
		<lastmod>2021-12-29T00:31:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/12/29/researcher-publishes-code-on-github-to-download-videos-from-netflix-amazon-prime-and-github-at-no-cost/</loc>
		<lastmod>2021-12-29T18:07:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/12/29/hackers-attack-cryptocurrency-exchange-platform-over-1-9-million-users-affected/</loc>
		<lastmod>2021-12-29T23:23:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/12/29/55-vulnerabilities-patched-in-dell-emc-unity-check-your-servers-for-updates/</loc>
		<lastmod>2021-12-30T00:27:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2021/12/30/7-vulnerabilities-patched-in-wireshark-update-immediately/</loc>
		<lastmod>2021-12-30T18:19:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/01/03/hackers-shut-down-the-systems-of-the-uk-military-defense-academy/</loc>
		<lastmod>2022-01-03T18:20:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/01/03/iranian-hackers-attack-two-israeli-online-newspapers/</loc>
		<lastmod>2022-01-03T19:33:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/01/03/how-2-2-million-worth-of-bored-ape-yacht-club-nfts-were-stolen-from-opensea/</loc>
		<lastmod>2022-01-03T21:49:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/01/03/morgan-stanley-to-pay-60-million-usd-fine-for-confidential-data-leaking/</loc>
		<lastmod>2022-01-03T23:40:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/01/04/how-hackers-are-inserting-malware-inside-videos-to-steal-credit-card-numbers-from-users-who-play-these-videos/</loc>
		<lastmod>2022-01-04T17:54:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/01/04/how-chinese-cyber-army-forced-a-glaxosmithkline-employee-to-steal-cancer-drug-research-data-from-the-company/</loc>
		<lastmod>2022-01-04T19:22:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/01/04/remote-code-execution-flaw-in-vmware-workstation-and-fusion-patch-immediately/</loc>
		<lastmod>2022-01-05T00:26:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/01/05/new-technique-allows-classification-of-iot-malware-via-electromagnetic-signals/</loc>
		<lastmod>2022-01-05T17:17:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/01/05/hacking-gmat-exam-780-out-of-800-police-arrests-a-gang-who-worked-with-russian-hackers/</loc>
		<lastmod>2022-01-05T19:34:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/01/05/popcorn-time-the-famous-pirated-content-website-shuts-down/</loc>
		<lastmod>2022-01-06T00:26:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/01/06/how-former-ubers-cyber-security-head-could-face-20-years-in-prison-for-scamming-customers/</loc>
		<lastmod>2022-01-06T17:31:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/01/06/this-voice-authentication-scam-from-google-can-empty-your-bank-accounts-in-minutes/</loc>
		<lastmod>2022-01-06T18:32:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/01/06/facebook-and-google-fined-with-200-million-usd-by-french-government-for-cookies-policy/</loc>
		<lastmod>2022-01-07T00:23:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/01/07/new-critical-vulnerability-similar-to-log4j-discovered-in-java-applications-with-h2-databases/</loc>
		<lastmod>2022-01-07T17:23:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/01/07/unpatched-severe-vulnerability-with-cvvs-score-of-7-7-in-vmwares-cloud-foundation-esxi-fusion-and-workstation-platforms/</loc>
		<lastmod>2022-01-07T19:49:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/01/07/new-way-to-steal-nft-via-discord-used-by-cyber-criminals/</loc>
		<lastmod>2022-01-07T22:07:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/01/08/top-10-the-best-web-browsers-for-cybersecurity-specialists/</loc>
		<lastmod>2022-01-07T22:10:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/01/10/sonicwall-email-security-and-firewall-products-affected-by-y2k22-bug-message-log-updates-and-junk-box-failures/</loc>
		<lastmod>2022-01-10T17:29:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/01/10/hackers-are-mailing-ransomware-infected-usb-devices-to-employees-of-hundreds-of-companies-to-take-control-of-their-networks/</loc>
		<lastmod>2022-01-10T18:52:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/01/10/ransomware-group-hacks-telecom-analytics-firm-subex-and-its-cybersecurity-subsidiary-sectrio/</loc>
		<lastmod>2022-01-10T23:29:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/01/11/new-ransomware-exploits-vulnerabilities-in-log4j-to-encrypt-vmware-servers/</loc>
		<lastmod>2022-01-11T17:21:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/01/11/eight-vulnerabilities-in-16-url-parsing-libraries-written-in-c-javascript-php-python-and-ruby-hackers-could-deploy-dos-and-rce-attacks-against-thousands-of-web-applications/</loc>
		<lastmod>2022-01-11T18:38:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/01/11/how-a-sports-nft-minting-platform-suffered-a-hot-wallet-security-breach-across-several-project-wallets-losing-18-million-usd/</loc>
		<lastmod>2022-01-11T23:22:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/01/11/kcodes-netusb-kernel-rce-vulnerability-impacts-millions-of-routers/</loc>
		<lastmod>2022-01-12T00:22:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/01/12/european-space-agency-wants-cyber-security-experts-to-hack-satellites-and-find-vulnerabilities/</loc>
		<lastmod>2022-01-12T17:21:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/01/12/5-critical-vulnerabilities-in-sonicwall-secure-mobile-access-sma-series-100-devices-update-immediately/</loc>
		<lastmod>2022-01-12T18:36:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/01/12/new-sysjoker-backdoor-attacks-windows-linux-and-macos-devices/</loc>
		<lastmod>2022-01-12T23:36:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/01/12/vulnerability-in-apple-devices-that-made-them-unusable-finally-fixed-update-immediately-ios/</loc>
		<lastmod>2022-01-13T00:27:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/01/13/kim-kardashian-and-floyd-mayweather-jr-sued-over-big-ethereummax-cryptocurrency-scam/</loc>
		<lastmod>2022-01-13T17:22:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/01/13/how-scammers-are-stealing-your-money-via-parking-meters-by-using-fake-qr-payment-codes/</loc>
		<lastmod>2022-01-13T19:43:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/01/13/ransomware-gangs-can-be-traced-big-gang-arrested-in-ukraine/</loc>
		<lastmod>2022-01-13T23:43:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/01/14/billionaire-most-dangerous-hacker-group-finally-arrested/</loc>
		<lastmod>2022-01-14T21:40:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/01/17/dark-web-sales-platforms-monopoly-market-and-cartel-market-shut-down-mysteriously/</loc>
		<lastmod>2022-01-17T18:22:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/01/17/bluenoroff-apt-that-hacked-bangladesh-bank-is-now-only-focusing-on-hacking-cryptocurrency-businesses-and-exchanges/</loc>
		<lastmod>2022-01-18T00:08:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/01/18/dont-install-this-microsoft-edge-update-it-contains-a-ransomware-variant-that-will-encrypt-your-network/</loc>
		<lastmod>2022-01-18T17:19:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/01/18/the-art-of-stealing-nft-how-hackers-stole-22-million-worth-of-nft-in-minutes/</loc>
		<lastmod>2022-01-18T18:45:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/01/18/critical-remote-code-execution-vulnerabilities-in-tp-link-archer-c90-and-tl-wa1201-routers/</loc>
		<lastmod>2022-01-18T23:26:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/01/18/everyone-who-travels-to-the-beijing-winter-olympics-must-download-my-2022-chinese-government-application-on-their-mobile/</loc>
		<lastmod>2022-01-19T00:20:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/01/19/7-reasons-why-you-should-hide-your-real-ip/</loc>
		<lastmod>2023-08-15T17:20:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/01/19/google-project-zero-researcher-finds-two-critical-vulnerabilities-in-zoom/</loc>
		<lastmod>2022-01-19T17:29:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/01/19/new-100kb-white-rabbit-ransomware-will-encrypt-files-and-send-them-to-gdpr-authorities-if-you-dont-pay-the-ransom/</loc>
		<lastmod>2022-01-19T18:48:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/01/19/critical-buffer-overflow-vulnerability-in-mysql-workbench/</loc>
		<lastmod>2022-01-21T16:20:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/01/19/red-cross-becomes-victim-of-a-cyberattack-in-which-hackers-seized-the-data-of-more-than-515000-people/</loc>
		<lastmod>2022-01-20T00:25:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/01/20/google-analytics-banned-in-eu-due-to-privacy-concerns-of-leaking-people-data-to-spy-agencies/</loc>
		<lastmod>2022-01-20T17:17:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/01/20/critical-vulnerability-in-cisco-rcm-for-cisco-staros-software-allows-remote-attacker-to-perform-remote-code-execution-on-the-application-with-root-level-privileges/</loc>
		<lastmod>2022-01-20T19:33:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/01/20/25-vulnerabilities-in-f5-firewall-and-other-products-patch-immediately/</loc>
		<lastmod>2022-01-20T23:29:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/01/21/new-made-in-china-moonbounce-uefi-malware-cant-be-removed-even-if-you-replace-your-hard-disk/</loc>
		<lastmod>2022-01-21T18:08:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/01/22/how-to-hack-whatsapp-easily-with-a-very-effective-termux-whatsapp-phishing-website/</loc>
		<lastmod>2022-01-21T23:19:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/01/24/2-critical-vulnerabilities-discovered-in-cisco-prime-servers/</loc>
		<lastmod>2022-01-24T17:05:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/01/24/critical-vulnerability-in-opensea-nft-platform-allowed-hackers-to-steal-millions-of-dollars/</loc>
		<lastmod>2022-01-24T18:10:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/01/24/microsoft-to-turn-off-macros-en-excel-4-0-by-default-to-protect-users-from-ransomware-attacks/</loc>
		<lastmod>2022-01-24T23:11:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/01/24/cyber-attacks-on-telecom-company-shutdowns-internet-of-whole-country-of-andorra/</loc>
		<lastmod>2022-01-24T23:52:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/01/25/this-android-malware-deletes-all-phone-data-after-stealing-your-money-or-information/</loc>
		<lastmod>2022-01-25T17:28:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/01/25/these-hexadecimal-and-octal-ip-addresses-can-bypass-your-security-solution-block-them-to-avoid-getting-hacked-by-emotet-malware/</loc>
		<lastmod>2022-01-25T19:07:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/01/25/threat-actors-are-actively-exploiting-a-critical-vulnerability-cve-2021-20038-in-sonicwall-secure-mobile-access-sma-gateways-update-immediately/</loc>
		<lastmod>2022-01-25T23:37:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/01/25/privilege-escalation-flaw-in-cisco-unified-contact-center-management-portal/</loc>
		<lastmod>2022-01-26T00:14:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/01/26/new-vulnerability-on-mac-provides-full-access-to-icloud-accounts-paypal-and-more-of-the-affected-users-as-well-as-granting-access-to-their-microphone-camera-and-screen-the-greatest-reward-ever-del/</loc>
		<lastmod>2022-01-26T17:21:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/01/26/new-linux-lpe-vulnerability-affects-millions-of-ubuntu-debian-centos-and-fedora-servers-worldwide-exploit-code-published/</loc>
		<lastmod>2022-01-26T18:07:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/01/27/code-from-the-botenago-botnet-is-posted-on-github-millions-of-companies-at-risk-of-ddos-attack/</loc>
		<lastmod>2022-01-27T17:38:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/01/27/new-rat-malware-evades-detection-using-javascript-code-embedded-in-html-receipt-files-instead-of-downloading-an-iso-file-from-remote-servers/</loc>
		<lastmod>2022-01-27T22:36:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/01/27/remote-code-execution-vulnerability-in-ghidra-nsas-reverse-engineering-tool/</loc>
		<lastmod>2022-01-28T00:23:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/01/28/novel-phishing-technique-uses-hacker-operated-devices-connected-to-an-organizations-network-via-lateral-phishing/</loc>
		<lastmod>2022-01-28T17:41:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/01/28/iranian-state-tv-was-hacked-to-show-a-broadcast-calling-for-khameneis-death/</loc>
		<lastmod>2022-01-28T21:57:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/01/31/critical-zero-day-vulnerability-in-windows-10-that-allows-local-privilege-escalation-to-admin-exploit-code-published/</loc>
		<lastmod>2022-01-31T17:08:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/01/31/crypto-company-qubit-finance-got-hacked-the-firm-is-begging-hackers-for-returning-the-stolen-78-million-usd-in-cryptocurrency/</loc>
		<lastmod>2022-01-31T18:27:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/02/01/using-google-fonts-in-a-website-violates-gdpr-new-court-decision-affects-50-million-websites/</loc>
		<lastmod>2022-02-01T17:12:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/02/01/hackers-are-exploiting-universal-plug-and-play-upnp-to-turn-routers-into-a-proxy-server-used-to-carry-out-cyber-attacks/</loc>
		<lastmod>2022-02-01T18:13:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/02/01/big-israeli-postal-company-mail-boxes-hacked-to-display-down-with-israel-messages-on-mail-box-monitors/</loc>
		<lastmod>2022-02-01T23:00:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/02/01/3-important-vulnerabilities-in-samba-patch-immediately/</loc>
		<lastmod>2022-02-01T23:54:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/02/02/how-scammers-are-using-job-offers-to-steal-your-identity/</loc>
		<lastmod>2022-02-02T18:30:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/02/02/new-technique-to-map-dark-web-vendors-personalities-and-identities-in-different-illegal-marketplaces/</loc>
		<lastmod>2022-02-02T19:27:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/02/02/4-critical-vulnerabilities-in-fortinet-fortiweb-product/</loc>
		<lastmod>2022-02-02T23:58:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/02/03/this-cyber-security-researcher-took-matter-in-his-own-hands-and-shut-down-north-koreas-internet-for-taking-a-revenge/</loc>
		<lastmod>2022-02-03T17:29:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/02/03/expert-shows-how-easy-it-is-to-hack-apple-pay-and-samsung-tap-they-can-empty-bank-accounts/</loc>
		<lastmod>2022-02-03T18:41:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/02/03/china-launches-more-cyber-attacks-than-any-other-country-new-fbi-report/</loc>
		<lastmod>2022-02-03T23:31:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/02/03/silent-airtags-with-no-speakers-are-being-used-for-stalking/</loc>
		<lastmod>2022-02-04T00:27:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/02/04/fox-news-wall-street-journal-and-new-york-post-employees-hacked-by-chinese-apt-group/</loc>
		<lastmod>2022-02-04T17:44:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/02/07/top-6-free-steganography-tools-for-cyber-security-professionals/</loc>
		<lastmod>2022-02-04T23:34:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/02/08/geofence-warrant-allows-police-to-obtain-location-data-from-google-users-near-crime-scenes-and-arrest-them/</loc>
		<lastmod>2022-02-08T17:13:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/02/08/easy-fix-sql-server/</loc>
		<lastmod>2023-08-15T17:20:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/02/08/microsoft-makes-things-harder-for-cyber-criminals-by-disabling-macros-by-default-in-office-products/</loc>
		<lastmod>2022-02-08T19:13:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/02/08/vodafone-portugal-telecom-services-disrupted-by-a-cyber-attack/</loc>
		<lastmod>2022-02-08T21:43:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/02/09/sap-releases-security-patches-for-19-important-vulnerabilities/</loc>
		<lastmod>2022-02-09T17:20:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/02/09/critical-remote-code-execution-vulnerability-in-android-12-affects-millions-of-smartphones/</loc>
		<lastmod>2022-02-09T20:22:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/02/10/what-is-rest-api/</loc>
		<lastmod>2023-08-15T17:21:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/02/10/why-is-the-zoom-app-on-apple-devices-listening-to-your-microphone-when-not-in-a-meeting/</loc>
		<lastmod>2022-02-10T18:17:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/02/10/critical-denial-of-service-dos-vulnerabilities-affecting-siemens-industrial-plc-devices-used-in-thousands-of-industrial-plants/</loc>
		<lastmod>2022-02-10T19:18:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/02/10/ransomware-victims-have-paid-over-1-3-billion-usd-ransoms-since-2020-despite-fbi-recommendations-of-not-paying-to-hackers/</loc>
		<lastmod>2022-02-10T22:07:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/02/10/clients-using-magento-1-e-commerce-platform-are-getting-hacked/</loc>
		<lastmod>2022-02-11T00:17:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/02/11/critical-vulnerabilities-in-mxview-network-management-software-moxa-users-should-update-as-soon-as-possible/</loc>
		<lastmod>2022-02-11T18:25:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/02/11/hacker-sentenced-to-3-years-in-prison-for-developing-pirated-software-for-nintendo-switch/</loc>
		<lastmod>2022-02-11T19:12:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/02/11/15-new-vulnerabilities-added-to-the-cisa-catalog-administrators-must-update-immediately/</loc>
		<lastmod>2022-02-11T23:22:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/02/14/digital-defense-how-corporations-protect-their-information/</loc>
		<lastmod>2022-10-26T14:48:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/02/14/three-young-russians-are-sent-to-prison-for-planning-a-terrorist-act-in-minecraft/</loc>
		<lastmod>2022-02-14T17:26:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/02/14/nfl-team-confirms-ransomware-attack-hours-before-the-super-bowl/</loc>
		<lastmod>2022-02-14T19:00:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/02/15/5-vulnerabilities-patched-in-vmware-cloud-foundation-esxi-update-immediately/</loc>
		<lastmod>2022-02-15T18:21:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/02/15/apt-group-ta2541-has-been-targeting-thousands-of-organizations-across-aviation-aerospace-transportation-manufacturing-and-defense-industries-worldwide/</loc>
		<lastmod>2022-02-15T19:39:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/02/15/squirrelwaffle-malware-takes-control-of-vulnerable-microsoft-exchange-servers-to-spread-banking-scam/</loc>
		<lastmod>2022-02-16T00:06:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/02/15/chinese-researchers-find-multiple-vulnerabilities-in-vmware-esxi-workstation-and-fusion-update-asap/</loc>
		<lastmod>2022-02-16T00:18:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/02/16/critical-threats-to-saas-applications-and-how-to-solve-them/</loc>
		<lastmod>2023-08-15T17:21:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/02/16/choosing-between-an-outsourced-soc-and-in-house-soc-what-makes-a-difference/</loc>
		<lastmod>2023-08-15T17:21:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/02/16/zero-day-vulnerabilities-in-all-chrome-browser-versions-affect-millions-of-users/</loc>
		<lastmod>2022-02-16T18:25:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/02/16/this-mexican-businessman-was-charged-for-selling-phone-interception-tools-and-spyware-to-companies-and-government-agencies-in-latin-america/</loc>
		<lastmod>2022-02-16T19:19:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/02/16/cve-2021-44521-critical-code-execution-vulnerability-in-apache-cassandra-cvss-score-of-8-4/</loc>
		<lastmod>2022-02-16T21:33:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/02/16/csrf-vulnerability-in-grafana-open-source-tool-allows-hackers-to-elevate-their-privileges-through-cross-origin-attacks-against-administrators/</loc>
		<lastmod>2022-02-17T00:26:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/02/17/how-scammers-are-using-deep-fake-to-impersonate-ceo-and-directors-during-zoom-calls-to-empty-company-bank-accounts/</loc>
		<lastmod>2022-02-17T17:40:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/02/17/hacker-took-control-of-us-school-district-systems-and-mailed-every-student-cancelling-all-classes/</loc>
		<lastmod>2022-02-17T21:45:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/02/17/new-legislation-could-punish-ransomware-attacks-with-up-to-25-years-in-prison/</loc>
		<lastmod>2022-02-18T00:25:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/02/18/6-critical-vulnerabilities-in-western-digital-my-cloud-os-5/</loc>
		<lastmod>2022-02-18T18:26:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/02/18/secure-your-wordpress-backups-critical-vulnerability-in-updraftplus-plugin-affects-millions-of-websites/</loc>
		<lastmod>2022-02-18T19:40:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/02/21/hackers-easily-stole-millions-of-dollars-from-nft-platform-opensea/</loc>
		<lastmod>2022-02-21T17:34:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/02/21/two-critical-vulnerabilities-in-samsung-galaxy-s21-smartphones/</loc>
		<lastmod>2022-02-21T22:36:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/02/21/errors-in-the-encryption-process-allow-victims-of-hive-ransomware-to-recover-their-information-without-paying-a-single-dollar-to-hackers/</loc>
		<lastmod>2022-02-21T23:52:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/02/22/how-to-hack-coinbase-to-steal-cryptocurrency-researcher-details-an-easy-way-to-do-it/</loc>
		<lastmod>2022-02-22T17:35:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/02/22/where-to-get-pictures-for-presentations-securely/</loc>
		<lastmod>2023-08-15T17:21:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/02/22/big-logistics-and-freight-forwarding-company-with-350-locations-and-18000-employees-worldwide-shutdowns-operation-after-ransomware-attack/</loc>
		<lastmod>2022-02-23T00:14:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/02/22/researcher-publishes-way-to-bypass-apple-airtag-anti-spying-protection/</loc>
		<lastmod>2022-02-23T00:38:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/02/23/bts-member-sugas-verified-spotify-profile-was-hacked-to-upload-a-traditional-indian-song/</loc>
		<lastmod>2022-02-23T20:00:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/02/23/31-critical-vulnerabilities-in-vim-update-immediately/</loc>
		<lastmod>2022-02-23T22:21:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/02/23/five-individuals-arrested-for-the-hacking-and-millionaire-theft-from-a-cryptocurrency-exchange-platform/</loc>
		<lastmod>2022-02-24T00:25:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/02/24/advance-nsa-backdoor-detected-in-245-organizations-in-45-countries-including-china-india-and-mexico/</loc>
		<lastmod>2022-02-24T17:51:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/02/24/a-crypto-exchange-employee-downloaded-a-pirated-movie-resulting-in-its-hack-e7-million-loses/</loc>
		<lastmod>2022-02-24T22:25:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/02/25/dont-use-any-samsung-smartphone-launched-from-2017-till-2021-including-s21-flawed-encryption-could-expose-your-confidential-data/</loc>
		<lastmod>2022-02-24T21:40:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/02/25/2-vulnerabilities-in-zyxel-armor-home-routers-patch-immediately/</loc>
		<lastmod>2022-02-24T23:37:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/02/28/airguard-free-android-app-allows-users-to-detect-if-they-are-being-spied-on-using-an-apple-airtag/</loc>
		<lastmod>2022-02-28T18:07:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/02/28/bridgestone-the-worlds-largest-tire-manufacturer-suffers-a-major-cyberattack-on-its-plants-in-north-america-and-latin-america/</loc>
		<lastmod>2022-02-28T19:54:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/02/28/big-cctv-camera-manufacturer-axis-suffers-massive-cyberattack-that-resulted-in-the-temporary-shutdown-of-its-systems/</loc>
		<lastmod>2022-02-28T23:42:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/02/28/toyota-shuts-down-all-operations-in-japan-at-risk-of-massive-cyberattack/</loc>
		<lastmod>2022-03-01T00:23:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/03/01/hackers-take-control-of-electric-car-charging-stations-across-russia-in-support-of-ukraine/</loc>
		<lastmod>2022-03-01T17:14:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/03/01/how-to-use-multiple-vpn-connections-on-a-single-router/</loc>
		<lastmod>2023-08-15T17:22:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/03/01/hacking-group-offers-russian-soldiers-5-million-rubles-for-each-surrendered-tank/</loc>
		<lastmod>2022-03-01T19:24:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/03/01/hackers-take-over-putins-yatch-systems-for-supporting-ukraine/</loc>
		<lastmod>2022-03-01T23:28:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/03/01/cybercriminals-are-amplifying-dos-attacks-times-65-by-exploiting-firewalls-nat-and-other-middleboxes/</loc>
		<lastmod>2022-03-02T00:30:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/03/02/5-critical-vulnerabilities-in-the-open-source-api-pjsip-affect-millions-of-whatsapp-users-update-immediately/</loc>
		<lastmod>2022-03-02T17:17:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/03/02/download-the-conti-ransomware-source-code-ukrainian-researcher-hacked-russian-cybercriminal-group/</loc>
		<lastmod>2022-03-02T18:27:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/03/02/critical-password-reset-vulnerability-in-fortinet-fortiportal-update-immediately/</loc>
		<lastmod>2022-03-02T22:58:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/03/03/vulnerability-in-next-generation-homomorphic-encryption-allows-data-to-be-stolen-even-while-encrypted/</loc>
		<lastmod>2022-03-03T17:16:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/03/03/major-russian-cyberattack-globally-halted-by-intelligence-agencies-in-the-netherlands/</loc>
		<lastmod>2022-03-03T18:53:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/03/04/anyone-can-bypass-the-google-and-aws-web-application-firewall-waf-with-an-8-kb-post-request/</loc>
		<lastmod>2022-03-04T17:26:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/03/04/critical-code-injection-vulnerabilities-in-vmware-spring-cloud-gateway/</loc>
		<lastmod>2022-03-04T22:18:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/03/04/how-fidelity-bank-employees-stole-millions-from-customer-accounts/</loc>
		<lastmod>2022-03-04T22:56:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/03/05/how-to-use-deepfake-to-cheat-facial-liveness-verification-authentication-biometrics-systems/</loc>
		<lastmod>2022-03-04T22:56:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/03/07/massive-cyberattack-on-european-satellites-shuts-down-internet-across-europe/</loc>
		<lastmod>2022-03-07T17:19:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/03/07/hackers-can-exploit-amazon-echo-devices-to-set-fire-to-a-house-or-lead-affected-users-into-bankruptcy/</loc>
		<lastmod>2022-03-07T19:43:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/03/07/severe-vulnerability-in-linux-kernel-allows-hackers-to-escape-from-a-container-to-execute-arbitrary-commands-on-the-affected-host-cvss-7-0-10/</loc>
		<lastmod>2022-03-07T23:22:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/03/08/mercadolibre-the-biggest-e-commerce-company-in-latin-america-was-hacked-attackers-leak-source-code-and-customer-data/</loc>
		<lastmod>2022-03-08T17:23:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/03/08/ragnarlocker-ransomware-encrypts-the-information-of-52-critical-infrastructure-agencies-in-the-us/</loc>
		<lastmod>2022-03-08T21:41:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/03/08/3-xss-vulnerabilities-in-ibm-security-qradar-soar-update-immediately/</loc>
		<lastmod>2022-03-08T22:47:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/03/08/important-vulnerability-in-cyberark-identity-security-solution/</loc>
		<lastmod>2022-03-09T00:01:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/03/09/3-critical-vulnerabilities-in-apc-ups-could-be-exploited-to-shot-down-thousands-of-data-centers/</loc>
		<lastmod>2022-03-09T17:45:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/03/09/most-watched-videos-on-vevo-in-2021/</loc>
		<lastmod>2023-08-15T17:22:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/03/09/millions-of-hp-laptops-points-of-sale-machines-and-servers-affected-by-16-critical-vulnerabilities/</loc>
		<lastmod>2022-03-09T19:39:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/03/09/1-out-of-3-wordpress-plugins-does-not-receive-security-updates-millions-of-websites-at-risk/</loc>
		<lastmod>2022-03-10T00:26:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/03/10/vodafone-hacked-by-lapsus-cybercrime-group-investigation-going-on/</loc>
		<lastmod>2022-03-10T18:18:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/03/11/a-member-of-one-of-the-most-dangerous-hacking-groups-has-been-arrested/</loc>
		<lastmod>2022-03-11T17:10:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/03/11/check-the-integrity-of-the-browser-extension-using-this-whatsapp-tool-before-running-whatsapp-web/</loc>
		<lastmod>2022-03-11T18:24:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/03/13/how-to-collect-only-valid-evidence-during-forensic-investigation-and-incident-response-processes-instead-of-creating-images-of-system-memory/</loc>
		<lastmod>2022-03-11T21:54:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/03/14/hackers-trick-valorant-users-into-installing-redline-malware-on-thousands-of-windows-systems/</loc>
		<lastmod>2022-03-14T17:32:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/03/14/security-incident-forces-ubisoft-to-shut-down-some-of-its-systems-and-servers/</loc>
		<lastmod>2022-03-14T20:01:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/03/15/tech-investments-to-help-boost-website-protection/</loc>
		<lastmod>2023-08-15T17:22:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/03/15/data-breach-affects-hundreds-of-thousands-of-patients-in-a-cardiology-clinic/</loc>
		<lastmod>2022-03-15T19:10:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/03/15/information-disclosure-vulnerability-in-phpmyadmin-update-immediately/</loc>
		<lastmod>2022-03-15T21:57:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/03/15/input-validation-access-control-bypass-and-xss-vulnerabilities-in-the-pfsense-firewall-update-immediately/</loc>
		<lastmod>2022-03-16T00:11:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/03/16/critical-vulnerability-in-openssl-library-would-allow-dos-attacks-on-millions-of-applications/</loc>
		<lastmod>2022-03-16T19:23:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/03/16/never-seen-before-instagram-phishing-scam-that-can-defraud-any-user/</loc>
		<lastmod>2022-03-16T22:52:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/03/17/how-russian-created-a-deepfake-video-of-ukrainian-president-volodymyr-zelenskyy-telling-its-citizens-to-lay-down-arms/</loc>
		<lastmod>2022-03-17T22:43:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/03/17/new-method-to-install-malware-variants-on-iphone-devices/</loc>
		<lastmod>2022-03-18T00:16:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/03/18/dragon-ball-super-super-hero-wont-be-released-in-theaters-after-toei-animation-hack/</loc>
		<lastmod>2022-03-18T23:17:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/03/21/5-advantages-of-using-sso-for-business-security/</loc>
		<lastmod>2023-08-15T17:23:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/03/21/best-web-application-firewall-testing-tools-find-out-what-security-solutions-a-target-website-is-using-waf-hacking/</loc>
		<lastmod>2022-03-21T14:47:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/03/22/critical-vulnerabilities-in-dell-laptops-uefi-allow-them-to-be-hacked-forever-even-when-removing-the-hard-drive/</loc>
		<lastmod>2022-03-22T17:17:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/03/22/do-not-use-google-dialer-and-messages-these-apps-send-your-call-logs-contacts-and-call-timing-data-to-google/</loc>
		<lastmod>2022-03-22T18:40:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/03/22/founder-of-defiance-crypto-exchange-hacked-16-million-usd-stolen-via-mobile-wallet-no-one-is-safe/</loc>
		<lastmod>2022-03-22T23:01:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/03/23/critical-memory-leak-and-authorization-vulnerability-in-bareos-a-backup-and-archiving-solution/</loc>
		<lastmod>2022-03-22T23:46:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/03/24/4-key-points-towards-sensible-security-posture-optimization/</loc>
		<lastmod>2023-05-31T15:11:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/03/24/privilege-escalation-and-path-traversal-vulnerabilities-affect-argo-cd-the-gitops-continuous-delivery-tool-for-kubernetes/</loc>
		<lastmod>2022-03-24T17:37:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/03/24/hard-coded-credentials-vulnerabilities-in-10-models-of-lenovo-networking-switches/</loc>
		<lastmod>2022-03-24T21:31:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/03/25/two-vulnerabilities-in-epic-games-launcher-allow-dos-attacks/</loc>
		<lastmod>2022-03-25T17:06:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/03/25/how-anyone-can-easily-steal-honda-keyless-cars-poc-published/</loc>
		<lastmod>2022-03-25T23:11:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/03/25/how-members-of-lapsus-hacking-group-that-attacked-samsung-and-microsoft-were-arrested/</loc>
		<lastmod>2022-03-26T00:13:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/03/28/personal-data-of-former-and-current-students-in-new-york-public-schools-is-leaked-after-the-hacking-of-a-widely-used-online-grading-and-attendance-system/</loc>
		<lastmod>2022-03-28T17:11:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/03/28/3-critical-vulnerabilities-in-sophos-firewall-and-other-company-products/</loc>
		<lastmod>2022-03-28T18:21:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/03/28/central-bank-of-russia-was-hacked-confidential-data-leaked/</loc>
		<lastmod>2022-03-28T23:40:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/03/28/ukrainian-police-shut-down-bot-farms-dedicated-to-spreading-pro-russian-fake-news/</loc>
		<lastmod>2022-03-29T00:33:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/03/29/node-ipc-javascript-library-was-modified-to-include-file-deletion-malware-depending-on-the-users-ip-addresses/</loc>
		<lastmod>2022-03-29T18:21:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/03/29/how-this-apt-group-is-hacking-indian-government-officials-to-spy-on-their-activities/</loc>
		<lastmod>2022-03-29T22:25:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/03/29/two-big-russian-companies-in-the-oil-industry-were-hacked/</loc>
		<lastmod>2022-03-29T23:12:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/03/29/someone-stole-625-million-usd-hacking-the-axie-infinity-blockchain-they-noticed-it-a-week-later/</loc>
		<lastmod>2022-03-30T00:21:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/03/30/vulnerability-in-combined-charging-systems-ccs-would-allow-hackers-to-shut-down-an-electric-vehicle-from-10-meters-away/</loc>
		<lastmod>2022-03-30T18:09:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/03/30/4-critical-vulnerabilities-in-omron-cx-position-enable-malicious-code-execution/</loc>
		<lastmod>2022-03-30T19:03:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/03/30/exploitation-code-for-the-zero-day-vulnerability-in-spring-framework-for-java-applications-is-published-new-log4shell-flaw/</loc>
		<lastmod>2022-03-31T00:24:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/03/31/how-to-temporarily-fix-springshell-zero-day-vulnerability-in-spring-core/</loc>
		<lastmod>2022-03-31T17:32:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/03/31/cve-2022-0757-rapid7-nexpose-sql-injection-vulnerability-also-known-as-security-console-patch-immediately/</loc>
		<lastmod>2022-03-31T19:50:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/03/31/vulnerability-in-philips-e-alert-would-allow-unauthorized-actors-to-turn-off-mri-monitoring-system/</loc>
		<lastmod>2022-03-31T23:51:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/04/01/payment-card-industry-releases-new-pci-dss-v4-0-security-standard/</loc>
		<lastmod>2022-04-01T19:12:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/04/01/2-critical-vulnerabilities-in-rockwell-plc-used-worldwide-could-shutdown-industries-for-days-if-exploited/</loc>
		<lastmod>2022-04-01T21:37:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/04/04/what-is-the-true-meaning-of-sase/</loc>
		<lastmod>2022-10-26T14:52:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/04/04/two-critical-code-vulnerabilities-in-a-core-component-of-the-php-supply-chain-repository/</loc>
		<lastmod>2022-04-04T17:38:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/04/04/this-new-malware-has-a-keylogger-ransomware-and-can-perform-ddos-attacks/</loc>
		<lastmod>2022-04-04T21:14:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/04/04/email-marketing-company-mailchimp-was-hacked-customer-accounts-control-taken-over-by-attackers/</loc>
		<lastmod>2022-04-04T22:49:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/04/04/important-memory-leak-vulnerabilities-in-f5-firewalls-patch-immediately/</loc>
		<lastmod>2022-04-04T23:25:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/04/05/300-offenders-were-released-from-prison-after-a-computer-error-prevented-them-from-getting-an-initial-court-hearing/</loc>
		<lastmod>2022-04-05T16:30:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/04/05/how-fbi-tracked-one-the-most-famous-and-richest-dark-web-vender-and-seized-34-million-usd/</loc>
		<lastmod>2022-04-05T21:10:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/04/05/should-financial-firms-brace-for-more-cyber-threats-after-a-turbulent-2021/</loc>
		<lastmod>2022-04-18T21:30:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/04/05/cashapp-is-hacked-by-an-employee-stolen-sensitive-data/</loc>
		<lastmod>2022-04-05T22:26:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/04/05/do-not-open-this-whatsapp-message-offering-free-cadbury-chocolates-hackers-can-empty-your-bank-accounts/</loc>
		<lastmod>2022-04-05T23:24:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/04/06/youtube-accounts-of-20-famous-artists-like-drake-and-eminem-were-hacked-vevo-managed-accounts-hacked-again/</loc>
		<lastmod>2022-04-06T16:47:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/04/06/two-unpatched-zero-day-vulnerabilities-in-apple-macos-big-sur-and-macos-catalina/</loc>
		<lastmod>2022-04-06T21:24:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/04/06/zero-day-privilege-escalation-vulnerability-in-samsung-galaxy-s21-smartphones-no-patch-available/</loc>
		<lastmod>2022-04-06T22:44:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/04/07/watchguard-firewalls-and-asus-routers-in-the-u-s-are-being-attacked-by-the-russian-government-how-to-fix-it/</loc>
		<lastmod>2022-04-07T17:30:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/04/07/how-chinese-hackers-tried-to-shutdown-indian-electrical-grids/</loc>
		<lastmod>2022-04-07T21:06:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/04/11/5-members-of-yura-a-murder-for-hire-operation-on-the-dark-web-are-arrested-platforms-such-as-besa-mafia-cosa-nostra-and-crimebay-shut-down/</loc>
		<lastmod>2022-04-11T17:09:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/04/11/finland-government-defense-sector-website-shutdown-after-big-ddos-attacks/</loc>
		<lastmod>2022-04-11T21:41:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/04/11/cyber-security-companies-will-have-to-apply-for-a-yearly-license-to-operate-in-singapore/</loc>
		<lastmod>2022-04-11T22:40:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/04/11/critical-buffer-overflow-vulnerability-in-vim-text-editor-update-your-servers/</loc>
		<lastmod>2022-04-11T23:21:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/04/12/critical-vulnerabilities-allow-hacking-medical-surgical-robots-and-putting-lives-at-risk/</loc>
		<lastmod>2022-04-12T16:18:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/04/12/raidforums-the-worlds-biggest-hacking-forum-is-seized-by-europol-21-year-old-administrator-arrested/</loc>
		<lastmod>2022-04-12T20:42:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/04/12/easy-way-to-hack-samsung-galaxy-phones-with-android-9-10-11-or-12-via-preinstalled-application/</loc>
		<lastmod>2022-04-12T23:03:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/04/13/github-releases-updated-versions-of-its-local-client-after-fixing-2-critical-code-execution-vulnerabilities/</loc>
		<lastmod>2022-04-13T16:23:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/04/13/how-hackers-can-exploit-spotify-algorithm-to-position-an-artist-or-song-in-the-platforms-top-50-global-playlist/</loc>
		<lastmod>2022-04-13T19:24:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/04/15/why-row-level-security-isnt-enough-to-protect-your-cloud-data-warehouse/</loc>
		<lastmod>2022-10-26T14:52:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/04/15/how-to-easily-create-deepfake-videos-of-your-family/</loc>
		<lastmod>2022-04-13T23:02:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/04/18/github-was-hacked-source-code-is-filtered-from-different-repositories/</loc>
		<lastmod>2022-04-18T16:35:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/04/18/30-vulnerabilities-in-different-juniper-products-could-allow-the-total-takeover-of-the-affected-network-update-immediately/</loc>
		<lastmod>2022-04-18T20:56:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/04/19/how-someone-can-easily-steal-nft-using-your-icloud-backup/</loc>
		<lastmod>2022-04-19T16:34:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/04/19/its-now-legal-to-scrap-linkedin-users-data-for-marketing-purposes-without-their-permission/</loc>
		<lastmod>2022-04-19T21:21:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/04/20/new-oracle-update-fixes-520-vulnerabilities-in-12-products-three-critical-flaws-with-cvss-scores-of-10-and-70-flaws-with-9-8-10-score/</loc>
		<lastmod>2022-04-20T16:23:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/04/20/aws-patches-to-fix-log4j-vulnerabilities-could-be-exploited-for-privilege-escalation-or-container-escape-attacks/</loc>
		<lastmod>2022-04-20T19:07:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/04/21/critical-vulnerability-in-java-allows-forgery-of-certificates-signatures-webauthn-messages-and-evade-authentication-mechanisms-update-immediately/</loc>
		<lastmod>2022-04-21T16:15:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/04/21/two-out-of-three-android-smartphones-sold-in-2021-could-easily-be-hacked-through-an-audio-file-to-exploit-vulnerabilities-in-qualcomm-and-mediatek-chipsets/</loc>
		<lastmod>2022-04-21T21:03:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/04/22/critical-remote-code-execution-vulnerability-in-atlassian-bitbucket-data-center-update-immediately/</loc>
		<lastmod>2022-04-22T16:27:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/04/22/pwn2own-miami-paid-400000-usd-for-26-zero-day-exploits-on-ics-and-scada-products/</loc>
		<lastmod>2022-04-22T20:33:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/04/25/zoom-is-set-to-pay-85-million-usd-as-part-of-a-class-action-settlement-users-traumatized-by-hackers-and-pranksters-irrupting-in-their-meetings/</loc>
		<lastmod>2022-04-25T17:30:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/04/25/how-to-do-local-privilege-escalation-attacks-on-windows-to-brute-force-the-local-administrator-account/</loc>
		<lastmod>2022-04-25T22:30:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/04/26/2-critical-vulnerabilities-exploitable-remotely-in-trailer-brake-controllers-can-cause-accidents-on-highways/</loc>
		<lastmod>2022-04-26T18:41:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/04/26/bored-ape-yacht-club-nfts-heist-how-come-this-keeps-happening-over-and-over-again/</loc>
		<lastmod>2022-04-26T22:06:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/04/26/a-basic-guide-to-building-reliable-and-ethical-ai/</loc>
		<lastmod>2022-10-26T14:53:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/04/27/2-critical-vulnerabilities-in-the-linux-operating-system-allow-backdoors-to-be-installed-with-root-privileges/</loc>
		<lastmod>2022-04-27T17:01:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/04/27/4-new-vulnerabilities-in-sonicwall-sonicos-affect-firewalls-and-other-security-products-patch-immediately/</loc>
		<lastmod>2022-04-27T18:39:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/04/28/charging-stations-for-electric-cars-in-the-uk-are-hacked-to-show-pornography/</loc>
		<lastmod>2022-04-28T16:25:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/04/28/now-you-can-ask-google-to-remove-your-phone-number-email-address-physical-address-and-other-personal-contact-data-from-search-results-learn-how-to-do-it/</loc>
		<lastmod>2022-04-28T19:25:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/04/28/critical-zero-day-security-vulnerabilities-in-qnap-devices-allows-remote-hacking/</loc>
		<lastmod>2022-04-28T22:42:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/04/29/zero-day-vulnerabilities-in-netatalk-affect-nas-products-from-synology-qnap-and-western-digital-protect-your-storage-solutions-before-theyre-encrypted-with-ransomware/</loc>
		<lastmod>2022-04-29T16:19:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/04/29/cve-2022-0543-vulnerability-in-redis-with-10-10-cvss-score-thousands-of-linux-servers-affected/</loc>
		<lastmod>2022-04-29T19:30:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/04/29/cert-in-makes-mandatory-for-indian-companies-to-report-hacking-cyber-security-incidents-to-government-within-six-hours-after-detecting-them/</loc>
		<lastmod>2022-04-29T20:55:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/05/02/and-again-about-iot-security-best-practices/</loc>
		<lastmod>2024-04-09T14:23:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/05/02/why-should-you-use-a-secure-vpn-connection/</loc>
		<lastmod>2023-02-01T05:43:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/05/02/how-a-techie-guy-scammed-the-us-department-of-defense-and-stole-23-million-using-a-simple-phishing-email/</loc>
		<lastmod>2022-05-02T16:18:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/05/02/you-can-earn-1-5-million-dollar-by-finding-vulnerabilities-in-android-13-beta/</loc>
		<lastmod>2022-05-02T21:29:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/05/02/how-do-open-apis-secure-the-dojs-digital-infrastructure/</loc>
		<lastmod>2022-10-26T14:54:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/05/03/how-narcotics-and-economic-crime-investigations-neci-task-force-arrested-multiple-dark-web-drug-vendors/</loc>
		<lastmod>2022-05-03T16:48:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/05/03/thousands-of-airports-hospitals-and-hotels-affected-by-critical-vulnerabilities-in-aruba-and-avaya-switches/</loc>
		<lastmod>2022-05-03T17:42:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/05/03/avoslocker-ransomware-can-disable-any-defense-solution-using-a-legitimate-avast-anti-rootkit-driver/</loc>
		<lastmod>2022-05-03T23:34:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/05/04/researcher-finds-dll-hijacking-vulnerability-in-conti-revil-lockbit-black-basta-bitlocker-and-avoslocker-ransomware-variants-that-could-prevent-file-encryption/</loc>
		<lastmod>2022-05-04T16:31:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/05/04/tractors-and-agricultural-trucks-stolen-from-ukraine-by-russian-troops-were-remotely-blocked-by-the-manufacturer/</loc>
		<lastmod>2022-05-04T18:16:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/05/04/kellogg-community-college-shuts-down-its-campus-and-cancels-classes-after-ransomware-attack/</loc>
		<lastmod>2022-05-04T22:43:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/05/04/vulnerability-in-owasps-enterprise-security-api-patch-immediately/</loc>
		<lastmod>2022-05-04T23:21:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/05/05/17-critical-vulnerabilities-affect-16000-f5-big-ip-security-products/</loc>
		<lastmod>2022-05-05T16:24:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/05/05/critical-vulnerability-in-cisco-enterprise-nfv-infrastructure-software-nfvis-would-allow-easy-root-access-to-affected-servers/</loc>
		<lastmod>2022-05-05T17:41:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/05/05/how-chinese-cyber-army-steals-intellectual-property-from-your-company/</loc>
		<lastmod>2022-05-05T23:04:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/05/06/go-keyboard-an-app-with-over-100-million-downloads-has-full-access-to-the-phone-and-contains-tracking-code-from-20-companies-including-google-facebook-amazon-and-the-russian-government/</loc>
		<lastmod>2022-05-06T16:39:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/05/09/how-to-protect-yourself-online-10-critical-steps/</loc>
		<lastmod>2022-10-26T14:55:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/05/09/imdb-hacked-by-johnny-depp-fans-to-insult-amber-heard-calling-her-amber-turd/</loc>
		<lastmod>2022-05-09T16:24:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/05/09/exploitation-code-for-cve-2022-1388-available-critical-remote-code-execution-vulnerability-in-f5-network-management-tools/</loc>
		<lastmod>2022-05-09T17:45:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/05/09/cybersecurity-from-the-cloud-why-security-as-a-service-is-set-to-become-more-prevalent/</loc>
		<lastmod>2023-05-31T15:11:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/05/09/ikea-confirms-data-breach-affecting-its-canadian-customers/</loc>
		<lastmod>2022-05-09T23:07:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/05/10/150-year-old-college-shuts-down-permanently-after-ransomware-attack/</loc>
		<lastmod>2022-05-10T16:21:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/05/10/cybercriminals-hack-fortress-protocol-steal-its-funds-and-launder-them-through-tornado-cash/</loc>
		<lastmod>2022-05-10T17:31:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/05/11/how-to-do-professional-vulnerability-assessment-on-your-website-for-free-using-juice-shop/</loc>
		<lastmod>2022-05-10T23:02:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/05/11/threat-actors-are-exploiting-critical-vulnerability-in-f5-products-to-destroy-firewalls-and-network-devices-completely/</loc>
		<lastmod>2022-05-11T16:55:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/05/11/nist-updates-the-cybersecurity-supply-chain-risk-management-guidance-c-scrm-in-response-to-executive-order-signed-by-president-biden/</loc>
		<lastmod>2022-05-11T20:49:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/05/11/british-individual-accused-of-hacking-email-servers-and-computers-in-us-banks-losses-of-more-than-5-million-usd/</loc>
		<lastmod>2022-05-11T21:54:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/05/11/linkedin-scam-attempts-multiply-during-2022-how-to-prevent-it/</loc>
		<lastmod>2022-05-11T23:32:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/05/12/9-strategies-to-keep-your-microsoft-365-business-data-safe-and-secure/</loc>
		<lastmod>2022-10-26T14:56:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/05/12/nerbian-rat-new-malware-with-advanced-anti-analysis-and-anti-reversing-capabilities-uses-information-about-who-and-covid-19-for-its-spreading/</loc>
		<lastmod>2022-05-12T18:01:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/05/12/man-gets-5-years-for-buying-38000-paypal-stolen-account-credentials-from-the-internet/</loc>
		<lastmod>2022-05-12T22:13:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/05/13/new-tool-to-find-vulnerabilities-in-the-way-applications-like-microsoft-word-and-adobe-acrobat-process-javascript-cooperative-mutation-attack/</loc>
		<lastmod>2022-05-13T16:43:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/05/13/threat-actors-could-have-hacked-the-u-s-drug-enforcement-administration-dea-and-other-related-law-enforcement-agencies-investigation-still-ongoing/</loc>
		<lastmod>2022-05-13T18:18:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/05/13/openseas-discord-server-was-hacked-thieves-post-phishing-link-to-steal-cryptocurrency/</loc>
		<lastmod>2022-05-13T22:21:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/05/14/critical-vulnerabilities-allow-hacking-multiple-konica-minolta-devices/</loc>
		<lastmod>2022-05-13T22:27:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/05/16/3-critical-vulnerabilities-in-sonicwall-sma-1000-sslvpn-affect-over-500k-companies/</loc>
		<lastmod>2022-05-16T16:47:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/05/16/security-researcher-finds-new-way-to-exploit-cve-2022-22005-recently-patched-deserialization-bug-in-microsoft-sharpoint/</loc>
		<lastmod>2022-05-16T21:16:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/05/17/4-things-you-need-to-know-before-starting-a-translation-business/</loc>
		<lastmod>2022-10-26T14:56:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/05/17/researchers-find-new-way-to-hack-any-iphone-even-when-its-turned-off/</loc>
		<lastmod>2022-05-17T18:34:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/05/17/more-than-200-apps-on-play-store-with-millions-of-downloads-are-stealing-users-passwords-and-sensitive-information/</loc>
		<lastmod>2022-05-17T19:28:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/05/18/critical-vulnerability-in-bluetooth-low-energy-ble-allows-easily-hacking-tesla-cars-smart-locks-and-millions-of-devices-that-use-this-bluetooth-technology/</loc>
		<lastmod>2022-05-18T16:28:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/05/18/hackers-remotely-take-control-of-wheeled-surveillance-robots-at-russian-airport/</loc>
		<lastmod>2022-05-18T22:52:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/05/19/critical-vulnerability-in-flux2-a-kubernetes-continuous-delivery-tool-enables-hacking-between-neighboring-deployments/</loc>
		<lastmod>2022-05-19T16:40:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/05/19/hackers-steal-1-million-usd-from-razorpay/</loc>
		<lastmod>2022-05-19T21:40:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/05/20/how-to-download-paid-applications-for-free-from-huawei-appgallery-new-vulnerability-found/</loc>
		<lastmod>2022-05-20T16:27:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/05/20/india-relaxes-cyber-security-incidents-reporting-rules-and-says-new-rules-apply-to-mncs/</loc>
		<lastmod>2022-05-20T18:35:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/05/23/rav-antivirus-4-ways-to-improve-personal-cybersecurity-in-2022/</loc>
		<lastmod>2022-10-26T14:56:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/05/23/personal-data-of-mgm-resorts-customers-leaked-on-telegram-for-free-142-million-records-exposed/</loc>
		<lastmod>2022-05-23T16:29:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/05/23/ethical-hacker-gets-10-million-bounty-for-finding-critical-vulnerability-in-ethereum-wormhole-contract/</loc>
		<lastmod>2022-05-23T18:02:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/05/23/cryptocurrency-exchange-founder-sentenced-to-2-years-of-probation-for-failing-to-implement-an-anti-money-laundering-program/</loc>
		<lastmod>2022-05-23T22:51:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/05/24/popular-python-package-ctx-python-and-php-library-were-compromised-and-injected-with-a-backdoor/</loc>
		<lastmod>2022-05-24T16:25:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/05/24/data-brokers-are-selling-location-details-of-women-visiting-abortion-clinics/</loc>
		<lastmod>2022-05-24T17:56:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/05/25/zero-day-vulnerability-in-tails-and-tor-browser-exposes-users-identity-no-patches-available/</loc>
		<lastmod>2022-05-25T16:31:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/05/25/how-hackers-took-control-of-100-email-accounts-of-employees-of-rt-and-other-russian-organizations-for-cyber-spying-purposes/</loc>
		<lastmod>2022-05-25T18:20:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/05/25/indian-companies-listed-in-stock-exchange-to-provide-infosec-audits-and-information-system-inventory-to-government-new-sebi-guidelines/</loc>
		<lastmod>2022-05-25T23:26:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/05/26/nine-expert-level-tips-to-protect-your-android-or-ios-smartphone-from-cyber-criminals/</loc>
		<lastmod>2022-10-26T14:57:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/05/26/sase-and-the-future-of-security/</loc>
		<lastmod>2022-10-26T14:57:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/05/26/critical-security-vulnerabilities-in-netgear-br200-and-br500-routers-impossible-to-patch-these-issues/</loc>
		<lastmod>2022-05-26T17:51:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/05/26/7-high-severity-vulnerabilities-in-open-automation-software-platform-used-for-connectivity-between-plcs-and-iot-devices/</loc>
		<lastmod>2022-05-26T21:29:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/05/26/black-cat-ransomware-shuts-down-austrias-passport-and-transport-departments-after-encrypting-3000-computers/</loc>
		<lastmod>2022-05-26T23:05:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/05/26/hackers-theft-over-1-4-million-worth-of-moonbird-nft-collection/</loc>
		<lastmod>2022-05-26T23:28:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/05/27/exploit-code-to-hack-vmware-products-is-publicly-disclosed-poc-for-cve-2022-22972/</loc>
		<lastmod>2022-05-27T16:37:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/05/27/texas-shooter-sent-death-threats-via-facebook-messenger-prior-the-incident-meta-ai-systems-couldnt-detect-them/</loc>
		<lastmod>2022-05-27T17:49:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/05/30/zero-day-vulnerability-in-microsoft-office-pro-plus-office-2013-office-2016-and-office-2021-allows-remote-network-hacking-with-just-a-single-click/</loc>
		<lastmod>2022-05-30T16:32:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/05/30/indian-hdfc-bank-deposits-millions-in-customers-accounts-by-mistake-hacking-incident-or-just-a-software-flaw/</loc>
		<lastmod>2022-05-30T21:41:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/05/30/full-names-ids-email-addresses-and-phone-numbers-of-hacked-verizon-employees-customers-could-experience-increased-sim-swap-attacks/</loc>
		<lastmod>2022-05-30T23:00:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/05/31/interpol-arrests-hackers-who-attacked-oil-and-gas-companies-worldwide-operation-killer-bee/</loc>
		<lastmod>2022-05-31T16:32:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/05/31/enemybot-new-iot-malware-exploits-one-day-vulnerabilities-to-hack-thousands-of-devices/</loc>
		<lastmod>2022-05-31T17:54:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/05/31/2-critical-vulnerabilities-in-apache-traffic-server-patch-immediately/</loc>
		<lastmod>2022-05-31T22:37:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/05/31/9-critical-vulnerabilities-in-mozilla-thunderbird-allow-easy-takeover-of-your-machine-via-email/</loc>
		<lastmod>2022-05-31T23:34:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/06/01/are-you-keen-to-forge-a-career-in-law-enforcement/</loc>
		<lastmod>2022-10-26T14:58:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/06/01/6-tips-to-clear-disk-space-on-mac/</loc>
		<lastmod>2022-10-26T14:58:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/06/01/lockbit-ransomware-encrypts-computers-at-foxconn-mexico-factory-one-of-apples-largest-suppliers/</loc>
		<lastmod>2022-06-01T16:20:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/06/01/how-chinese-government-successfully-controlled-google-bing-and-youtube-search-results-in-disinformation-campaigns/</loc>
		<lastmod>2022-06-01T17:55:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/06/01/fbi-seizes-infrastructure-of-weleakinfo-and-other-cyber-criminal-platforms/</loc>
		<lastmod>2022-06-01T23:24:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/06/02/millions-of-android-smartphones-exposed-to-remote-hacking-due-to-vulnerability-in-unisoc-baseband-chips/</loc>
		<lastmod>2022-06-02T17:28:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/06/02/warning-new-cyber-criminal-group-karakurt-is-extorting-millions-of-companies-around-the-world/</loc>
		<lastmod>2022-06-02T19:29:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/06/02/yourcyanide-new-and-sophisticated-ransomware-variant-that-integrates-documents-into-pastebin-discord-and-microsoft-office/</loc>
		<lastmod>2022-06-02T23:26:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/06/03/cve-2022-26134-zero-day-remote-code-execution-vulnerability-affecting-confluence-server-and-data-center/</loc>
		<lastmod>2022-06-03T17:09:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/06/03/how-to-hide-spoofed-malicious-domain-when-users-hover-above-a-link-in-a-phishing-email-in-microsoft-outlook-word-or-excel-document/</loc>
		<lastmod>2022-06-03T20:43:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/06/06/8-critical-vulnerabilities-in-gitlab-would-allow-hackers-to-install-backdoors-in-your-code/</loc>
		<lastmod>2022-06-06T17:12:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/06/06/how-bored-ape-nfts-are-being-hacked-again-and-again-200-eth-stolen/</loc>
		<lastmod>2022-06-06T22:20:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/06/06/major-russian-law-firm-is-hacked-terabytes-of-stolen-data/</loc>
		<lastmod>2022-06-06T23:04:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/06/07/free-decryption-tool-for-tarrak-ransomware-how-to-recover-your-infected-files/</loc>
		<lastmod>2022-06-07T16:46:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/06/07/telegram-is-providing-police-with-user-information-in-several-cases-contradicting-the-companys-privacy-policy-use-it-with-a-burner-phone-and-vpn/</loc>
		<lastmod>2022-06-07T20:49:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/06/08/follina-microsoft-office-vulnerability-also-affects-foxit-pdf-reader-no-patches-available/</loc>
		<lastmod>2022-06-08T16:27:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/06/09/new-rootkit-malware-for-linux-is-undetectable-and-is-quickly-spreading-throughout-latin-america-protect-your-servers-before-its-too-late/</loc>
		<lastmod>2022-06-09T16:54:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/06/09/education-and-telecommunication-organizations-based-in-singapore-hong-kong-vietnam-cambodia-and-australia-were-being-spied-on-since-2013/</loc>
		<lastmod>2022-06-09T22:34:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/06/09/ransomware-attack-targeting-public-schools-in-new-jersey-forces-cancellation-of-final-exams/</loc>
		<lastmod>2022-06-09T23:21:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/06/10/bluetooth-signals-on-smartphones-allow-tracking-any-users-location-by-exploiting-ble/</loc>
		<lastmod>2022-06-10T17:34:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/06/10/best-cybersecurity-certifications-2022/</loc>
		<lastmod>2022-10-26T14:58:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/06/10/two-critical-command-injection-vulnerabilities-in-fujitsu-cloud-storage-system-allow-remote-encryption-or-deletion-of-files/</loc>
		<lastmod>2022-06-10T21:08:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/06/11/how-to-find-zero-day-vulnerabilities-with-fuzz-faster-u-fool-ffuf-detailed-free-fuzzing-tool-tutorial/</loc>
		<lastmod>2022-06-08T22:25:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/06/13/how-to-write-an-essay-like-a-pro-top-8-tips/</loc>
		<lastmod>2022-10-26T14:58:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/06/13/the-new-version-of-hello-xd-ransomware-developed-by-russian-hackers-becomes-undetectable-by-using-a-backdoor/</loc>
		<lastmod>2022-06-13T18:21:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/06/13/critical-vulnerability-in-the-way-sony-ps3-ps4-and-ps5-consoles-read-blu-ray-discs-allows-rooting-and-modifying-the-firmware/</loc>
		<lastmod>2022-06-13T19:27:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/06/14/why-action-bias-is-damaging-your-cyber-security-response-and-how-to-fix-it/</loc>
		<lastmod>2022-10-26T14:59:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/06/14/3-critical-vulnerabilities-in-xen-project-allows-to-take-control-of-host-os-via-vms-in-x86-pv/</loc>
		<lastmod>2022-06-14T22:23:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/06/15/more-than-770-million-records-available-through-the-travis-ci-api-anyone-can-extract-tokens-secrets-and-other-credentials-associated-with-services-like-github-aws-and-docker-hub/</loc>
		<lastmod>2022-06-15T16:20:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/06/15/the-most-dangerous-wastes-that-should-never-be-thrown-in-nature/</loc>
		<lastmod>2022-10-26T14:59:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/06/16/amazon-linux-server-can-be-hacked-easily-critical-privilege-escalation-vulnerability-in-log4j-hotpatch-released-to-fix-log4j-vulnerabilities/</loc>
		<lastmod>2022-06-16T18:02:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/06/17/how-misspelling-of-one-word-saved-a-man-his-6-millions-from-cyber-criminals/</loc>
		<lastmod>2022-06-17T20:41:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/06/20/24649096027-24-65-billion-account-usernames-and-passwords-have-been-leaked-by-cyber-criminals-till-now-in-2022/</loc>
		<lastmod>2022-06-20T16:19:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/06/21/israels-air-strike-sirens-system-hacked-by-iran-commotion-in-israeli-cities-as-sirens-sounded-for-an-hour/</loc>
		<lastmod>2022-06-21T18:29:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/06/22/privilege-escalation-vulnerability-in-atlasvpn-update-immediately/</loc>
		<lastmod>2022-06-23T01:12:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/06/23/russian-cyber-army-attempted-to-hack-more-than-128-organizations-in-42-countries/</loc>
		<lastmod>2022-06-23T19:05:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/06/27/critical-information-disclosure-incomplete-cleanup-and-race-condition-vulnerabilities-in-citrix-hypervisor-download-hotfixes/</loc>
		<lastmod>2022-06-28T04:53:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/06/28/top-25-most-dangerous-vulnerabilities-of-2022-easily-exploitable-cwe-common-weakness-enumeration/</loc>
		<lastmod>2022-06-28T19:17:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/06/30/zuorat-malware-exclusively-designed-for-hacking-asus-cisco-draytek-and-netgear-soho-routers/</loc>
		<lastmod>2022-06-30T20:58:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/06/30/san-storage-products-of-dell-fujitsu-hp-huawei-ibm-brocade-and-lenovo-affected-by-9-critical-vulnerabilities/</loc>
		<lastmod>2022-06-30T21:54:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/07/02/hackerone-hacked-becomes-the-victim-of-insider-threat/</loc>
		<lastmod>2022-07-02T00:12:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/07/04/israeli-metro-servers-hacked-by-iranian-hackers/</loc>
		<lastmod>2022-07-04T17:43:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/07/04/netherlands-university-paid-e200000-in-bitcoins-to-a-ransomware-gang-now-got-its-money-back-except-now-the-bitcoin-was-worth-e500000/</loc>
		<lastmod>2022-07-04T19:16:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/07/05/critical-sql-injection-vulnerability-in-django/</loc>
		<lastmod>2022-07-05T18:53:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/07/05/zero-day-vulnerability-in-chrome-edge-brave-opera-vivaldi-browsers-allow-taking-control-of-your-laptop-or-mobile/</loc>
		<lastmod>2022-07-05T20:14:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/07/06/marriott-hotel-chain-hacked-6th-time-most-comfortable-place-for-vacations-or-to-get-hacked/</loc>
		<lastmod>2022-07-06T18:40:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/07/06/critical-openssl-vulnerability-cve-2022-2274-allows-threat-actors-to-remotely-run-code-on-your-servers-and-encrypt-them/</loc>
		<lastmod>2022-07-06T22:51:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/07/07/11-important-vulnerabilities-in-fortinet-products-fortios-fortianalyzer-fortiadc-fortimanager-fortiproxy-forticlient-fortideceptor-fortiswitch-fortirecoder-fortivoiceenterprise/</loc>
		<lastmod>2022-07-07T17:25:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/07/08/decrypt-files-encrypted-by-astralocker-yashma-ransomware-for-free-gang-publishes-the-keys/</loc>
		<lastmod>2022-07-08T21:16:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/07/08/microsoft-makes-things-easier-for-cyber-criminals-by-enabling-again-macros-by-default-in-office-products/</loc>
		<lastmod>2022-07-08T21:43:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/07/11/critical-vulnerability-allows-unlocking-starting-stealing-honda-cars-without-key-hacking-honda-vehicles/</loc>
		<lastmod>2022-07-11T22:31:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/07/12/how-to-protect-your-mac-from-malware/</loc>
		<lastmod>2022-11-24T23:07:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/07/12/5-best-free-api-security-testing-tools-protecting-your-cloud-ci-cd-pipeline/</loc>
		<lastmod>2022-07-12T19:41:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/07/13/ways-to-secure-your-linux-vps-so-you-dont-get-hacked/</loc>
		<lastmod>2022-07-19T22:08:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/07/13/3-critical-vulnerabilities-in-lenovo-laptops-uefi-70-models-including-thinkbook-allow-them-to-be-hacked-forever-even-after-removing-the-hard-drive/</loc>
		<lastmod>2022-07-13T16:59:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/07/13/the-most-dangerous-keylogger-malware-of-2022-snake-keylogger/</loc>
		<lastmod>2022-07-13T19:26:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/07/15/tutorial-for-pentesting-android-apps-using-the-free-zanti-toolkit/</loc>
		<lastmod>2022-07-15T15:22:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/07/18/new-version-of-tor-browser-makes-it-easier-for-users-to-evade-government-attempts-to-block-its-use/</loc>
		<lastmod>2022-07-18T22:00:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/07/18/what-is-the-reverse-qr-social-engineering-attack-and-how-to-protect-from-it/</loc>
		<lastmod>2022-07-18T22:53:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/07/19/new-technique-satan-to-hack-air-gapped-computers-using-sata-cables-as-antenna/</loc>
		<lastmod>2022-07-19T20:21:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/07/20/how-aitm-attack-was-used-to-breach-10000-organizations/</loc>
		<lastmod>2022-07-21T00:28:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/07/21/expert-guide-to-the-ultimate-security-of-your-sap-solutions/</loc>
		<lastmod>2023-01-03T15:46:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/07/21/how-to-use-advanced-network-intelligence-toolkit-for-pentesting-badkarma/</loc>
		<lastmod>2022-07-21T19:26:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/07/22/critical-cvss-9-4-sql-injection-vulnerability-in-sonicwall-gms-sonicwall-analytics-on-prem/</loc>
		<lastmod>2022-07-22T20:23:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/07/22/microsoft-makes-things-harder-for-cyber-criminals-by-disabling-macros-again-by-default-in-office-products/</loc>
		<lastmod>2022-07-22T21:17:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/07/25/new-very-powerful-all-in-one-linux-malware/</loc>
		<lastmod>2022-07-25T19:41:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/07/26/what-is-zero-trust-security-model/</loc>
		<lastmod>2023-01-03T15:45:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/07/26/windows-enables-default-account-lockout-policy-for-rdp-remote-desktop-protocol-to-reduce-ransomware-attacks-based-on-brute-forcing-rdp/</loc>
		<lastmod>2022-07-26T20:36:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/07/27/building-a-devsecops-process-with-splunk/</loc>
		<lastmod>2023-01-03T15:45:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/07/27/alibaba-cloud-compromised-to-distribute-malware-via-steganography/</loc>
		<lastmod>2022-07-27T21:38:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/07/27/3-vulnerabilities-affecting-ibm-qradar-siem-patch-immediately/</loc>
		<lastmod>2022-07-27T21:58:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/07/28/the-average-cost-of-a-data-breach-increased-2-6-from-4-24-million-in-2021-to-4-35-million-in-2022/</loc>
		<lastmod>2022-07-28T22:19:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/07/29/how-to-easily-spoof-mac-address-automatically-and-be-more-anonymous/</loc>
		<lastmod>2022-07-29T18:22:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/08/01/critical-security-vulnerabilities-in-netgear-business-routers-which-the-netgear-team-cant-fix-stop-using-these-routers-as-soon-as-possible/</loc>
		<lastmod>2022-08-01T20:34:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/08/01/this-is-how-they-use-windows-defender-antivirus-to-encrypt-your-computer-with-lockbit-ransomware/</loc>
		<lastmod>2022-08-01T22:20:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/08/02/north-korean-hackers-found-a-new-way-to-hack-cryptocurrency-companies-by-getting-jobs-there-using-fake-resumes/</loc>
		<lastmod>2022-08-02T19:07:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/08/04/3-critical-vulnerabilities-in-9-cisco-router-models-allows-complete-takeover-of-any-network/</loc>
		<lastmod>2022-08-04T18:54:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/08/04/television-screens-at-7-eleven-and-train-stations-in-taiwan-hacked-to-display-insults-to-nancy-pelosi/</loc>
		<lastmod>2022-08-04T20:01:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/08/05/seifan-see-the-version-of-pegasus-spyware-software-designed-just-for-police/</loc>
		<lastmod>2022-08-05T18:22:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/08/05/4tb-of-confidential-data-firmware-code-of-cellebrite-tfs-and-cellebrite-mobilogy-leaked-ufed-tool-can-be-used-to-unlock-any-iphone-or-andorid/</loc>
		<lastmod>2022-08-05T20:04:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/08/08/what-is-attack-surface-management-and-is-it-a-necessity/</loc>
		<lastmod>2023-05-31T15:07:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/08/08/3-critical-vulnerabilities-in-argo-cd-allow-complete-take-over-of-your-applications-and-servers/</loc>
		<lastmod>2022-08-08T20:14:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/08/09/twilio-hacked-clients-personal-data-leaked-slack-reset-passwords-of-its-users/</loc>
		<lastmod>2022-08-09T19:47:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/08/10/kali-linux-2022-3-released-with-new-hacking-tools-and-improved-performance/</loc>
		<lastmod>2022-08-10T18:39:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/08/10/lnk-files-is-one-of-the-most-common-way-of-hacking-into-enterprise-environment/</loc>
		<lastmod>2022-08-10T19:25:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/08/11/fix-these-windows-vulnerabilities-before-someone-exploits-them/</loc>
		<lastmod>2022-08-11T17:40:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/08/11/vulenerblity-in-unrar-affects-linux-unix-servers-is-being-actively-exploited-by-threat-actors/</loc>
		<lastmod>2022-08-11T17:50:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/08/12/cuba-ransomware-now-targeting-critical-infrastructure/</loc>
		<lastmod>2022-08-12T17:33:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/08/15/vulnerability-in-zoom-update-feature-could-give-hackers-full-access-to-your-macos/</loc>
		<lastmod>2022-08-15T22:27:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/08/16/elon-musk-offers-up-to-25000-to-those-who-hack-starlink-satellites/</loc>
		<lastmod>2022-08-16T17:43:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/08/16/new-iso-270022022-the-swiss-army-knife-of-security/</loc>
		<lastmod>2022-08-16T18:18:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/08/17/digital-ocean-users-emails-leaked-after-mailchimp-hacking-incident/</loc>
		<lastmod>2022-08-17T19:21:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/08/18/social-engineering-internal-testing-best-practises/</loc>
		<lastmod>2023-08-15T17:28:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/08/18/microsoft-employees-leak-their-own-passwords-on-github-incredible-as-it-may-seem/</loc>
		<lastmod>2022-08-18T17:26:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/08/18/how-criminals-are-hacking-key-fobs-to-quickly-and-quietly-steal-cars/</loc>
		<lastmod>2022-08-18T17:42:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/08/19/5-ways-to-protect-your-affiliate-website-against-cyber-threats/</loc>
		<lastmod>2023-08-15T17:28:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/08/19/cve-2022-0847-new-critical-privilege-escalation-vulnerability-in-linux-presented-in-black-hat-dirty-cred/</loc>
		<lastmod>2022-08-19T16:27:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/08/22/5-reasons-why-cybersecurity-is-vital-for-your-company-info/</loc>
		<lastmod>2023-01-03T15:43:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/08/22/critical-vulnerability-in-tp-link-most-sold-router-tp-link-tl-wr841/</loc>
		<lastmod>2022-08-22T18:27:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/08/22/this-free-tool-easily-lets-you-find-if-javascript-code-is-being-used-in-browser-inside-apps-to-track-your-activity/</loc>
		<lastmod>2022-08-22T19:15:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/08/23/lockbit-falls-victim-to-a-large-scale-ddos-attack-after-hacking-into-entrust-lockbit-accuses-entrust-of-being-behind-the-cyberattack/</loc>
		<lastmod>2022-08-23T21:44:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/08/23/half-of-twitters-roughly-7000-full-time-workers-have-complete-access-to-its-code-and-user-confidential-data-says-its-former-chief-security-officer-peiter-zatko/</loc>
		<lastmod>2022-08-23T21:56:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/08/24/microsoft-shuts-down-over-1400-email-accounts-and-531000-urls-used-by-ransomware-gang-that-collected-stolen-customer-credentials/</loc>
		<lastmod>2022-08-24T20:39:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/08/24/plex-media-server-suffers-a-security-breach-do-this-right-now/</loc>
		<lastmod>2022-08-24T20:47:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/08/25/more-than-80000-hikvision-cctv-cameras-exposed-by-a-vulnerability/</loc>
		<lastmod>2022-08-25T22:48:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/08/26/lastpass-the-worlds-most-popular-password-manager-hacked/</loc>
		<lastmod>2022-08-26T18:52:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/08/29/the-importance-of-email-security-protect-your-inbox-and-your-business/</loc>
		<lastmod>2023-08-15T17:27:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/08/29/8-client-data-protection-tips-to-keep-your-customers-safe-2022/</loc>
		<lastmod>2023-08-15T17:27:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/08/29/sharpext-rat-surreptitiously-read-and-download-emails-and-attachments-from-infected-users-gmail-and-aol-accounts/</loc>
		<lastmod>2022-08-29T21:43:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/08/29/critical-vulnerability-in-bitbucket-servers-and-data-centers/</loc>
		<lastmod>2022-08-29T21:51:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/08/30/cloud-solutions-for-healthcare-industry/</loc>
		<lastmod>2023-08-15T17:27:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/08/30/google-will-pay-up-to-31000-to-those-who-find-vulnerabilities-in-its-open-source-software/</loc>
		<lastmod>2022-08-30T21:26:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/08/30/ftc-sues-a-company-that-sells-user-location-data-and-tracks-their-visit-to-fertility-clinics-temples-churches-and-other-sensitive-locations/</loc>
		<lastmod>2022-08-30T21:48:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/08/31/a-database-containing-800-million-chinese-faces-and-vehicle-license-plates-leaked/</loc>
		<lastmod>2022-08-31T22:53:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/08/31/the-most-important-cybersecurity-steps-you-need-to-take/</loc>
		<lastmod>2023-08-15T17:27:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/09/01/nitrokod-stealth-malware-hides-on-a-pc-for-a-month-before-it-goes-to-work-infects-over-111000-users/</loc>
		<lastmod>2022-09-01T18:51:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/09/01/change-these-20-passwords-if-you-are-using-them-in-your-accounts-immediately/</loc>
		<lastmod>2022-09-01T19:12:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/09/02/which-security-solutions-can-protect-hybrid-data-centers-from-attacks/</loc>
		<lastmod>2023-08-15T17:26:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/09/02/threat-actors-could-access-user-data-stored-in-the-amazon-cloud-due-to-vulnerabilities-in-nearly-2000-ios-and-android-apps/</loc>
		<lastmod>2022-09-02T18:39:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/09/02/biggest-taxi-firm-in-russia-hacked-to-order-all-the-cabs-to-same-place-at-once-causing-huge-traffic-jam-like-in-james-bond-movie/</loc>
		<lastmod>2022-09-02T18:51:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/09/05/tiktok-hacked-usernames-passwords-and-payment-information-of-all-users-published-online-change-your-password-immediately/</loc>
		<lastmod>2022-09-05T17:27:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/09/05/samsung-admits-hack-that-leaked-personal-information-names-birthdays-and-contact-details-of-its-users/</loc>
		<lastmod>2022-09-05T17:38:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/09/06/ukrainian-hackers-lure-russian-soldiers-into-sharing-their-location-then-bomb-their-base/</loc>
		<lastmod>2022-09-06T22:11:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/09/07/is-there-a-viable-siem-replacement/</loc>
		<lastmod>2023-08-15T17:26:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/09/07/which-sorts-of-pan-tilt-zoom-cameras-are-secure-from-hackers/</loc>
		<lastmod>2023-08-15T17:26:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/09/07/cyber-attck-takes-down-reservation-systems-of-intercontinental-hotels-crowne-plaza-holiday-inn-regent-and-holiday-inn-express/</loc>
		<lastmod>2022-09-07T22:25:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/09/09/the-new-linux-shikitega-malware-is-very-stealthy-secure-your-linux-servers/</loc>
		<lastmod>2022-09-09T16:47:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/09/12/how-to-protect-your-digital-footprint/</loc>
		<lastmod>2023-05-04T18:52:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/09/12/yanluowang-ransomware-gang-hacked-cisco-and-now-published-its-confidential-data/</loc>
		<lastmod>2022-09-12T20:10:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/09/13/the-purpose-of-fca-licenses-for-online-brokers/</loc>
		<lastmod>2023-08-15T17:25:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/09/13/everything-you-need-to-know-about-cybersecurity-audits-benefits-certification-and-more/</loc>
		<lastmod>2023-08-15T17:25:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/09/13/the-benefits-of-continuous-penetration-testing-explained/</loc>
		<lastmod>2023-01-03T15:48:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/09/13/critical-zero-day-vulnerability-in-ios-and-macos-affecting-iphone-ipad-ipod-and-macs-update-immediately/</loc>
		<lastmod>2022-09-13T17:13:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/09/13/critical-flaw-cve-2022-2964-with-cvss-score-7-8-affects-linux-kernel-and-allows-arbitrary-code-execution/</loc>
		<lastmod>2022-09-13T17:51:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/09/14/ransomware-gang-dev-0270-now-using-windows-bitlocker-function-to-encrypt-devices/</loc>
		<lastmod>2022-09-14T18:36:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/09/14/critical-bios-vulnerabilities-affect-lenovo-desktop-desktop-aio-smart-edge-smart-office-thinkstation-and-thinksystem-models/</loc>
		<lastmod>2022-09-14T18:58:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/09/15/phishing-alert-giving-your-condolences-for-queen-elizabeth-ii-can-leave-your-data-in-the-hands-of-cybercriminals/</loc>
		<lastmod>2022-09-15T20:57:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/09/19/how-to-create-an-iot-application-tips-from-developers/</loc>
		<lastmod>2023-08-15T17:25:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/09/19/rockstar-games-hacked-grand-theft-auto-vi-videos-and-gta-v-source-code-leaked/</loc>
		<lastmod>2022-09-19T23:59:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/09/20/morgan-stanley-smith-barney-fined-35-million-for-not-doing-secure-destruction-of-hard-drives-servers-and-allowing-vendors-to-sell-them-on-ebay/</loc>
		<lastmod>2022-09-20T22:41:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/09/21/ransomware-lockbit-3-0-code-leaked-on-github-now-anyone-can-start-their-ransomware-business/</loc>
		<lastmod>2022-09-21T19:09:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/09/22/what-are-esignatures-and-what-are-they-used-for/</loc>
		<lastmod>2023-08-15T17:25:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/09/23/60-different-hp-printer-models-of-inkjet-laserjet-pro-and-pagewide-pro-printers-allow-threat-actors-to-take-control-of-network-remotely-patch-these-two-flaws/</loc>
		<lastmod>2022-09-23T22:01:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/09/26/this-ransomware-can-steal-your-veeam-credentials-and-encrypt-your-backups/</loc>
		<lastmod>2022-09-26T19:47:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/09/26/two-critical-whatsapp-vulnerabilities-allow-hacking-whatsapp-android-ios-via-call-or-video-file-update-immediately/</loc>
		<lastmod>2022-09-26T20:23:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/09/27/how-startups-can-overcome-cybersecurity-challenges-to-shield-their-business/</loc>
		<lastmod>2023-01-03T15:49:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/09/27/chilean-government-once-again-becomes-a-victim-of-ransomware-and-this-time-is-judiciary-poder-judicial/</loc>
		<lastmod>2022-09-27T21:11:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/09/27/how-fake-news-of-coup-in-china-and-arrest-of-xi-jinping-started-and-who-was-responsible-for-spreading-it/</loc>
		<lastmod>2022-09-27T21:53:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/09/28/hacker-who-leaked-data-of-millions-of-australians-is-regretting-his-act-and-asking-for-an-apology/</loc>
		<lastmod>2022-09-28T23:25:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/09/28/avast-open-sources-two-great-yara-tools-yarang-a-yara-scanner-and-yls-a-yara-development-environment/</loc>
		<lastmod>2022-09-28T23:41:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/09/29/how-chinese-threat-actors-are-using-recently-discovered-zero-day-flaws-in-office-and-sophos-firewall/</loc>
		<lastmod>2022-09-29T21:50:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/09/29/auth0-an-authentication-service-provider-and-okta-subsidiary-hacked/</loc>
		<lastmod>2022-09-29T22:05:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/09/30/hacktivist-group-guacamaya-leaks-6-tb-of-confidential-data-from-the-mexican-government-and-military/</loc>
		<lastmod>2022-09-30T20:21:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/09/30/two-zero-day-vulnerabilities-in-exchange-server-no-patch-available/</loc>
		<lastmod>2022-09-30T21:26:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/10/03/best-practices-to-secure-the-sdlc/</loc>
		<lastmod>2023-05-10T00:31:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/10/04/3-critical-malicious-code-execution-vulnerabilities-in-linux-kernel/</loc>
		<lastmod>2022-10-04T18:16:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/10/04/new-technique-to-jailbreak-playstation-ps5-published/</loc>
		<lastmod>2022-10-04T18:28:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/10/05/ransomware-gang-leaks-ferraris-confidential-data/</loc>
		<lastmod>2022-10-05T18:37:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/10/05/russian-hacker-group-killnet-launches-usa-offline-fk-nato-campaign-to-hack-all-governments-websites/</loc>
		<lastmod>2022-10-05T18:37:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/10/06/2-critical-remote-code-execution-flaws-in-qualcomm-chipsets-affect-billions-of-smartphones/</loc>
		<lastmod>2022-10-06T17:06:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/10/06/one-of-worlds-largest-cyber-insurance-company-hacked-did-it-bought-of-cyber-insurance-for-themselves/</loc>
		<lastmod>2022-10-06T18:09:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/10/07/two-important-vulnerabilities-cvssv3-score-7-in-vmware-esxi-vcenter-server-cloud-foundation/</loc>
		<lastmod>2022-10-07T16:44:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/10/10/critical-vulnerability-with-cvss-score-of-10-0-in-vm2-the-most-popular-javascript-sandbox-library-with-over-17-5-million-downloads-monthly/</loc>
		<lastmod>2022-10-10T22:52:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/10/11/critical-libreoffice-arbitrary-script-execution-vulnerability-allows-taking-control-of-the-device-with-single-click/</loc>
		<lastmod>2022-10-12T00:20:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/10/11/brazilian-news-channel-suffers-ransomware-attack-and-changes-schedule-as-every-system-gets-encrypted/</loc>
		<lastmod>2022-10-12T00:39:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/10/12/new-third-zero-day-vulnerability-discovered-in-microsoft-exchange-no-patch-available/</loc>
		<lastmod>2022-10-12T19:49:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/10/13/data-security-fabric-a-new-approach-in-securing-enterprise-data/</loc>
		<lastmod>2023-05-29T15:56:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/10/13/minecraft-servers-suffer-underwent-a-2-5-tbps-ddos-attack-from-the-mirai-botnet/</loc>
		<lastmod>2022-10-13T23:30:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/10/14/serious-privileges-escalation-vulnerability-in-symantec-privileged-access-management/</loc>
		<lastmod>2022-10-14T22:56:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/10/15/5-critical-remote-code-execution-vulnerabilities-in-linux-kernel-patch-immediately/</loc>
		<lastmod>2022-10-14T23:21:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/10/17/gang-of-31-cyber-criminals-arrested-for-stealing-cars-via-hacking-software/</loc>
		<lastmod>2022-10-17T21:26:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/10/17/redeye-a-great-opensource-cyber-security-log-visualization-tool-for-red-and-blue-teams/</loc>
		<lastmod>2022-10-17T21:41:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/10/18/very-critical-apache-commons-text-arbitrary-code-execution-vulnerability-with-a-cvss-score-of-9-8-cve-2022-42889/</loc>
		<lastmod>2022-10-19T00:01:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/10/18/message-encryption-ome-used-by-office-365-can-easily-be-broken-to-read-encrypted-emails-via-mitm/</loc>
		<lastmod>2022-10-18T22:42:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/10/19/verizon-prepaid-customers-data-leaked-and-many-become-victim-of-sim-swapping-attacks/</loc>
		<lastmod>2022-10-19T22:48:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/10/20/vulnerabilities-in-nginx-allows-dos-attack-patch-now/</loc>
		<lastmod>2022-10-19T23:18:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/10/21/microsoft-leaked-confidential-data-of-150000-businesses-across-123-nations/</loc>
		<lastmod>2022-10-21T19:42:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/10/21/patch-cve-2021-3493-critical-linux-vulnerability-immediately-says-cisa/</loc>
		<lastmod>2022-10-21T20:01:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/10/24/7-rules-all-students-need-to-follow-to-avoid-leaking-personal-info-on-the-internet/</loc>
		<lastmod>2023-08-15T17:07:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/10/24/3-critical-vulnerabilities-in-veeam-backup-replication-solution-allow-ransomware-to-steal-credentials-encrypt-your-backups/</loc>
		<lastmod>2022-10-24T22:25:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/10/24/hacker-group-black-reward-leaks-confidential-data-of-irans-nuclear-program-along-with-passports-visas-of-iranian-and-russian-specialists-involved-in-the-program/</loc>
		<lastmod>2022-10-24T22:55:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/10/25/two-security-flaws-in-the-cisco-anyconnect-secure-mobility-client-patch-immediately/</loc>
		<lastmod>2022-10-26T22:36:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/10/25/very-critical-vulnerability-cve-2022-35737-affects-all-sqlite-versions-released-in-past-22-years-patch-immediately/</loc>
		<lastmod>2022-10-25T23:44:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/10/26/2-important-vulnerabilities-xxe-rce-in-vmware-cloud-foundation-patch-immediately/</loc>
		<lastmod>2022-10-26T22:11:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/10/26/vulnerability-in-atlassian-jira-align-allows-threat-actor-to-access-whatever-the-saas-client-has-in-their-jira-deployment-or-simply-take-the-entire-thing-down/</loc>
		<lastmod>2022-10-26T22:34:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/10/26/5-methods-of-protecting-your-business-physically-and-online/</loc>
		<lastmod>2023-08-15T17:07:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/10/27/critical-remote-code-execution-in-apache-linkis/</loc>
		<lastmod>2022-10-27T22:54:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/10/31/medical-device-cybersecurity-a-crucial-part-of-us-healthcare-cybersecurity-policy/</loc>
		<lastmod>2023-08-15T17:08:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/10/31/critical-vulnerability-in-openssl-3-0-and-later-affects-thousands-of-applications/</loc>
		<lastmod>2022-10-31T20:38:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/10/31/a-proof-of-concept-poc-exploit-code-released-for-critical-privilege-elevation-vulnerability-cve-2022-37969-cvss-score-7-8-affecting-windows-10-11/</loc>
		<lastmod>2022-10-31T21:02:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/11/01/dropbox-hacked-again-via-simple-phishing-email-is-cybersecurity-awareness-training-is-important-for-employees/</loc>
		<lastmod>2022-11-01T22:20:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/11/01/vulnerability-in-galaxy-store-allows-attackers-to-execute-malware-remotely-on-samsung-phones-without-user-interaction/</loc>
		<lastmod>2022-11-01T22:37:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/11/02/are-online-casino-games-safe-to-play/</loc>
		<lastmod>2022-12-15T15:02:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/11/03/eight-high-severity-vulnerabilities-in-splunk-enterprise-software-allows-threat-actors-to-take-control-of-a-network/</loc>
		<lastmod>2022-11-04T00:12:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/11/04/how-a-hacker-who-stole-data-of-millions-of-people-was-tracked-arrested-because-his-girlfriend-uploaded-this-pic-on-instagram/</loc>
		<lastmod>2022-11-04T20:28:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/11/04/one-of-the-worlds-largest-telescopes-becomes-target-of-cyber-criminales-affecting-the-observatory-operations/</loc>
		<lastmod>2022-11-05T00:28:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/11/07/dont-open-emails-from-microsoft-dynamics-365-threat-actors-are-exploiting-its-flaws-to-send-phishing-emails-with-legitimate-microsoft-links/</loc>
		<lastmod>2022-11-07T21:54:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/11/07/z-library-biggest-collection-of-12-million-pirated-e-books-shutdown-by-fbi-doj/</loc>
		<lastmod>2022-11-07T22:11:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/11/09/update-firmware-of-these-lenovo-thinkbook-ideapad-and-yoga-laptops-models-as-3-critical-vulnerabilities-allow-them-to-be-hacked-forever-even-after-removing-the-hard-drive/</loc>
		<lastmod>2022-11-09T20:48:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/11/09/what-is-mfa-2fa-3fa-and-4fa-just-ways-of-user-authentication/</loc>
		<lastmod>2022-11-09T23:50:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/11/10/10-key-requirements-for-the-best-passwordless-authentication/</loc>
		<lastmod>2023-01-03T15:50:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/11/10/critical-vulnerability-in-intercom-systems-allow-access-to-several-government-apartments-buildings-using-just-a-smartphone-with-nfc/</loc>
		<lastmod>2022-11-10T22:07:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/11/10/australian-government-is-issuing-new-driving-licenses-to-millions-and-changing-the-license-verification-process-because-of-the-optus-data-breach/</loc>
		<lastmod>2022-11-10T22:36:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/11/11/dont-even-think-of-taking-your-real-smartphone-to-fifa-world-cup-matches-in-qatar-immigration-officials-will-gain-access-to-your-phone-data-forever/</loc>
		<lastmod>2022-11-11T23:55:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/11/14/critical-local-privilege-escalation-vulnerability-in-linux-kernel-patch-immediately/</loc>
		<lastmod>2022-11-14T23:14:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/11/14/kmsdbot-new-botnet-infects-systems-via-an-ssh-targets-the-gaming-industry-technology-industry-and-luxury-car-manufacturers/</loc>
		<lastmod>2022-11-14T23:35:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/11/16/three-important-parts-of-a-risk-register/</loc>
		<lastmod>2023-01-03T15:52:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/11/16/6-factors-to-consider-for-prioritizing-remediation-of-vulnerabilities-in-a-network-using-ssvc-strategy/</loc>
		<lastmod>2022-11-16T19:13:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/11/16/gta-5-grand-theft-auto-5-source-code-published-on-github/</loc>
		<lastmod>2022-11-16T21:25:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/11/18/3-vulnerabilities-in-zoom-client-and-zoom-rooms-allows-threat-actor-to-become-admin-of-the-machine/</loc>
		<lastmod>2022-11-18T21:26:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/11/18/this-exploit-code-allows-low-level-privileges-user-to-get-full-admin-privileges-on-vulnerable-cisco-secure-manager-appliance-and-cisco-email-security-appliance/</loc>
		<lastmod>2022-11-18T22:28:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/11/21/devsecops-defining-software-composition-analysis/</loc>
		<lastmod>2023-08-15T17:09:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/11/22/how-businesses-leverage-their-growth-by-acquiring-proper-security-for-office-365/</loc>
		<lastmod>2023-08-15T17:12:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/11/22/3-techniques-that-allow-bypassing-phishing-emails-through-cisco-secure-email-gateway-and-are-being-actively-used-by-ransomware-gangs/</loc>
		<lastmod>2022-11-22T16:39:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/11/22/vulnerabilities-in-mastodon-allow-to-download-or-delete-all-the-files-on-the-server-including-those-exchanged-via-direct-messages-and-change-everyones-profile-image/</loc>
		<lastmod>2022-11-22T17:40:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/11/22/security-features-online-sportsbooks-are-utilizing-to-protect-customers/</loc>
		<lastmod>2023-01-03T15:52:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/11/23/use-after-free-vulnerability-in-linux-kernel-allows-privilege-escalation-patch-your-kernel/</loc>
		<lastmod>2022-11-24T00:43:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/11/23/most-exploited-api-vulnerabilities-in-2022/</loc>
		<lastmod>2022-11-24T16:24:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/11/24/how-to-save-online-videos-pictures-on-iphone/</loc>
		<lastmod>2023-08-15T17:09:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/11/24/top-8-free-tools-for-security-testing-and-audit-of-your-kubernetes-cluster-in-2022/</loc>
		<lastmod>2022-11-24T16:24:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/11/24/australian-government-is-looking-to-hire-hackers-for-its-hack-back-program-to-disrupt-ransomware-gangs/</loc>
		<lastmod>2022-11-24T22:51:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/11/25/iranian-hackers-broke-into-israeli-security-agency-to-steal-surveillance-footage-of-twin-bombings-in-jerusalem/</loc>
		<lastmod>2022-11-25T21:14:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/11/25/new-zero-day-heap-buffer-overflow-in-gpuvulnerability-in-google-chrome/</loc>
		<lastmod>2022-11-25T21:39:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/11/28/what-should-you-do-if-your-whatsapp-number-is-leaked-by-cybercriminals-in-recent-whatsapp-hacked/</loc>
		<lastmod>2022-11-28T23:49:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/11/28/a-hacker-has-posted-data-of-5-3-million-twitter-accounts-on-a-raidforums-while-another-researcher-confirmed-another-hack-involving-100-million-twitter-accounts/</loc>
		<lastmod>2022-11-28T21:14:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/11/29/new-acer-uefi-firmware-vulnerability-cve-2022-4020-makes-antivirus-or-edr-useless-in-acer-laptops/</loc>
		<lastmod>2022-11-29T20:59:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/11/29/critical-rce-vulnerability-in-oracle-fusion-middleware-is-being-exploited-by-adversaries-in-the-wild/</loc>
		<lastmod>2022-11-29T21:46:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/11/29/seventy-thousand-individuals-who-police-believe-may-have-been-victims-of-phone-scams-are-receiving-messages-with-instructions-on-what-they-should-do-next/</loc>
		<lastmod>2022-11-29T22:12:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/12/01/lastpass-the-worlds-most-popular-password-manager-hacked-third-time-along-with-goto-formerly-known-as-logmein/</loc>
		<lastmod>2022-12-01T19:29:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/12/01/zero-day-privilege-escalation-flaw-cve-2022-4139-cvss-score-7-0-impacts-linux-kernel/</loc>
		<lastmod>2022-12-01T19:56:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/12/02/exploit-poc-for-remote-code-execution-flaw-in-visual-studio-code-released/</loc>
		<lastmod>2022-12-03T20:29:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/12/02/bad-news-the-platform-certificates-of-many-phone-manufactures-have-been-hacked-these-are-used-to-sign-trusted-apps-on-android-phones-now-these-certificates-are-being-used-to-certify-malicious-andro/</loc>
		<lastmod>2022-12-02T19:27:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/12/03/6-reasons-to-secure-your-email-in-2023-without-investing-much/</loc>
		<lastmod>2022-12-02T20:35:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/12/05/how-to-scale-your-software-development-team/</loc>
		<lastmod>2023-08-15T17:09:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/12/05/cve-2022-23093-freebsd-vulnerability-allows-remote-execution-of-malware-on-devices-including-playstation-whatsapp-etc/</loc>
		<lastmod>2022-12-05T22:27:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/12/05/wiper-malware-destroyed-data-of-multiple-russian-government-agencies/</loc>
		<lastmod>2022-12-05T22:42:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/12/06/rackspace-hacked-by-ransomware-gang-via-microsoft-exchange-vulnerability/</loc>
		<lastmod>2022-12-06T23:47:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/12/06/8-security-vulnerabilities-in-sophos-firewall-version-19-5-0/</loc>
		<lastmod>2022-12-07T16:07:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/12/07/patch-this-internet-explorer-zero-day-vulnerability-cve-2022-41128-before-north-korean-hackers-exploit-it/</loc>
		<lastmod>2022-12-07T20:31:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/12/07/zerobot-botnet-can-hack-into-totolink-zyxel-realtek-d-link-f5-huawei-megapix-telesquare-zivif-tenda-hikvision-devices/</loc>
		<lastmod>2022-12-07T20:56:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/12/08/critical-xxs-csrf-vulnerability-allows-full-account-take-over-of-daloradius-app/</loc>
		<lastmod>2022-12-08T19:16:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/12/08/new-json-based-sql-injection-attacks-allow-bypassing-palo-alto-f5-aws-cloudflare-and-imperva-waf/</loc>
		<lastmod>2022-12-08T19:52:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/12/09/how-to-prevent-lockouts-security-tips/</loc>
		<lastmod>2023-08-15T17:10:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/12/09/owasp-publishes-top-10-ci-cd-security-risks-guidelines/</loc>
		<lastmod>2022-12-09T21:36:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/12/09/cisco-ip-phones-7800-and-8800-series-have-a-critical-vulnerability-could-allow-remote-code-execution-or-dos-attack/</loc>
		<lastmod>2022-12-09T22:00:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/12/12/tor-browser-12-0-released-with-major-changes/</loc>
		<lastmod>2022-12-12T16:17:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/12/12/arbitrary-code-execution-flaw-impacts-spring-boot-admin/</loc>
		<lastmod>2022-12-12T16:26:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/12/13/pci-security-standards-council-pci-ssc-releases-pci-secure-software-standard-v1-2/</loc>
		<lastmod>2022-12-13T19:54:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/12/13/critical-zero-day-vulnerability-cve-2022-27518-in-citrix-adc-gateway-exploited-by-state-sponsored-hackers-to-access-business-networks/</loc>
		<lastmod>2022-12-13T20:08:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/12/14/critical-vulnerabilities-affecting-vmware-workspace-one-access-and-identity-manager/</loc>
		<lastmod>2022-12-14T22:51:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/12/14/cisa-recommends-to-patch-these-two-veeam-flaws-that-can-be-exploited-by-a-remote-attacker-who-is-not-authenticated-to-execute-arbitrary-code/</loc>
		<lastmod>2022-12-14T23:11:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/12/15/8-social-media-influencers-arrested-for-using-twitter-discord-to-manipulate-exchange-traded-stocks-and-making-114-million/</loc>
		<lastmod>2022-12-15T20:26:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/12/15/australian-telecom-company-tpg-hacked-as-threat-actor-got-access-to-a-server-that-hosts-the-email-accounts-of-15000-clients/</loc>
		<lastmod>2022-12-15T20:36:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/12/16/exploit-code-for-remotely-executing-code-on-victim-device-exploiting-foxit-pdf-reader-vulnerability/</loc>
		<lastmod>2022-12-16T19:14:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/12/16/biggest-electricity-water-and-gas-company-in-colombia-empresas-publicas-de-medellin-epm-suffers-ransomware-attack/</loc>
		<lastmod>2022-12-16T19:51:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/12/19/corporate-data-privacy-whos-responsibility-is-it/</loc>
		<lastmod>2023-08-15T17:10:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/12/19/5-advantages-of-a-reliable-next-gen-siem-platform/</loc>
		<lastmod>2023-08-15T17:10:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/12/19/4-critical-vulnerabilities-in-samba-patch-immediately/</loc>
		<lastmod>2022-12-20T00:28:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/12/19/ransomware-attack-shuts-down-operations-of-firefighters-at-85-australian-fire-stations/</loc>
		<lastmod>2022-12-20T00:41:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/12/20/be-careful-of-risepro-malware-a-new-version-of-vidar-infostealer/</loc>
		<lastmod>2022-12-21T00:18:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/12/20/scammer-behind-the-onecoin-cryptocurrency-pyramid-scheme-which-included-several-billions-of-dollars-pleads-guilty/</loc>
		<lastmod>2023-08-15T17:11:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/12/21/the-worst-passwords-you-should-never-use-for-your-accounts/</loc>
		<lastmod>2023-05-04T19:09:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/12/21/new-microsoft-exchange-exploit-allows-ransomware-infection-via-proxynotshell-vulnerability/</loc>
		<lastmod>2022-12-21T22:38:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/12/21/electric-automaker-nio-hacked-ransomware-operators-are-demanding-bitcoin-worth-2-25-million-for-not-leaking-customer-data/</loc>
		<lastmod>2022-12-21T22:48:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/12/22/customers-of-comcast-xfinity-accounts-getting-hacked-despite-having-2fa-enabled/</loc>
		<lastmod>2022-12-23T00:33:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/12/22/lastpass-the-worlds-most-popular-password-manager-admits-it-leaked-customers-usernames-and-passwords/</loc>
		<lastmod>2022-12-23T00:46:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/12/23/exploit-code-for-splunk-vulnerability-published-allows-remote-code-execution-on-the-system/</loc>
		<lastmod>2022-12-23T22:00:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/12/23/christmas-casino-heist-betmgm-hacked-data-of-1-57-million-gamblers-leaked-while-data-of-68000-draftkings-customers-also-hacked/</loc>
		<lastmod>2022-12-23T23:02:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/12/26/linux-kernel-has-a-remote-code-execution-zero-day-vulnerability-with-cvss-score-of-10/</loc>
		<lastmod>2022-12-26T17:32:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/12/26/zerobot-botnet-can-now-hack-into-apache-apache-spark-servers/</loc>
		<lastmod>2022-12-26T18:30:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/12/27/how-to-spy-on-phone-calls-via-sensors-like-accelerometer-gyroscope-using-new-attack-technique-earspy/</loc>
		<lastmod>2022-12-27T19:53:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/12/27/new-attack-technique-uses-iso-and-vhd-file-formats-to-bypass-windows-motw-security/</loc>
		<lastmod>2022-12-27T20:27:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/12/28/hacking-nintendo-switch-3ds-and-wii-console-vulnerability-allows-hacking-remote-console-by-simply-engaging-in-an-online-gaming-session-with-the-victim/</loc>
		<lastmod>2022-12-28T21:42:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/12/28/data-on-270000-patients-was-stolen-from-the-medical-hospital-in-louisiana-by-ransomware-cybercriminals/</loc>
		<lastmod>2022-12-28T22:12:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/12/28/what-exactly-is-social-engineering-and-how-can-you-safeguard-yourself-from-becoming-a-victim-of-it/</loc>
		<lastmod>2022-12-28T22:24:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/12/29/web3-and-the-changes-it-brings-to-e-commerce/</loc>
		<lastmod>2023-08-15T17:11:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/12/29/how-to-change-the-ios-font-without-jailbreak/</loc>
		<lastmod>2022-12-29T21:10:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/12/29/azov-ransomware-can-modify-its-own-code-to-delete-every-single-file-on-a-machine-with-a-single-click/</loc>
		<lastmod>2022-12-29T22:55:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/12/30/a-comprehensive-guide-to-the-role-of-investment-banking-in-a-corporation/</loc>
		<lastmod>2023-08-15T17:11:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/12/30/shark-tank-star-kevin-olearys-twitter-account-hacked-to-promote-a-bitcoin-scam/</loc>
		<lastmod>2022-12-30T21:36:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2022/12/30/ransomware-attack-stalls-operations-of-big-mining-company/</loc>
		<lastmod>2022-12-30T22:03:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/01/01/7-cybersecurity-predictions-trends-for-2023/</loc>
		<lastmod>2022-12-30T22:29:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/01/02/google-agrees-to-pay-29-5-million-to-settle-lawsuits-regarding-the-tracking-of-users-locations/</loc>
		<lastmod>2023-01-03T00:31:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/01/02/a-beginners-guide-to-mitre-attck-framework/</loc>
		<lastmod>2023-01-03T01:09:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/01/03/key-components-to-add-to-your-sales-playbook/</loc>
		<lastmod>2023-08-15T17:13:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/01/03/new-technique-of-hacking-android-pin-iphone-passcode-exploits-phone-sensor-data/</loc>
		<lastmod>2023-01-03T22:11:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/01/03/pii-of-more-than-200-million-deezer-users-from-10-countries-was-hacked-and-published/</loc>
		<lastmod>2023-01-03T22:32:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/01/04/why-sportsbook-security-should-be-your-no-1-priority/</loc>
		<lastmod>2023-08-15T17:14:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/01/04/researchers-break-rsa-algorithm-with-a-quantum-computer/</loc>
		<lastmod>2023-01-05T00:21:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/01/04/api-vulnerabilities-leaked-clients-data-of-bmw-roll-royce-mercedes-benz-ferrari-porsche-jaguar-land-rover-ford-kia-honda-infiniti-nissan-acura-hyundai-toyota-and-genesis/</loc>
		<lastmod>2023-01-05T01:21:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/01/05/now-you-can-set-up-a-proxy-server-to-connect-to-whatsapp-if-its-blocked-in-a-country/</loc>
		<lastmod>2023-01-05T23:27:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/01/05/ransomware-gangs-are-exploiting-fortinet-devices-vulnerabilities-patch-these-high-severity-command-injection/</loc>
		<lastmod>2023-01-05T23:41:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/01/05/slack-hacked-confidential-code-repositories-breached/</loc>
		<lastmod>2023-01-06T00:02:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/01/06/free-decryptor-for-megacortex-ransomware-released/</loc>
		<lastmod>2023-01-06T21:07:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/01/06/just-few-malicious-packets-allow-to-take-control-of-centos-web-panel-7-servers-exploit-poc-for-rce-flaw-published/</loc>
		<lastmod>2023-01-06T21:24:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/01/09/3-different-ways-cyber-criminals-are-using-chatgpt-to-conduct-new-cyber-attacks/</loc>
		<lastmod>2023-01-09T23:24:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/01/09/air-france-and-klm-airlines-hacked-customers-pii-leaked/</loc>
		<lastmod>2023-01-09T23:34:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/01/10/san-francisco-transit-police-confidential-data-leaked-by-ransomware-gang/</loc>
		<lastmod>2023-01-10T22:52:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/01/10/what-happens-on-your-iphone-never-stays-on-your-iphone-new-privacy-lawsuit-against-apple-for-monitoring-iphone-users/</loc>
		<lastmod>2023-01-11T00:17:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/01/11/critical-zero-day-vulnerability-in-linux-kernel-allows-dos-attack/</loc>
		<lastmod>2023-01-11T22:58:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/01/11/more-than-500000-products-have-been-left-stranded-in-warehouses-as-a-result-of-the-cyber-attack-on-royal-mail/</loc>
		<lastmod>2023-01-11T23:10:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/01/11/personal-data-of-australian-firefighters-leaked-in-dark-web-by-ransomware-gang/</loc>
		<lastmod>2023-01-12T00:23:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/01/12/cryptocurrency-users-are-becoming-victim-of-address-poisoning-attacks/</loc>
		<lastmod>2023-01-13T00:05:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/01/12/download-free-the-last-of-us-pc-game-in-exchange-of-your-personal-data/</loc>
		<lastmod>2023-01-13T00:12:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/01/13/exploit-code-to-hack-lexmark-printers-and-photocopiers-published-uses-zero-day-vulnerabilities/</loc>
		<lastmod>2023-01-13T21:39:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/01/13/this-flaw-in-google-chrome-chromium-based-browsers-enabled-data-theft-of-information-such-as-cryptocurrency-wallets-and-credentials-from-over-2-5-billion-users/</loc>
		<lastmod>2023-01-13T21:47:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/01/16/cellebrite-ufed-and-msab-mobile-forensics-hacking-tool-source-code-leaked-by-hacktivista/</loc>
		<lastmod>2023-01-16T23:59:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/01/16/over-17-million-dollars-in-compensation-will-be-been-paid-out-to-victims-of-crypto-fraud/</loc>
		<lastmod>2023-01-17T00:07:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/01/16/a-new-privilege-escalation-vulnerability-in-the-linux-kernel-enables-a-local-attacker-to-execute-malware-on-vulnerable-systems/</loc>
		<lastmod>2023-01-17T00:21:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/01/17/nissan-data-breach-leaks-customers-full-names-dates-of-birth-nissan-finance-account-number/</loc>
		<lastmod>2023-01-17T23:04:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/01/17/four-server-side-request-forgery-ssrf-vulnerabilities-impacting-different-azure-services/</loc>
		<lastmod>2023-01-18T00:22:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/01/18/how-to-improve-your-cybersecurity-knowledge/</loc>
		<lastmod>2023-08-15T17:14:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/01/18/4-critical-bios-vulnerabilities-affect-dell-laptops-like-alienware-inspiron-vostro-models/</loc>
		<lastmod>2023-01-19T00:00:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/01/18/mailchimp-hacked-again-in-6-months-one-more-reason-of-not-using-mailchimp-email-marketing-platform/</loc>
		<lastmod>2023-01-19T01:13:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/01/19/a-credential-stuffing-attack-exposed-names-addresses-social-security-numbers-tax-numbers-dob-of-35000-paypal-accounts/</loc>
		<lastmod>2023-01-19T22:48:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/01/19/sudo-has-a-high-severity-vulnerability-that-low-privilege-attackers-might-exploit-to-get-root-access/</loc>
		<lastmod>2023-01-20T00:19:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/01/20/this-new-android-malware-allows-to-hack-spy-on-any-android-phone/</loc>
		<lastmod>2023-01-20T21:01:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/01/20/exploit-code-for-manageengine-rce-flaw-published-patch-immediately/</loc>
		<lastmod>2023-01-20T21:15:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/01/23/critical-aws-cloudtrail-vulnerability-allowed-attackers-to-circumvent-cloudtrail-guardduty-logging/</loc>
		<lastmod>2023-01-23T21:22:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/01/23/densepose-new-technique-allows-using-normal-home-wi-fi-routers-to-see-through-walls-like-x-ray/</loc>
		<lastmod>2023-01-23T22:32:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/01/24/4-important-vulnerabilities-patched-in-vmware-vrealize-log-insight/</loc>
		<lastmod>2023-01-24T22:47:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/01/24/central-pro-join-me-hamachi-and-remotelyanywhere-services-encrypted-backups-and-keys-hacked/</loc>
		<lastmod>2023-01-24T23:59:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/01/25/what-makes-erp-the-most-comprehensive-tool-for-enterprises/</loc>
		<lastmod>2023-08-15T17:15:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/01/25/new-kind-of-phishing-attacks-are-exploiting-microsoft-onenote-to-bypass-disabled-macro/</loc>
		<lastmod>2023-01-25T22:07:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/01/25/realtek-sdk-vulnerability-exploited-to-hack-into-190-models-of-iot-devices-from-66-manufacturers/</loc>
		<lastmod>2023-01-25T22:31:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/01/26/2-critical-vulnerabilities-in-argo-cd-allow-complete-take-over-of-your-kubernetes/</loc>
		<lastmod>2023-01-26T21:26:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/01/26/hackers-could-take-control-of-lexmark-printers-or-see-what-you-print-if-you-dont-apply-this-patch/</loc>
		<lastmod>2023-01-26T21:46:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/01/26/hacker-sold-personal-data-of-whole-population-of-austria/</loc>
		<lastmod>2023-01-26T23:23:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/01/27/3-steps-to-choosing-the-best-possible-data-room-solution-for-your-business-needs/</loc>
		<lastmod>2023-08-15T17:15:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/01/27/finally-hawaii-makes-it-illegal-to-hack-road-signs/</loc>
		<lastmod>2023-01-27T21:25:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/01/27/german-airport-and-companies-attacked-by-russian-hackers/</loc>
		<lastmod>2023-01-27T22:43:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/01/30/github-hacked-again-github-desktop-and-atom-repositories-certificates-stolen/</loc>
		<lastmod>2023-01-30T22:26:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/01/30/hacker-group-hacks-in-israeli-chemical-factories/</loc>
		<lastmod>2023-01-30T22:59:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/01/31/prilex-pos-malware-modified-to-steal-data-from-nfc-cards/</loc>
		<lastmod>2023-01-31T22:31:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/01/31/hackers-gained-access-to-o365-email-accounts-by-using-oauth-applications-certified-by-microsoft/</loc>
		<lastmod>2023-02-01T00:41:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/02/01/deadbolt-ransomware-could-encrypt-thousands-of-vulnerable-qnap-nas-devices-patch-yours-asap/</loc>
		<lastmod>2023-02-01T22:30:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/02/01/lockbit-ransomware-attacks-halts-global-trading-of-financial-derivatives-on-international-markets/</loc>
		<lastmod>2023-02-01T23:01:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/02/02/the-top-eight-ways-schools-can-improve-their-cybersecurity-in-2023/</loc>
		<lastmod>2023-11-24T14:10:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/02/02/this-f5-big-ip-vulnerability-makes-it-easier-for-ransomware-to-encrypt-networks-devices/</loc>
		<lastmod>2023-02-02T22:46:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/02/02/majority-of-the-ransomware-gangs-used-this-packer-to-bypass-antivirus-and-encrypt-devices/</loc>
		<lastmod>2023-02-02T23:24:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/02/03/is-the-ringing-phone-your-friend-a-brief-look-at-call-spoofing/</loc>
		<lastmod>2023-08-15T17:15:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/02/03/critical-vulnerability-in-jira-software-can-allow-an-attacker-to-impersonate-another-user/</loc>
		<lastmod>2023-02-03T21:52:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/02/03/vice-media-hacked-confidential-data-leaked/</loc>
		<lastmod>2023-02-03T23:27:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/02/08/critical-xss-flaw-in-phpmyadmin-allows-malicious-database-operations/</loc>
		<lastmod>2023-02-08T19:11:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/02/08/how-to-easily-recover-keys-of-esxiargs-ransomware-affecting-vmwares-esxi-servers/</loc>
		<lastmod>2023-02-08T19:21:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/02/10/reddit-hacked-again-confidential-data-leaked/</loc>
		<lastmod>2023-02-10T19:59:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/02/13/the-growing-importance-of-data-governance-tools/</loc>
		<lastmod>2023-08-15T17:16:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/02/13/691-malicious-npm-packages-and-49-pypi-components-containing-crypto-miners-remote-access-trojans-discovered/</loc>
		<lastmod>2023-02-13T19:51:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/02/13/international-criminal-gang-dismantled-that-defrauded-more-than-5000000-euros-via-cyber-scams/</loc>
		<lastmod>2023-02-13T20:14:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/02/17/critical-vulnerabilities-in-fortinac-and-fortiweb-products/</loc>
		<lastmod>2023-02-17T18:45:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/02/17/atlassian-breached-companys-confidential-and-employee-data-leaked/</loc>
		<lastmod>2023-02-17T19:08:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/02/17/cybercriminals-hack-fbi-computer-networks/</loc>
		<lastmod>2023-02-17T19:37:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/02/20/why-godaddy-hack-makes-it-the-most-insecure-hosting-provider/</loc>
		<lastmod>2023-02-20T19:04:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/02/27/hacker-leak-confidential-data-of-call-of-duty-parent-company-activision-blizzard/</loc>
		<lastmod>2023-02-27T23:12:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/02/27/hackers-had-control-of-dow-jones-fox-news-the-sun-and-marketwatch-companies-networks-for-2-years/</loc>
		<lastmod>2023-02-27T23:25:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/02/27/us-extradites-russian-hacker-accused-of-creating-password-cracking-software/</loc>
		<lastmod>2023-02-28T00:06:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/02/28/how-conversational-ai-chatbots-are-revolutionizing-customer-service/</loc>
		<lastmod>2023-08-15T17:16:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/02/28/lastpass-hack-shows-why-devops-security-is-so-important/</loc>
		<lastmod>2023-02-28T22:51:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/02/28/decrypt-mortalkombat-ransomware-encrypted-files-for-free/</loc>
		<lastmod>2023-03-01T00:11:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/03/01/high-severity-vulnerability-in-sudo-that-allows-root-access-finally-patch/</loc>
		<lastmod>2023-03-02T01:00:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/03/01/this-new-uefi-bootkit-malware-of-size-80-kb-can-hack-patched-windows-11-10-machine-with-av/</loc>
		<lastmod>2023-03-02T01:24:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/03/02/uk-retailer-wh-smith-hacked-confidential-data-leaked/</loc>
		<lastmod>2023-03-02T16:17:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/03/02/decider-an-open-source-tool-that-helps-to-generate-mitre-attck-mapping-reports/</loc>
		<lastmod>2023-03-02T16:39:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/03/03/how-to-detect-and-prevent-royal-ransomware-attack/</loc>
		<lastmod>2023-03-03T20:33:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/03/06/one-of-the-top-hospital-in-spain-becomes-victim-of-ransomhouse-ransomware/</loc>
		<lastmod>2023-03-06T22:26:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/03/06/doppelpaymer-ransomware-gang-shuts-down-members-arrested-by-police/</loc>
		<lastmod>2023-03-06T22:38:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/03/07/acer-the-computer-manufacturing-giant-hacked-again/</loc>
		<lastmod>2023-03-07T21:47:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/03/07/shein-android-app-intentionally-copied-100-million-peoples-clipboard-content/</loc>
		<lastmod>2023-03-07T22:12:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/03/08/critical-vulnerability-in-veeam-backup-software-leaks-credentials-and-allows-backup-deletion/</loc>
		<lastmod>2023-03-08T22:49:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/03/08/new-infostealer-malware-s1ideload-infects-systems-of-government-manufacturing-companies/</loc>
		<lastmod>2023-03-08T23:46:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/03/10/data-backup-cyber-security-company-acronis-hacked/</loc>
		<lastmod>2023-03-10T22:19:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/03/10/blackbaud-a-cloud-software-provider-fined-3-million-for-failing-to-notify-customers-of-a-ransomware-attack/</loc>
		<lastmod>2023-03-10T22:28:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/03/13/10-things-to-know-about-the-dark-web-youll-be-surprised/</loc>
		<lastmod>2023-08-15T17:16:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/03/13/busted-netwire-malware-infrastructure-used-to-illegally-steal-data-from-computers-seized/</loc>
		<lastmod>2023-03-14T00:00:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/03/13/two-very-critical-vulnerabilities-patched-in-new-apache-http-server-update/</loc>
		<lastmod>2023-03-14T00:11:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/03/14/critical-vulnerabilities-in-sap-with-cvss-score-9-5/</loc>
		<lastmod>2023-03-14T22:54:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/03/15/new-cryptojacking-malware-can-hack-in-kubernetes-clusters-using-this-easy-trick/</loc>
		<lastmod>2023-03-16T00:25:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/03/16/the-benefits-of-business-financial-modeling-for-your-company/</loc>
		<lastmod>2023-08-15T17:16:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/03/16/zero-day-vulnerabilities-in-exynos-chipset-allow-hacking-samsung-vivo-and-pixel-phones/</loc>
		<lastmod>2023-03-16T23:04:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/03/17/the-new-black-version-of-lockbit-ransomware-is-even-more-destructive-and-difficult-to-detect/</loc>
		<lastmod>2023-03-17T23:40:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/03/21/top-ways-to-learn-more-about-cybersecurity/</loc>
		<lastmod>2023-08-15T17:16:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/03/21/how-cryptocurrency-atm-manufacturer-was-hacked-and-millions-of-funds-were-stolen/</loc>
		<lastmod>2023-03-21T18:59:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/03/21/why-famous-cyber-criminal-forum-breach-forums-has-been-closed-down-forever/</loc>
		<lastmod>2023-03-21T19:33:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/03/22/apache-tomcat-vulnerability-leaks-application-session-cookie-to-attackers/</loc>
		<lastmod>2023-03-22T20:53:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/03/22/mispadu-banking-trojan-is-stealing-millions-from-victims-in-chile-mexico-peru-and-portugal/</loc>
		<lastmod>2023-03-22T22:22:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/03/23/5-best-practices-for-securing-identity-and-access-management-iam-systems/</loc>
		<lastmod>2023-03-24T00:02:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/03/24/consumers-are-switching-from-big-name-portals-to-safeguard-their-personal-and-budget-information/</loc>
		<lastmod>2023-08-15T17:17:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/03/24/woocommerces-serious-vulnerability-allows-unauthorized-wordpress-website-takeover/</loc>
		<lastmod>2023-03-24T22:45:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/03/24/best-open-source-tool-for-cyber-incident-detection-in-microsoft-azure-azure-active-directory-and-microsoft-365/</loc>
		<lastmod>2023-03-24T23:31:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/03/24/the-growing-need-for-cyber-security-experts-why-theyre-in-high-demand/</loc>
		<lastmod>2023-08-15T17:17:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/03/27/twitters-source-code-leaked-on-github-revealing-proprietary-information-and-security-flaws/</loc>
		<lastmod>2023-03-28T00:06:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/03/27/hacking-phones-remotely-without-touching-via-new-inaudible-ultrasound-attack/</loc>
		<lastmod>2023-03-28T00:28:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/03/28/hacking-wpa1-wpa2-and-wpa3-using-802-11-wi-fi-standard-vulnerability/</loc>
		<lastmod>2023-03-28T23:16:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/03/29/fourth-largest-generic-pharmaceutical-company-warns-of-revenue-loss-after-big-ransomware-attack/</loc>
		<lastmod>2023-03-29T22:56:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/03/29/australian-casino-giant-crown-resorts-becomes-victim-of-ransomware-via-goanywhere-flaw/</loc>
		<lastmod>2023-03-29T23:10:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/03/30/600000-companies-networks-using-3cx-voip-software-infected-with-malware-biggest-supply-chain-attack/</loc>
		<lastmod>2023-03-30T23:59:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/03/30/critical-samba-vulnerabilities-easily-allow-hacking-of-servers/</loc>
		<lastmod>2023-03-31T00:19:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/03/31/d3dcompiler_47-dll-if-av-raises-an-alerts-about-this-microsoft-signed-dll-file-you-are-in-trouble/</loc>
		<lastmod>2023-03-31T21:10:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/04/03/western-digital-sandisk-company-hacked-company-loses-control-of-its-networks/</loc>
		<lastmod>2023-04-03T20:48:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/04/03/i-think-someone-is-spying-me-using-airtag-what-should-i-do/</loc>
		<lastmod>2023-04-03T22:16:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/04/04/genesis-market-one-of-biggest-identity-theft-platforms-in-darkweb-hacked-by-fbi/</loc>
		<lastmod>2023-04-05T00:12:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/04/04/how-to-create-undetectable-malware-via-chatgpt-in-7-easy-steps-bypassing-its-restrictions/</loc>
		<lastmod>2023-04-05T01:38:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/04/05/most-dangerous-spanish-hacker-arrested-because-of-his-stupidity/</loc>
		<lastmod>2023-04-05T22:57:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/04/07/two-actively-exploited-0-day-vulnerabilities-can-be-used-to-hack-iphones-and-ipads/</loc>
		<lastmod>2023-04-07T21:11:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/04/07/computer-hardware-company-msi-hacked-bios-source-code-and-private-keys-stolen/</loc>
		<lastmod>2023-04-07T21:19:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/04/10/russian-hacker-group-killnet-leaks-confidential-data-of-nato-members/</loc>
		<lastmod>2023-04-10T23:47:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/04/10/uber-gave-sensitive-driver-data-to-a-law-firm-for-legal-actions-but-the-law-firm-leaked-all-the-data/</loc>
		<lastmod>2023-04-10T23:55:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/04/11/new-spyware-quadream-is-replacement-of-pegasus-software-used-to-hack-iphones-remotely/</loc>
		<lastmod>2023-04-11T22:36:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/04/11/critical-flaw-in-azure-storage-account-keys-design-could-allow-easy-hack/</loc>
		<lastmod>2023-04-12T00:44:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/04/12/very-critical-vulnerabilities-in-sap-with-cvss-score-of-10/</loc>
		<lastmod>2023-04-12T22:33:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/04/12/one-again-hyundai-and-toyota-leak-customer-personal-data/</loc>
		<lastmod>2023-04-12T23:01:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/04/14/everused-raidforums-you-are-in-trouble-as-police-is-contacting-users-for-their-illegal-activity/</loc>
		<lastmod>2023-04-14T20:04:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/04/14/how-people-are-hacking-stealing-lime-e-bikes-and-scooters-to-convert-them-to-personal-bikes/</loc>
		<lastmod>2023-04-14T20:27:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/04/17/payments-company-ncr-hacked-by-a-ransomware-gang-is-now-negotiating-with-the-hackers/</loc>
		<lastmod>2023-04-17T23:28:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/04/17/google-sheets-drive-traffic-along-with-this-process-in-your-network-means-your-are-hacked/</loc>
		<lastmod>2023-04-18T01:00:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/04/18/how-it-impacts-the-seo-and-digital-marketing-industries/</loc>
		<lastmod>2023-08-15T17:17:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/04/18/how-businesses-owners-can-invest-in-cybersecurity/</loc>
		<lastmod>2023-08-15T17:17:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/04/18/uk-government-new-bill-proposes-to-remove-encryption-from-whatsapp-and-signal/</loc>
		<lastmod>2023-04-18T22:19:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/04/18/the-new-lockbit-ransomware-for-macos-sounds-scary-but-its-code-is-so-dumb/</loc>
		<lastmod>2023-04-18T23:48:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/04/19/dangerous-0-day-vulnerability-in-google-chrome-cve-2023-213/</loc>
		<lastmod>2023-04-20T02:16:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/04/19/how-to-use-bring-your-own-vulnerable-driver-byovd-technique-to-kill-evade-antivirus-or-edr/</loc>
		<lastmod>2023-04-20T01:55:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/04/20/from-data-insights-to-automation-how-third-party-apps-can-change-your-ecommerce/</loc>
		<lastmod>2023-08-15T17:05:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/04/20/anyone-can-hack-into-vmware-aria-log-operations-servers-using-these-vulnerabilities/</loc>
		<lastmod>2023-04-20T22:37:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/04/20/found-grixba-vss-copying-tools-in-network-means-your-network-will-be-hacked-soon-by-ransomware/</loc>
		<lastmod>2023-04-20T22:55:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/04/21/rbac-buster-a-new-k8s-attack-technique-to-hack-in-kubernetes-cluster/</loc>
		<lastmod>2023-04-21T21:22:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/04/22/new-research-proves-that-code-generated-by-chatgpt-is-full-of-vulnerabilities/</loc>
		<lastmod>2023-04-22T02:46:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/04/24/exploit-to-hack-100-million-users-from-70000-companies-using-printer-software-published/</loc>
		<lastmod>2023-04-25T00:04:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/04/24/new-famous-all-in-one-malware-and-hacking-tool-among-cyber-criminals-evilextractor/</loc>
		<lastmod>2023-04-25T00:23:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/04/25/think-twice-before-buying-tp-link-archer-ax21-wi-fi-router-it-can-be-hacked-easily/</loc>
		<lastmod>2023-04-25T22:36:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/04/25/how-a-european-space-agency-esa-satellite-got-hacked/</loc>
		<lastmod>2023-04-26T00:13:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/04/26/how-trafficstealer-utility-allows-anyone-to-earn-money-via-vulnerable-docker-containers/</loc>
		<lastmod>2023-04-26T22:57:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/04/26/traffic-to-south-african-military-websites-from-linux-server-infection-symptom-of-pingpull-malware/</loc>
		<lastmod>2023-04-26T23:44:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/04/27/you-dont-have-to-be-a-super-hacker-to-hack-into-milliones-of-websites-this-cpanel-flaw-makes-it-easy-for-anyone/</loc>
		<lastmod>2023-04-27T22:37:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/04/27/coca-cola-hacked-again-becomes-victim-of-cyber-attack-in-mexico/</loc>
		<lastmod>2023-04-27T22:56:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/04/28/hacking-and-modifying-patients-dna-rna-sequence-becomes-easy-with-these-vulnerabilities/</loc>
		<lastmod>2023-04-28T23:28:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/04/28/just-for-1000-per-month-hack-macos-computers-with-this-undetectable-malware/</loc>
		<lastmod>2023-04-29T00:36:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/05/01/work-at-germany-hospitals-and-pharmacies-slow-down-as-big-it-service-provider-hacked-again/</loc>
		<lastmod>2023-05-01T22:05:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/05/02/bought-drugs-from-darkweb-then-you-are-in-big-trouble-as-europol-is-able-to-trace-transactions/</loc>
		<lastmod>2023-05-02T23:31:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/05/02/bgp-boofuzzer-new-tool-to-find-vulnerabilities-in-bgp-implementation/</loc>
		<lastmod>2023-05-02T23:47:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/05/03/5-ways-to-make-your-company-website-more-secure/</loc>
		<lastmod>2023-05-04T18:53:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/05/03/insurance-companies-cant-deny-ransomware-attack-payment-citing-acts-of-war-clause/</loc>
		<lastmod>2023-05-03T22:41:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/05/03/installed-chatgpt-or-similar-ai-app-in-your-device-surely-your-data-was-hacked-by-fake-ai/</loc>
		<lastmod>2023-05-04T00:49:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/05/04/new-way-to-hack-millions-of-users-using-papercut-printer-software/</loc>
		<lastmod>2023-05-05T00:46:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/05/05/easily-hack-into-azure-internal-workloads-api-using-azure-api-management-service-flaws/</loc>
		<lastmod>2023-05-05T01:14:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/05/05/reconshark-new-undetectable-reconnaissance-tool-used-by-cybercriminals-for-hacking/</loc>
		<lastmod>2023-05-05T21:58:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/05/08/shielding-your-privacy-how-a-vpn-can-help-keep-your-data-safe/</loc>
		<lastmod>2023-08-15T17:18:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/05/08/these-57-msi-laptop-models-are-insecure-as-intel-boot-guard-cant-protect-it-from-uefi-attacks/</loc>
		<lastmod>2023-05-08T22:50:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/05/09/web-browser-security-features-what-makes-it-safe/</loc>
		<lastmod>2023-08-15T17:18:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/05/09/how-to-secure-containers-images-with-open-source-bazel-tool-plugin-rules_oci-from-google/</loc>
		<lastmod>2023-05-09T00:55:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/05/09/how-to-detect-most-advance-russian-fsb-malware-snake-in-your-network/</loc>
		<lastmod>2023-05-09T22:43:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/05/10/easily-get-root-user-privileges-in-linux-6-3-1-using-this-vulnerability-via-exploit-code/</loc>
		<lastmod>2023-05-10T00:18:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/05/11/hack-into-outlook-email-accounts-with-just-a-music-wav-file/</loc>
		<lastmod>2023-05-11T22:48:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/05/12/using-netgears-nighthawk-rax30-router-hackers-can-see-what-you-do-on-internet/</loc>
		<lastmod>2023-05-12T01:02:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/05/12/worst-car-company-award-in-terms-of-data-security-goes-to-toyota-after-leaking-data-of-millions-of-customers-for-10-years/</loc>
		<lastmod>2023-05-12T21:45:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/05/15/discord-hacked-reset-your-passwords/</loc>
		<lastmod>2023-05-15T23:23:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/05/16/hack-keepass-extract-keepass-master-password-from-memory-using-this-tool/</loc>
		<lastmod>2023-05-16T00:18:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.securitynewspaper.com/2023/05/16/cinepolis-hacked-8-movie-theaters-screen-go-black-suddenly/</loc>
		<lastmod>2023-05-16T22:34:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
</urlset><!-- <p>Please edit wp-db.inc.php in wp-includes and set SAVEQUERIES to true if you want to see the queries.</p> --> <!-- Request ID: 583aabf81c7c6efe13b6e9a570b02964; Queries for sitemap: 2; Total queries: 51; Seconds: 0.21; Memory for sitemap: 2MB; Total memory: 16MB -->
