<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//www.infosectrain.com/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://www.infosectrain.com/news</loc>
		<lastmod>2026-04-24T05:00:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/106-people-linked-to-italian-mafia-arrested-by-europol</loc>
		<lastmod>2021-11-22T11:24:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/11/arrested_by_Europol.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/11/arrested_by_Europol.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/ransomware-fin12-is-now-in-europe</loc>
		<lastmod>2021-11-22T11:28:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/11/ransomware.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/11/ransomware.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/intimate-photos-of-icloud-users-stolen-by-hackers</loc>
		<lastmod>2021-11-22T11:33:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/11/hackers.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/11/hackers.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/microsoft-has-fixed-an-azure-bug-azurescape-that-allows-attackers-to-take-control-of-azure-container-instances</loc>
		<lastmod>2021-11-24T07:59:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/11/Microsoft-has-fixed.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/11/Microsoft-has-fixed.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/tech-giant-mcafee-likely-to-be-purchased-by-investor-group-for-14-bn</loc>
		<lastmod>2021-11-24T08:09:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/11/Tech-Giant-McAfee.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/11/Tech-Giant-McAfee.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/chinese-cyber-spies-in-afghanistan</loc>
		<lastmod>2021-11-24T08:18:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/11/Chinese-Cyber-Spies.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/11/Chinese-Cyber-Spies.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/the-fbis-email-system-was-hacked-and-fake-cybersecurity-alerts-were-sent-out-to-thousands</loc>
		<lastmod>2021-11-24T08:26:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/11/email-system.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/11/email-system.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/enjoy-a-passwordless-entry-to-your-microsoft-account</loc>
		<lastmod>2021-11-24T08:31:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/11/Passwordless.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/11/Passwordless.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/mega-security-update-from-microsoft-after-major-bug-fixes</loc>
		<lastmod>2021-11-24T08:34:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/11/Security-Update.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/11/Security-Update.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/facebook-claims-that-hackers-in-pakistan-targeted-afghan-users-as-the-countrys-leadership-crumbled</loc>
		<lastmod>2021-11-24T08:47:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/11/Facebook-claims.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/11/Facebook-claims.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/the-redcurl-corporate-espionage-hackers-are-back-with-new-hacking-tools</loc>
		<lastmod>2021-11-25T05:12:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/11/RedCurl-Corporate.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/11/RedCurl-Corporate.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/passwords-for-500000-fortinet-vpn-accounts-leaked-by-hackers</loc>
		<lastmod>2021-11-25T05:16:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/11/VPN-Accounts-Leaked.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/11/VPN-Accounts-Leaked.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/malware-from-a-new-family-uses-common-log-files-systems-to-dodge-identification</loc>
		<lastmod>2021-11-25T05:21:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/11/Malware.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/11/Malware.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/authorities-in-romania-arrests-members-of-the-revil-ransomware-raas-family</loc>
		<lastmod>2021-12-02T11:54:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/Romania-Arrests.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/Romania-Arrests.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/alibaba-cloud-servers-hacked-for-crypto-mining</loc>
		<lastmod>2021-12-02T11:56:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/Alibaba-Cloud.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/Alibaba-Cloud.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/hackers-used-the-widely-used-billquick-billing-software-to-deploy-ransomware</loc>
		<lastmod>2021-12-02T11:59:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/BillQuick-billing.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/BillQuick-billing.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/wordpress-servers-are-the-latest-targets-for-new-cryptocurrency-ransomware</loc>
		<lastmod>2021-12-02T12:02:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/cryptocurrency.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/cryptocurrency.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/thousands-of-online-gaming-accounts-have-been-compromised-as-a-result-of-a-huge-cyberattack</loc>
		<lastmod>2021-12-03T03:56:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/Cyberattack.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/Cyberattack.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/revil-is-responsible-for-a-major-part-of-ransomware-assaults-in-q2-2021</loc>
		<lastmod>2021-12-03T03:58:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/REvil-is-Responsible.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/REvil-is-Responsible.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/google-issues-50000-warnings-to-customers-about-state-sponsored-attacks</loc>
		<lastmod>2021-12-03T04:02:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/Google-Issues-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/Google-Issues-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/a-quest-owned-ivf-clinic-has-announced-ransomware-attacks</loc>
		<lastmod>2021-12-03T04:04:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/IVF-clinic.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/IVF-clinic.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/microsoft-has-discovered-a-second-solarwinds-style-attack-conducted-by-russian-hackers</loc>
		<lastmod>2021-12-03T04:08:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/Russian-Hackers.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/Russian-Hackers.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/the-cring-ransomware-continues-its-assault-on-industrial-businesses</loc>
		<lastmod>2021-12-06T04:03:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/Industrial-Businesses.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/Industrial-Businesses.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/microsoft-says-html-smuggling-attacks-on-the-rise</loc>
		<lastmod>2021-12-06T04:08:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/HTML-Smuggling.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/HTML-Smuggling.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/this-sneaky-trick-can-help-attackers-smuggle-malware-into-networks</loc>
		<lastmod>2021-12-06T04:10:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/Attackers-Smuggle.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/Attackers-Smuggle.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/worst-passwords-ever</loc>
		<lastmod>2021-12-06T04:13:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/Worst-passwords.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/Worst-passwords.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/americans-lives-are-at-risk-by-cyber-officials</loc>
		<lastmod>2021-12-06T04:18:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/Americans.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/Americans.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/the-indian-supreme-court-is-now-concentrating-on-the-pegasus-virus</loc>
		<lastmod>2021-12-07T04:18:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/pegasus-virus.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/pegasus-virus.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/best-endpoint-detection-and-response-products-in-the-market</loc>
		<lastmod>2021-12-07T04:21:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/Best-endpoint-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/Best-endpoint-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/new-malware-on-old-linux</loc>
		<lastmod>2021-12-07T04:23:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/old-Linux.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/old-Linux.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/hack-my-wifes-phone-by-dubai-ruler</loc>
		<lastmod>2021-12-07T04:24:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/Dubai-ruler.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/Dubai-ruler.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/microsoft-azure-virtual-machines-were-used-to-infect-users-with-botnet-malware</loc>
		<lastmod>2021-12-08T04:18:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/19-Botnet-Malware.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/19-Botnet-Malware.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/the-arrest-of-ransomware-gang-in-ukraine</loc>
		<lastmod>2021-12-08T04:21:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/33_ransomware-gang-in-Ukraine.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/33_ransomware-gang-in-Ukraine.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/vmware-confirms-vcenter-server-vulnerability-exploitation</loc>
		<lastmod>2021-12-08T04:23:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/34-Vulnerability-Exploitation.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/34-Vulnerability-Exploitation.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/a-new-spate-of-malware-attacks-targeting-south-american-firms-with-commodity-rats</loc>
		<lastmod>2021-12-08T04:25:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/35-Malware-Attacks.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/35-Malware-Attacks.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/godaddy-reports-a-data-breach</loc>
		<lastmod>2021-12-08T04:26:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/36-Data-Breach.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/36-Data-Breach.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/magecart-attack-harms-thousands-of-uk-retailers</loc>
		<lastmod>2021-12-09T13:21:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/37-Magecart-Attack.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/37-Magecart-Attack.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/black-friday-shopping-be-aware-of-phishing</loc>
		<lastmod>2021-12-09T13:23:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/38-shopping.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/38-shopping.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/cronrat-is-a-new-linux-malware-that-is-set-to-release-on-february-31st</loc>
		<lastmod>2021-12-10T04:32:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/39_Linux-malware-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/39_Linux-malware-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/to-target-security-firms-north-korean-hackers-pose-as-samsung-recruiters</loc>
		<lastmod>2021-12-10T04:34:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/40-North-Korean-Hackers.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/40-North-Korean-Hackers.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/hackers-gain-access-to-panasonics-network</loc>
		<lastmod>2021-12-13T04:18:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/41-Hackers-Gain-Access-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/41-Hackers-Gain-Access-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/150-models-of-hp-printer-vulnerable-to-attacks</loc>
		<lastmod>2021-12-13T04:21:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/42-HP-Printer-Vulnerable.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/42-HP-Printer-Vulnerable.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/the-malware-targeting-android-users-via-sms-has-been-named-flubot</loc>
		<lastmod>2021-12-14T03:52:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/43-Android-users.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/43-Android-users.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/pegasus-spyware-has-hacked-the-iphones-of-the-u-s-state-department-officials-and-diplomats</loc>
		<lastmod>2021-12-14T03:53:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/44-Pegasus-Spyware.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/44-Pegasus-Spyware.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/bitmart-confirms-150m-crypto-theft</loc>
		<lastmod>2021-12-15T05:12:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/45-BitMart-Confirms.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/45-BitMart-Confirms.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/hackers-are-using-omicron-to-gain-unauthorized-access-in-u-s-universities</loc>
		<lastmod>2021-12-15T05:14:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/46-Omicron-to-gain.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/46-Omicron-to-gain.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/cyber-assault-on-spar-stores-in-north-england</loc>
		<lastmod>2021-12-16T04:36:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/48-Cyber-Assault.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/48-Cyber-Assault.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/a-new-zero-day-vulnerability-in-the-log4j-java-library-is-being-exploited-in-the-wild-and-might-have-a-massive-impact-on-it-goliaths</loc>
		<lastmod>2021-12-16T04:38:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/49-vulnerability.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/49-vulnerability.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/top-3-software-as-a-service-saas-security-threat-for-2022</loc>
		<lastmod>2021-12-17T04:04:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/50-Security-threat.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/50-Security-threat.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/second-log4j-flaw-poses-a-denial-of-service-threat</loc>
		<lastmod>2021-12-17T08:47:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/Second-Log4j-Flaw-Poses-a-Denial-of-Service-Threat-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/Second-Log4j-Flaw-Poses-a-Denial-of-Service-Threat.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/kronos-struck-by-ransomware-wreaking-havoc-in-the-holiday-season</loc>
		<lastmod>2021-12-17T08:53:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/Kronos-Struck-by-Ransomware-Wreaking-Havoc-in-the-Holiday-Season.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/Kronos-Struck-by-Ransomware-Wreaking-Havoc-in-the-Holiday-Season.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/update-chrome-as-soon-as-possible-says-the-government</loc>
		<lastmod>2021-12-17T08:56:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/Update-Chrome-as-soon-as-possible_-says-the-government.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/Update-Chrome-as-soon-as-possible_-says-the-government.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/over-1-8-million-customers-credit-card-information-was-stolen-from-sports-gear-websites-by-hackers</loc>
		<lastmod>2021-12-20T09:37:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/Over-1.8-million-customers-credit-card-information-was-stolen-from-sports-gear-websites-by-hackers_-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/Over-1.8-million-customers-credit-card-information-was-stolen-from-sports-gear-websites-by-hackers_-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/new-log4j-patch-released-to-fix-dos-flaw</loc>
		<lastmod>2021-12-21T13:02:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/New-Log4j-Patch-Released-to-Fix-DoS-Flaw.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/New-Log4j-Patch-Released-to-Fix-DoS-Flaw.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/cyber-mercenary-firms-snoop-on-people-meta-issues-notice</loc>
		<lastmod>2021-12-22T10:33:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/Cyber-Mercenary_-Firms-Snoop-on-People-Meta-Issues-Notice-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/Cyber-Mercenary_-Firms-Snoop-on-People-Meta-Issues-Notice-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/the-chinese-ministry-has-charged-alibaba-cloud-for-mismanaging-log4j</loc>
		<lastmod>2021-12-24T04:34:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/Alibaba-Cloud-Slapped-by-Chinese-Ministry-for-Mishandling-Log4j.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/Alibaba-Cloud-Slapped-by-Chinese-Ministry-for-Mishandling-Log4j.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/careful-your-secret-santa-can-steal-your-data</loc>
		<lastmod>2021-12-24T16:00:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/Careful_-your-Secret-Santa-can-steal-your-data-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/Careful_-your-Secret-Santa-can-steal-your-data-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/an-expert-explains-a-problem-in-macos-that-could-allow-malware-to-get-through-gatekeepers-security</loc>
		<lastmod>2021-12-27T15:23:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/An-expert-explains-a-problem-in-macOS-that-could-allow-malware-to-get-through-Gatekeepers-security.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/An-expert-explains-a-problem-in-macOS-that-could-allow-malware-to-get-through-Gatekeepers-security.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/spider-man-no-way-home-crypto-mining-malware-can-be-found-in-pirated-downloads</loc>
		<lastmod>2021-12-28T09:25:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/SpiderMan-no-way-Home-Crypto-Mining-Malware-Can-Be-Found-in-Pirated-Downloads-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/SpiderMan-no-way-Home-Crypto-Mining-Malware-Can-Be-Found-in-Pirated-Downloads-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/beware-of-the-festive-scams</loc>
		<lastmod>2021-12-29T11:33:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/Beware-of-the-Festive-Scams.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/Beware-of-the-Festive-Scams.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/ransomware-is-no-different-from-any-other-attack</loc>
		<lastmod>2021-12-30T10:59:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/Ransomware-is-no-different-from-any-other-attack.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2021/12/Ransomware-is-no-different-from-any-other-attack.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/microsoft-has-released-a-fix-for-the-exchange-y2k22-bug-that-disrupted-email-delivery</loc>
		<lastmod>2022-01-03T12:13:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/01/Microsoft-has-released-a-fix-for-the-Exchange-Y2K22-bug-that-disrupted-email-delivery.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/01/Microsoft-has-released-a-fix-for-the-Exchange-Y2K22-bug-that-disrupted-email-delivery.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/post-exploitation-attacks-by-chinese-hackers-using-log4shell-exploit-tools</loc>
		<lastmod>2022-01-05T06:50:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/01/Post-Exploitation-Attacks-by-Chinese-Hackers-Using-Log4Shell-Exploit-Tools.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/01/Post-Exploitation-Attacks-by-Chinese-Hackers-Using-Log4Shell-Exploit-Tools.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/google-acquires-non-us-based-security-firm-siemplify-for-500-mn</loc>
		<lastmod>2022-01-05T09:48:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/01/Google-Acquires-Non-US-Based-Security-Firm-Siemplify-For-500-mn.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/01/Google-Acquires-Non-US-Based-Security-Firm-Siemplify-For-500-mn.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/malicious-telegram-instal-uses-purple-fox-malware</loc>
		<lastmod>2022-01-06T12:51:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/01/Malicious-Telegram-Instal-Uses-Purple-Fox-Malware.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/01/Malicious-Telegram-Instal-Uses-Purple-Fox-Malware.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/ransomware-cripples-8000-school-websites</loc>
		<lastmod>2022-01-07T10:20:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/01/Ransomware-cripples-8000-school-websites.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/01/Ransomware-cripples-8000-school-websites.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/in-recent-malware-attacks-patchwork-apt-group-have-scored-their-own-goals</loc>
		<lastmod>2022-01-10T15:20:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/01/In-recent-malware-attacks-Patchwork-APT-group-have-scored-their-own-goals.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/01/In-recent-malware-attacks-Patchwork-APT-group-have-scored-their-own-goals.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/scammers-stole-92mn-by-preying-on-vulnerable-internet-daters</loc>
		<lastmod>2022-01-12T10:39:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/01/Scammers-Stole-92mn-by-Preying-on-Vulnerable-Internet-Daters.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/01/Scammers-Stole-92mn-by-Preying-on-Vulnerable-Internet-Daters.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/attackers-distributed-deceitful-dnspy-malware-to-target-security-experts</loc>
		<lastmod>2022-01-13T08:49:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/01/Attackers-Distributed-Deceitful-dnSpy-Malware-to-Target-Security-Experts.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/01/Attackers-Distributed-Deceitful-dnSpy-Malware-to-Target-Security-Experts.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/a-teenage-security-researcher-claims-to-have-hacked-tesla-vehicles</loc>
		<lastmod>2022-01-13T10:52:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/01/A-Teenage-Security-Researcher-Claims-to-Have-Hacked-Tesla-Vehicles.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/01/A-Teenage-Security-Researcher-Claims-to-Have-Hacked-Tesla-Vehicles.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/the-ukrainian-government-has-arrested-the-gang-behind-50-ransomware-attacks</loc>
		<lastmod>2022-01-14T14:31:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/01/The-Ukrainian-government-has-arrested-the-gang-behind-50-ransomware-attacks.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/01/The-Ukrainian-government-has-arrested-the-gang-behind-50-ransomware-attacks.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/microsoft-claims-to-have-discovered-destructive-malware-on-the-systems-of-many-ukrainian-government-entities</loc>
		<lastmod>2022-01-17T11:26:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/01/Microsoft-claims-to-have-discovered-destructive-malware-on-the-systems-of-many-Ukrainian-government-entities.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/01/Microsoft-claims-to-have-discovered-destructive-malware-on-the-systems-of-many-Ukrainian-government-entities.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/a-newly-disclosed-vulnerability-in-apple-incs-safari-15-exposes-users-data-and-online-activity</loc>
		<lastmod>2022-01-18T09:41:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/01/A-newly-disclosed-vulnerability-in-Apple-Incs-Safari-15-exposes-users-data-and-online-activity.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/01/A-newly-disclosed-vulnerability-in-Apple-Incs-Safari-15-exposes-users-data-and-online-activity.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/dark-webs-largest-marketplace-for-stolen-credit-cards-is-closing-down</loc>
		<lastmod>2022-01-20T05:29:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/01/Dark-Webs-Largest-Marketplace-for-Stolen-Credit-Cards-is-Closing-Down-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/01/Dark-Webs-Largest-Marketplace-for-Stolen-Credit-Cards-is-Closing-Down-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/mcafee-and-fireeye-products-rebrands-with-a-bizarre-name-trellix</loc>
		<lastmod>2022-01-20T12:42:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/01/McAfee-and-FireEye-Products-Rebrands-with-a-Bizarre-Name-Trellix_.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/01/McAfee-and-FireEye-Products-Rebrands-with-a-Bizarre-Name-Trellix_.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/over-34-million-from-crypto-com-accounts-were-stolen</loc>
		<lastmod>2022-01-24T04:55:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/01/Over-34-million-from-Crypto.com-accounts-were-stolen.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/01/Over-34-million-from-Crypto.com-accounts-were-stolen.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/a-serious-rust-programming-bug-could-result-in-the-deletion-of-files-and-directories</loc>
		<lastmod>2022-01-24T12:47:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/01/A-serious-Rust-programming-bug-could-result-in-the-deletion-of-files-and-directories-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/01/A-serious-Rust-programming-bug-could-result-in-the-deletion-of-files-and-directories-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/two-major-flaws-in-the-control-web-panel-cwp-risks-the-linux-server</loc>
		<lastmod>2022-01-25T09:14:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/01/Two-Major-Issues-in-the-Control-Web-Panel-CWP-Risks-the-Linux-Server_.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/01/Two-Major-Issues-in-the-Control-Web-Panel-CWP-Risks-the-Linux-Server_.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/in-a-watering-hole-attack-apples-macos-was-infected-with-new-dazzlespy-backdoor-exploits</loc>
		<lastmod>2022-01-27T10:13:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/01/Apple-macOS-infected-with-new-Dazzle-Spy-backdoor-exploits-as-a-part-of-watering-hole-attack.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/01/Apple-macOS-infected-with-new-Dazzle-Spy-backdoor-exploits-as-a-part-of-watering-hole-attack.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/a-drug-screening-laboratory-suffered-a-data-breach</loc>
		<lastmod>2022-01-28T16:27:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/01/A-drug-screening-laboratory-suffered-a-data-breach.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/01/A-drug-screening-laboratory-suffered-a-data-breach.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/the-ncsc-has-issued-a-warning-to-uk-organizations-to-prepare-for-russian-cyber-attacks</loc>
		<lastmod>2022-02-01T05:02:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/02/The-NCSC-has-issued-a-warning-to-UK-organizations-to-prepare-for-Russian-cyber-attacks.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/02/The-NCSC-has-issued-a-warning-to-UK-organizations-to-prepare-for-Russian-cyber-attacks.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/aggressive-blackcat-the-latest-ransomware-threat-is-on-rise</loc>
		<lastmod>2022-02-01T10:59:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/02/Aggressive-BlackCat_-The-Latest-Ransomware-Threat-is-on-Rising.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/02/Aggressive-BlackCat_-The-Latest-Ransomware-Threat-is-on-Rising.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/home-improvement-firm-fined-200000-for-making-675478-nuisance-calls</loc>
		<lastmod>2022-02-04T11:49:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/02/Home-Improvement-Firm-Fined-200000-for-Making-675478-Nuisance-Calls.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/02/Home-Improvement-Firm-Fined-200000-for-Making-675478-Nuisance-Calls.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/email-thief-an-active-exploitation-of-zero-day-vulnerability-in-zimbra</loc>
		<lastmod>2022-02-07T10:04:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/02/Email-Theft_-An-Active-Exploitation-of-Zero-day-Vulnerability-in-Zimbra.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/02/Email-Theft_-An-Active-Exploitation-of-Zero-day-Vulnerability-in-Zimbra.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/a-hack-on-blockchain-infrastructure-firm-led-to-the-theft-of-4-4-million</loc>
		<lastmod>2022-02-07T10:08:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/02/A-hack-on-blockchain-infrastructure-firm-led-to-the.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/02/A-hack-on-blockchain-infrastructure-firm-led-to-the.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/google-cloud-now-includes-a-new-threat-detection-layer-for-virtual-machines</loc>
		<lastmod>2022-02-08T10:18:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/02/Google-Cloud-Now-Includes-a-New-Threat-Detection-Layer-for-Virtual-Machines.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/02/Google-Cloud-Now-Includes-a-New-Threat-Detection-Layer-for-Virtual-Machines.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/android-malware-roaming-mantis-expanded-to-include-europe</loc>
		<lastmod>2022-02-10T15:18:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/02/Android-Malware-Roaming-Mantis-expanded-to-include-Europe.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/02/Android-Malware-Roaming-Mantis-expanded-to-include-Europe.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/cisa-requests-federal-agencies-to-patch-actively-exploited-windows-vulnerability</loc>
		<lastmod>2022-02-10T15:22:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/02/CISA-requests-Federal-Agencies-to-patch-actively-exploited-Windows-Vulnerability.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/02/CISA-requests-Federal-Agencies-to-patch-actively-exploited-Windows-Vulnerability.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/government-military-and-nonprofits-are-targets-of-actinium-hackers-who-steal-sensitive-data</loc>
		<lastmod>2022-02-14T05:54:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/02/Government-military-and-nonprofits-are-targets-of-ACTINIUM-hackers-who-steal-sensitive-data.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/02/Government-military-and-nonprofits-are-targets-of-ACTINIUM-hackers-who-steal-sensitive-data.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/puma-suffered-a-data-breach-following-the-kronos-ransomware-attacks</loc>
		<lastmod>2022-02-14T07:57:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/02/Puma-suffered-a-data-breach-following-the-Kronos-ransomware-attacks.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/02/Puma-suffered-a-data-breach-following-the-Kronos-ransomware-attacks.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/american-football-team-san-francisco-49ers-hit-by-blackbyte-ransomware-attacks</loc>
		<lastmod>2022-02-15T07:40:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/02/San-Francisco-49ers-American-Football-Team-Hit-by-BlackByte-Attacks.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/02/San-Francisco-49ers-American-Football-Team-Hit-by-BlackByte-Attacks.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/magentos-critical-zero-day-vulnerability-being-actively-exploited</loc>
		<lastmod>2022-02-16T11:41:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/02/Magentos-critical-zero-day-vulnerability-being-actively-exploited.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/02/Magentos-critical-zero-day-vulnerability-being-actively-exploited.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/massive-linkedin-phishing-amid-the-great-resignation</loc>
		<lastmod>2022-02-17T10:16:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/02/Massive-LinkedIn-Phishing-amid-the-Great-Resignation.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/02/Massive-LinkedIn-Phishing-amid-the-Great-Resignation.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/ransomware-strikes-the-fertility-clinic</loc>
		<lastmod>2022-02-21T12:04:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/02/Ransomware-strikes-the-Fertility-Clinic.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/02/Ransomware-strikes-the-Fertility-Clinic.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/hackers-infect-android-devices-by-exploiting-a-vulnerability-in-sms-verification-services</loc>
		<lastmod>2022-02-22T09:44:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/02/Hackers-infect-Android-devices-by-exploiting-a-vulnerability-in-SMS-verification-services.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/02/Hackers-infect-Android-devices-by-exploiting-a-vulnerability-in-SMS-verification-services.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/an-adolescent-sued-after-she-was-accused-of-cybercrime</loc>
		<lastmod>2022-02-22T14:58:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/02/An-adolescent-sued-after-she-was-accused-of-cybercrime.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/02/An-adolescent-sued-after-she-was-accused-of-cybercrime.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/ukraine-claims-massive-cyberattack-hacking-the-government-websites</loc>
		<lastmod>2022-02-24T07:26:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/02/Ukraine-Claims-Massive-Cyberattack-Hacking-the-Government-Websites.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/02/Ukraine-Claims-Massive-Cyberattack-Hacking-the-Government-Websites.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/us-receives-cyberattack-warnings</loc>
		<lastmod>2022-02-24T11:06:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/02/US-Receives-Cyberattack-Warnings.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/02/US-Receives-Cyberattack-Warnings.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/ukraine-is-the-target-of-a-new-cyclops-blink-malware-attack</loc>
		<lastmod>2022-02-25T11:43:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/02/Ukraine-is-the-target-of-a-new-Cyclops-Blink-malware-cyberattack_.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/02/Ukraine-is-the-target-of-a-new-Cyclops-Blink-malware-cyberattack_.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/elon-musk-activates-starlink-in-ukraine-to-keep-the-internet-up-after-the-russian-invasion</loc>
		<lastmod>2022-02-28T10:57:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/02/Elon-Musk-activates-Starlink-in-Ukraine-to-keep-the-internet-up-after-the-Russian-invasion.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/02/Elon-Musk-activates-Starlink-in-Ukraine-to-keep-the-internet-up-after-the-Russian-invasion.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/a-new-malware-named-foxblade-hitting-ukrainian-civilian-digital-targets</loc>
		<lastmod>2022-03-02T10:51:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/03/A-new-malware-named-FoxBlade-hitting-Ukrainian-civilian-digital-targets-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/03/A-new-malware-named-FoxBlade-hitting-Ukrainian-civilian-digital-targets-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/toyota-forced-to-halt-vehicle-production-due-to-a-ransomware-attack</loc>
		<lastmod>2022-03-02T12:39:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/03/Toyota-forced-to-halt-vehicle-production-due-to-a-Ransomware-Attack.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/03/Toyota-forced-to-halt-vehicle-production-due-to-a-Ransomware-Attack.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/google-play-store-outspreads-the-new-android-banking-trojan-teabot</loc>
		<lastmod>2022-03-03T15:51:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/03/Google-Play-Store-outspreads-the-new-Android-banking-Trojan-TeaBot.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/03/Google-Play-Store-outspreads-the-new-Android-banking-Trojan-TeaBot.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/remote-requests-can-crash-the-cisco-radius-server</loc>
		<lastmod>2022-03-07T03:50:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/03/Remote-requests-can-crash-the-Cisco-RADIUS-server.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/03/Remote-requests-can-crash-the-Cisco-RADIUS-server.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/two-new-zero-day-bugs-in-mozilla-firefox-are-being-actively-exploited</loc>
		<lastmod>2022-03-07T08:35:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/03/Two-new-zero-day-bugs-in-Mozilla-Firefox-are-being-actively-exploited.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/03/Two-new-zero-day-bugs-in-Mozilla-Firefox-are-being-actively-exploited.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/uber-reportedly-hacked</loc>
		<lastmod>2022-09-28T06:11:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/09/Uber-Reportedly-Hacked.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2022/09/Uber-Reportedly-Hacked.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/cyberwatch-weekly-top-3-cybersecurity-news-from-september-2nd-week</loc>
		<lastmod>2024-09-10T06:59:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/09/Top-3-Cybersecurity-News-From-September-2nd-Week.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/09/Top-3-Cybersecurity-News-From-September-2nd-Week.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/fortinet-reports-data-breach-after-hacker-claims-to-exfiltrate-440gb-of-files</loc>
		<lastmod>2024-09-13T10:41:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/09/Fortinet-Reports-Data-Breach-After-Hacker-Claims-to-Exfiltrate-440GB-of-Files.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/09/Fortinet-Reports-Data-Breach-After-Hacker-Claims-to-Exfiltrate-440GB-of-Files.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/cyberwatch-weekly-top-3-cybersecurity-news-from-september-3rd-week</loc>
		<lastmod>2024-09-17T05:13:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/09/Top-3-Cybersecurity-News-From-September-2nd-Week.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/09/Top-3-Cybersecurity-News-From-September-2nd-Week.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/irans-nuclear-facilities-face-cyber-threats-amid-escalating-middle-east-turmoil</loc>
		<lastmod>2024-10-15T10:25:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/Irans-Nuclear-Facilities-Face-Cyber-Threats-Amid-Escalating-Middle-East-Turmoil.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/Irans-Nuclear-Facilities-Face-Cyber-Threats-Amid-Escalating-Middle-East-Turmoil.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/cyberwatch-weekly-top-3-cybersecurity-news-from-october-2nd-week</loc>
		<lastmod>2024-10-15T10:34:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/cyberwatch-weekly-top-3-cybersecurity-news-from-october-3rd-week</loc>
		<lastmod>2024-10-22T07:21:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/cyberwatch-weekly-top-3-cybersecurity-news-from-november-2nd-week</loc>
		<lastmod>2024-11-19T05:00:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/cyberwatch-weekly-top-3-cybersecurity-news-from-november-3rd-week</loc>
		<lastmod>2024-11-19T05:03:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/cyberwatch-weekly-top-3-cybersecurity-news-from-december-1st-week</loc>
		<lastmod>2024-12-04T05:16:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/indian-bank-icici-faces-potential-data-breach-by-bashe-group</loc>
		<lastmod>2025-01-24T11:54:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2025/01/Indian-Bank-ICICI-Faces-Potential-Data-Breach-by-BASHE-Group.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2025/01/Indian-Bank-ICICI-Faces-Potential-Data-Breach-by-BASHE-Group.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/deepseek-data-leak-exposes-sensitive-data</loc>
		<lastmod>2025-01-31T12:53:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2025/01/DeepSeek-Data-Leak-Exposes-Sensitive-Data_-A-Wake-Up-Call-for-Data-Security-1200-1200.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2025/01/DeepSeek-Data-Leak-Exposes-Sensitive-Data_-A-Wake-Up-Call-for-Data-Security.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/cyberwatch-weekly-top-3-cybersecurity-news</loc>
		<lastmod>2025-03-18T06:41:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/cyberwatch-weekly-top-3-cybersecurity-news-from-april-2nd-week</loc>
		<lastmod>2025-04-11T10:27:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/cyberwatch-weekly-top-3-cybersecurity-news-from-april-3rd-week</loc>
		<lastmod>2025-04-18T07:14:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/cyberwatch-weekly-top-3-cybersecurity-news-from-april-4th-week</loc>
		<lastmod>2025-04-25T06:53:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/cyberwatch-weekly-top-3-cybersecurity-news-from-may-1st-week</loc>
		<lastmod>2025-05-02T11:59:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/cyberwatch-weekly-top-3-cybersecurity-news-from-may-2nd-week</loc>
		<lastmod>2025-05-09T04:44:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/cyberwatch-weekly-top-3-cybersecurity-news-from-may-4th-week</loc>
		<lastmod>2025-05-23T06:25:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/cyberwatch-weekly-top-3-cybersecurity-news-from-may-5th-week</loc>
		<lastmod>2025-05-30T06:14:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/cyberwatch-weekly-top-3-cybersecurity-news-from-june-1st-week</loc>
		<lastmod>2025-06-06T07:04:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/cyberwatch-weekly-top-3-cybersecurity-news-from-may-3rd-week</loc>
		<lastmod>2025-06-13T07:08:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/cyberwatch-weekly-top-3-cybersecurity-news-from-june-2nd-week</loc>
		<lastmod>2025-06-13T07:13:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2025/06/Cyber-News.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2025/06/cybersecurity-training.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/cyberwatch-weekly-top-3-cybersecurity-news-from-june-3rd-week</loc>
		<lastmod>2025-06-20T08:45:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/cyberwatch-weekly-top-3-cybersecurity-news-from-june-4th-week</loc>
		<lastmod>2025-06-27T05:54:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/cyberwatch-weekly-top-3-cybersecurity-news-from-july-1st-week</loc>
		<lastmod>2025-07-04T06:59:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/cyberwatch-weekly-top-3-cybersecurity-news-from-july-2nd-week</loc>
		<lastmod>2025-07-11T09:44:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/cyberwatch-weekly-top-3-cybersecurity-news-from-july-3rd-week</loc>
		<lastmod>2025-07-18T05:51:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/cyberwatch-weekly-top-3-cybersecurity-news-from-july-4th-week</loc>
		<lastmod>2025-07-25T06:21:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/cyberwatch-weekly-top-3-cybersecurity-news-from-july-5th-week</loc>
		<lastmod>2025-08-01T05:52:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/cyberwatch-weekly-top-3-cybersecurity-news-from-august-1st-week</loc>
		<lastmod>2025-08-08T06:36:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/cyberwatch-weekly-top-3-cybersecurity-news-from-august-3rd-week</loc>
		<lastmod>2025-08-22T06:46:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/cyberwatch-weekly-top-3-cybersecurity-news-from-august-4th-week</loc>
		<lastmod>2025-08-29T06:37:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/cyberwatch-weekly-top-3-cybersecurity-news-from-september-1st-week</loc>
		<lastmod>2025-09-05T06:21:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/cyberwatch-weekly-top-3-cybersecurity-news-from-september-2nd-week-2</loc>
		<lastmod>2025-09-12T07:07:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/cyberwatch-weekly-top-3-cybersecurity-news-from-september-3rd-week-2</loc>
		<lastmod>2025-09-19T06:06:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/cyberwatch-weekly-top-3-cybersecurity-news-from-september-4th-week</loc>
		<lastmod>2025-09-26T11:02:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/cyberwatch-weekly-top-3-cybersecurity-news-from-october-1st-week</loc>
		<lastmod>2025-10-03T07:31:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/cyberwatch-weekly-top-3-cybersecurity-news-from-october-2nd-week-2025</loc>
		<lastmod>2025-10-13T05:15:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/cyberwatch-weekly-latest-global-cyber-attacks-breaches-security-warnings</loc>
		<lastmod>2025-10-17T08:55:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/cyberwatch-weekly-latest-global-cybersecurity-threats-and-espionage-campaigns-unfolding</loc>
		<lastmod>2025-10-24T07:13:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/cyberwatch-weekly-latest-global-cyberattacks-data-breaches-and-hacking-incidents-you-need-to-know</loc>
		<lastmod>2025-10-31T07:11:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/cyberwatch-weekly-recent-cyber-incidents-and-security-updates-around-the-world</loc>
		<lastmod>2025-11-07T10:09:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/cyberwatch-weekly-top-cybersecurity-breaches-and-rising-threats-impacting-users-worldwide</loc>
		<lastmod>2025-11-14T08:59:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/cyberwatch-weekly-major-nation-state-cyberattacks-massive-data-leaks-and-fbi-led-hacker-arrests-this-week</loc>
		<lastmod>2025-11-24T05:32:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2024/10/CyberWatch-Weekly.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/infrastructure-attacks-and-ai-advancements-signal-escalating-cyber-risks</loc>
		<lastmod>2026-04-17T05:59:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2026/04/Cyberwatch-Weekly-Your-Weekly-News-Roundup.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2026/04/Cyberwatch-Weekly-Your-Weekly-News-Roundup.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/ai-exploits-infrastructure-attacks-and-global-espionage-signal-a-new-cyber-reality</loc>
		<lastmod>2026-04-17T06:05:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2026/04/Cyberwatch-Weekly-Your-Weekly-News-Roundup.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2026/04/Cyberwatch-Weekly-Your-Weekly-News-Roundup.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/expose-hidden-cyber-threats-cracks-in-ai-supply-chains-core-infrastructure-and-global-conflicts</loc>
		<lastmod>2026-04-17T06:08:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2026/04/Cyberwatch-Weekly-Your-Weekly-News-Roundup.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2026/04/Cyberwatch-Weekly-Your-Weekly-News-Roundup.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.infosectrain.com/news/nation-state-escalation-media-disruption-and-ai-supply-chain-risks-emerge</loc>
		<lastmod>2026-04-24T05:00:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2026/04/Cyberwatch-Weekly-Your-Weekly-News-Roundup.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.infosectrain.com/wp-content/uploads/2026/04/Cyberwatch-Weekly-Your-Weekly-News-Roundup.jpg</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->