<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//dailysecurityreview.com/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://dailysecurityreview.com/cyber-security/salt-typhoon-apt-subverts-law-enforcement-wiretapping/</loc>
		<lastmod>2024-10-09T17:39:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/adt-discloses-second-breach-in-2-months-stolen-credentials-fuel-data-exfiltration/</loc>
		<lastmod>2024-10-09T16:52:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/moneygram-cyberattack-hackers-confirmed-to-have-stolen-customer-data/</loc>
		<lastmod>2024-10-09T16:50:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/casio-network-breach-it-systems-fail-after-cyberattack/</loc>
		<lastmod>2024-10-09T16:48:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/fbcs-data-breach-impacts-millions-including-comcast-and-truist-bank-customers/</loc>
		<lastmod>2024-10-08T15:24:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/ransomware/highline-public-schools-ransomware-attack-forces-the-school-to-shut-down-classes/</loc>
		<lastmod>2024-10-08T15:17:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/moneygram-cyberattack-no-ransomware-evidence-found-social-engineering-suspected/</loc>
		<lastmod>2024-10-08T15:15:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/red-barrels-outlast-developer-suffers-data-breach-source-code-employee-data-compromised/</loc>
		<lastmod>2024-10-08T15:14:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/bank-of-america-outage-is-your-account-balance-zero/</loc>
		<lastmod>2024-10-03T20:10:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/urgent-security-alert-critical-ivanti-endpoint-manager-vulnerabilities-discovered/</loc>
		<lastmod>2024-10-03T20:08:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/verizon-outage-leaves-hundreds-of-thousands-without-service/</loc>
		<lastmod>2024-10-03T20:03:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/ransomware/ransomhub-zero-day/</loc>
		<lastmod>2024-10-03T18:34:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/feldstein-stewart-data-breach-letter-sent-to-8171-individuals/</loc>
		<lastmod>2024-10-02T16:57:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/cf-medical-announces-data-breach-stemming-from-fbcs-data-breach/</loc>
		<lastmod>2024-10-02T16:56:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/wells-fargo-announces-data-breach-cause-by-unauthorized-access-by-former-employee/</loc>
		<lastmod>2024-10-02T16:55:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/new-york-sports-club-data-breach-19836-individuals-affected/</loc>
		<lastmod>2024-10-02T16:47:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/ransomware/community-clinic-of-maui-data-breach-lockbit-ransomware-attack-exposes-patient-data/</loc>
		<lastmod>2024-10-02T15:56:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/fcc-fines-t-mobile-us-31-4-million-for-data-breaches/</loc>
		<lastmod>2024-10-02T15:53:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/cyber-security/apt31-and-apt27-cyberespionage-campaign/</loc>
		<lastmod>2024-10-01T00:34:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/ransomware/fbi-cisa-issue-advisory-on-targeted-blackcat-ransomware-attacks/</loc>
		<lastmod>2024-10-01T00:33:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/ransomware/cdk-ransomware-update/</loc>
		<lastmod>2024-10-01T00:32:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/ransomware/lockbit-ransomware-disrupted/</loc>
		<lastmod>2024-10-01T00:32:04+00:00</lastmod>
		<image:image>
			<image:loc>https://dailysecurityreview.com/wp-content/uploads/2024/02/image-26.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/ransomware/veolia-ransomware-attack/</loc>
		<lastmod>2024-10-01T00:31:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/ransomware/play-ransomware/</loc>
		<lastmod>2024-10-01T00:30:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/nissan-data-breach-exposes-social-security-numbers-of-over-53000-employees/</loc>
		<lastmod>2024-10-01T00:26:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/cyber-security/this-week-in-cybersecurity-23rd-september-to-27th-september/</loc>
		<lastmod>2024-09-30T23:46:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/cyber-security/afp-cyberattack-data-breach/</loc>
		<lastmod>2024-09-30T23:46:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/london-hospitals-cyberattack/</loc>
		<lastmod>2024-09-30T23:43:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/cyber-security/change-healthcare-data-breach-class-action-lawsuits/</loc>
		<lastmod>2024-09-30T23:25:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/critical-flaw-in-nvidia-container/</loc>
		<lastmod>2024-09-30T18:17:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/ransomware/umc-hospital-ransomware-attack/</loc>
		<lastmod>2024-09-30T18:14:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/tracelo-credit-card-data-breach/</loc>
		<lastmod>2024-09-30T18:06:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/ransomware/compass-group-hit-by-medusa-ransomware/</loc>
		<lastmod>2024-09-30T17:01:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/meta-fined-e91-million-by-dpc/</loc>
		<lastmod>2024-09-27T16:03:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/mc2-data-leak-over-100-million-americans-exposed-in-massive-data-breach/</loc>
		<lastmod>2024-09-27T16:01:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/fbi-and-homeland-security-investigate-critical-water-facility-cyberattack-in-kansas/</loc>
		<lastmod>2024-09-27T15:59:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/autocanada-ransomware-attack/</loc>
		<lastmod>2024-09-25T17:35:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/us-capitol-dark-web-cyber-attack-thousands-of-staffers-data-leaked/</loc>
		<lastmod>2024-09-25T17:34:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/moneygram-cyberattack-outage-enters-day-three-ransomware-suspected/</loc>
		<lastmod>2024-09-25T17:34:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/dell-data-breached-again-hackers-claim-second-attack-within-a-week-exposing-3-5gb-of-data/</loc>
		<lastmod>2024-09-25T17:34:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/chaser-cyberattack/</loc>
		<lastmod>2024-09-25T17:34:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/kansas-water-facility-cyberattack-arkansas-city-water-treatment-plant-targeted/</loc>
		<lastmod>2024-09-25T17:33:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/dell-investigates-data-breach-claims-after-hacker-leaks-employee-info/</loc>
		<lastmod>2024-09-25T17:33:24+00:00</lastmod>
		<image:image>
			<image:loc>https://dailysecurityreview.com/wp-content/uploads/2024/09/breach.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/dfa-data-breach-puts-28-million-passports-at-risk/</loc>
		<lastmod>2024-09-23T08:51:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/cyber-security/23andme-board-resigns/</loc>
		<lastmod>2024-09-20T18:13:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/crowdstrike-outage-sparks-security-vendor-switches/</loc>
		<lastmod>2024-09-20T18:11:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/change-healthcare-data-breach-letter/</loc>
		<lastmod>2024-09-20T18:08:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/disney-cut-ties-after-slack-data-breach/</loc>
		<lastmod>2024-09-20T18:07:30+00:00</lastmod>
		<image:image>
			<image:loc>https://dailysecurityreview.com/wp-content/uploads/2024/09/Disney-data-breach-Slack.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/total-tools-data-breach/</loc>
		<lastmod>2024-09-20T18:00:51+00:00</lastmod>
		<image:image>
			<image:loc>https://dailysecurityreview.com/wp-content/uploads/2024/09/65e71fc2550b099eb05105b06c91bc50.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/harvey-nichols-data-breach-high-end-retailer-confirms-customer-data-exposure-in-cyberattack/</loc>
		<lastmod>2024-09-20T17:57:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/23andme-to-pay-30-million-in-class-action-settlement-for-data-breach-exposing-6-4-million-customers/</loc>
		<lastmod>2024-09-20T16:09:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/dr-web-suffers-major-data-breach-disconnects-all-servers/</loc>
		<lastmod>2024-09-19T18:40:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/cyber-security/vanilla-tempest-hackers-use-inc-ransomware-to-target-healthcare/</loc>
		<lastmod>2024-09-19T18:39:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/cyber-security/german-radio-station-hit-by-cyberattack-emergency-tape-plays-on-as-hackers-demand-ransom/</loc>
		<lastmod>2024-09-19T18:32:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/hunters-international-ransomware-claims-breach-of-icbc-london-threatens-data-leak/</loc>
		<lastmod>2024-09-19T18:28:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/cyber-security/data-breaches-surge-to-three-year-high-in-australia/</loc>
		<lastmod>2024-09-19T18:27:08+00:00</lastmod>
		<image:image>
			<image:loc>https://dailysecurityreview.com/wp-content/uploads/2024/09/Notifiable-Data-Breaches-Report-2.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/veeam-backup-replication-rce-flaw-a-looming-threat-for-enterprises/</loc>
		<lastmod>2024-09-13T17:20:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/zscaler-data-breach/</loc>
		<lastmod>2024-09-13T04:08:34+00:00</lastmod>
		<image:image>
			<image:loc>https://dailysecurityreview.com/wp-content/uploads/2024/05/ezgif-6-4b31f92433-1-1024x333.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/cyber-security/pixhell-acoustic-attack-leaking-secrets-from-lcd-screen-noise/</loc>
		<lastmod>2024-09-11T18:31:14+00:00</lastmod>
		<image:image>
			<image:loc>https://dailysecurityreview.com/wp-content/uploads/2024/09/fig-3.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/cyber-security/indodax-hack-a-major-blow-to-indonesian-crypto-security/</loc>
		<lastmod>2024-09-11T18:29:15+00:00</lastmod>
		<image:image>
			<image:loc>https://dailysecurityreview.com/wp-content/uploads/2024/09/0191dff0-5ada-7de7-a7ad-5bd3c9ea47ff.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/cyber-security/litespeed-cache-vulnerability/</loc>
		<lastmod>2024-09-09T21:35:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/russian-military-hackers-linked-to-critical-infrastructure-attacks-a-deep-dive-into-gru-unit-29155/</loc>
		<lastmod>2024-09-09T21:34:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/cyber-security/critical-remote-code-execution-flaw-in-progress-loadmaster-a-10-10-severity-vulnerability/</loc>
		<lastmod>2024-09-09T21:22:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/avis-data-breach/</loc>
		<lastmod>2024-09-09T21:22:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/cyber-security/clearview-ai-fined-e30-5-million-for-unlawful-data-collection/</loc>
		<lastmod>2024-09-05T17:58:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/vk-data-leak-exposes-390-million-users-hikki-chan-strikes-again/</loc>
		<lastmod>2024-09-05T17:57:26+00:00</lastmod>
		<image:image>
			<image:loc>https://dailysecurityreview.com/wp-content/uploads/2024/09/hacker-leaks-data-of-vk-users-russian-social-network-1-1024x473-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://dailysecurityreview.com/wp-content/uploads/2024/09/hacker-leaks-data-of-vk-users-russian-social-network-2-1024x332-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/cyber-security/north-korean-hackers-target-job-seekers/</loc>
		<lastmod>2024-09-05T17:56:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/cyber-security/verkada-to-pay-2-95-million-for-security-failures-leading-to-breaches/</loc>
		<lastmod>2024-09-03T20:54:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/cbiz-discloses-data-breach-affecting-nearly-36000-individuals/</loc>
		<lastmod>2024-09-03T20:54:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/tfl-cyberattack-transport-for-london-under-attack/</loc>
		<lastmod>2024-09-03T20:53:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/cyber-security/dicks-sporting-goods-cyberattack-shuts-down-email-and-locks-employee-accounts/</loc>
		<lastmod>2024-09-02T19:56:10+00:00</lastmod>
		<image:image>
			<image:loc>https://dailysecurityreview.com/wp-content/uploads/2024/08/image-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/cyber-security/voldemort-malware-a-new-threat-abusing-google-sheets-for-data-exfiltration/</loc>
		<lastmod>2024-09-02T19:52:37+00:00</lastmod>
		<image:image>
			<image:loc>https://dailysecurityreview.com/wp-content/uploads/2024/09/image-2-min.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/park-n-fly-data-breach-impacts-nearly-a-million-customers-sensitive-information-compromised-in-cyberattack/</loc>
		<lastmod>2024-08-30T20:17:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/news/cucamonga-valley-water-district-hit-by-ransomware-attack/</loc>
		<lastmod>2024-08-30T19:17:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/ransomware/us-marshals-service-disputes-ransomware-gangs-breach-claims/</loc>
		<lastmod>2024-08-28T20:21:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/mcdonalds-instagram-hack/</loc>
		<lastmod>2024-08-27T17:01:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/connecticut-nonprofit-pays-1-million-ransom-after-sophisticated-cyberattack/</loc>
		<lastmod>2024-08-27T16:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/sea-tac-airport-hit-by-cyberattack-disrupting-services-and-websites/</loc>
		<lastmod>2024-08-27T16:57:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/ransomware/patelco-credit-union-suffers-ransomware-data-breach-affecting-726000-customers/</loc>
		<lastmod>2024-08-27T16:57:01+00:00</lastmod>
		<image:image>
			<image:loc>https://dailysecurityreview.com/wp-content/uploads/2024/08/image-1-min.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/cyber-security/french-government-websites-under-siege-following-telegram-ceo-arrest/</loc>
		<lastmod>2024-08-27T16:56:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/cyber-security/this-week-in-cybersecurity-19th-august-to-23rd-august-halliburton-hit-by-cyberattack/</loc>
		<lastmod>2024-08-24T05:06:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/ransomware/qilin-ransomware-now-steals-credentials-from-chrome-browsers/</loc>
		<lastmod>2024-08-23T17:21:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/halliburton-hit-by-cyberattack-operations-disrupted/</loc>
		<lastmod>2024-08-23T15:15:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/cyber-security/qnap-bolsters-nas-security-with-enhanced-ransomware-protection-in-latest-qts-update/</loc>
		<lastmod>2024-08-23T15:15:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/this-week-in-cybersecurity-15th-jan-19th-jan-178k-sonicwall-firewalls/</loc>
		<lastmod>2024-08-22T18:24:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/cisa-confirms-new-fortinet-rce-bug-being-actively-exploited/</loc>
		<lastmod>2024-08-22T18:21:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/ransomware/cannondesign-confirms-avos-locker-ransomware-data-breach/</loc>
		<lastmod>2024-08-22T17:08:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/geisinger-data-breach/</loc>
		<lastmod>2024-08-22T14:31:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/snowflake-cyberattack/</loc>
		<lastmod>2024-08-22T14:18:56+00:00</lastmod>
		<image:image>
			<image:loc>https://dailysecurityreview.com/wp-content/uploads/2024/06/ezgif-4-f663a8f534-1-1024x568.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/customers-express-fury-over-ticketmaster-data-breach-notification-letters/</loc>
		<lastmod>2024-08-22T14:14:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/this-week-in-cybersecurity-april-15th-to-april-19th-giant-tiger-data-breached/</loc>
		<lastmod>2024-08-22T13:58:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/teamviewer-confirms-breach-by-notorious-russian-hacking-group-cozy-bear/</loc>
		<lastmod>2024-08-22T13:47:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/neiman-marcus-data-breach-2/</loc>
		<lastmod>2024-08-22T13:40:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/neiman-marcus-data-breach/</loc>
		<lastmod>2024-08-22T13:39:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/casper-network-halts-operations-after-major-cyberattack/</loc>
		<lastmod>2024-08-22T13:20:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/toyota-third-party-data-breach-impacted-its-customers/</loc>
		<lastmod>2024-08-22T03:56:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/microchip-technology-cyberattack-manufacturing-incapacitated/</loc>
		<lastmod>2024-08-22T03:55:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/cisa-warns-of-critical-jenkins-rce-bug-exploited-in-ransomware-attacks/</loc>
		<lastmod>2024-08-21T05:21:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/automotive-giant-toyota-data-breached/</loc>
		<lastmod>2024-08-21T05:21:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/ransomware/columbus-ransomware-attack/</loc>
		<lastmod>2024-08-19T20:53:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/ransomware/flint-reeling-from-ransomware-attack-city-services-disrupted/</loc>
		<lastmod>2024-08-19T20:53:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/ransomware/medusa-ransomware-attacks-kansas-city-public-transportation-authority/</loc>
		<lastmod>2024-08-17T04:11:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/ransomware/first-american-financial-hacked/</loc>
		<lastmod>2024-08-17T04:10:18+00:00</lastmod>
		<image:image>
			<image:loc>https://dailysecurityreview.com/wp-content/uploads/2023/12/Fidelity-1-1024x528.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/national-public-data-data-breach/</loc>
		<lastmod>2024-08-17T04:01:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/ransomware/black-basta-ransomware-behind-ascension-cyber-attack/</loc>
		<lastmod>2024-08-17T03:55:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/cyber-security/netsuite-stores-leak-sensitive-customer-data-exposed-due-to-access-control-misconfiguration/</loc>
		<lastmod>2024-08-17T03:54:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/ransomware/autocanada-cyber-attack/</loc>
		<lastmod>2024-08-17T03:46:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/cleveland-cyberattack-forces-the-city-to-shut-down-it-systems/</loc>
		<lastmod>2024-08-17T03:36:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/ransomware/ascension-ransomware-attack-diverts/</loc>
		<lastmod>2024-08-17T03:20:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/kadokawa-data-breach-compromises-personal-data-of-over-250000-individuals/</loc>
		<lastmod>2024-08-17T02:47:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/hunters-international-ransomware-sharprhino-malware/</loc>
		<lastmod>2024-08-17T02:45:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/this-week-in-cybersecurity-national-public-data-breach-2/</loc>
		<lastmod>2024-08-16T18:47:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/ransomware/ransomware-attack-targets-iranian-banks/</loc>
		<lastmod>2024-08-16T18:46:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/national-public-data-breach/</loc>
		<lastmod>2024-08-16T17:14:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/massive-data-breach-exposes-2-7-billion-us-records/</loc>
		<lastmod>2024-08-16T17:13:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/ransomware/mclaren-health-care-hit-again-by-ransomware-attack-exposing-patient-data/</loc>
		<lastmod>2024-08-16T17:13:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/cyber-security/adt-data-breach-customer-information-impacted-in-major-security-incident/</loc>
		<lastmod>2024-08-16T17:13:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/judge-rules-nso-group-does-not-need-to-provide-additional-witnesses-in-pegasus-whatsapp-lawsuit/</loc>
		<lastmod>2024-08-16T17:13:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/ransomware/frances-grand-palais-discloses-ransomware-attack-during-2024-paris-olympics-games/</loc>
		<lastmod>2024-08-16T17:13:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/ransomware/australian-gold-ransomware-attack-mining-giant-hit-by-a-cyberattack/</loc>
		<lastmod>2024-08-16T17:13:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/cyber-security/spider-man-developer-insomniac-games-hit-by-rhysida-ransomware/</loc>
		<lastmod>2024-08-16T17:04:32+00:00</lastmod>
		<image:image>
			<image:loc>http://dailysecurityreview.com/wp-content/uploads/2023/12/image-10.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/microsoft-exchange-zero-day-exploit-experts-say-mitigation-isnt-enough/</loc>
		<lastmod>2024-08-16T17:04:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/cyber-security/canadian-governments-data-security-compromised-affecting-its-contractors/</loc>
		<lastmod>2024-08-16T17:03:58+00:00</lastmod>
		<image:image>
			<image:loc>http://dailysecurityreview.com/wp-content/uploads/2023/11/image-21.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/cyber-security/toyota-cyberattack-medusa-ransomware-strikes-toyota-customer-data-compromised/</loc>
		<lastmod>2024-08-16T17:03:45+00:00</lastmod>
		<image:image>
			<image:loc>http://dailysecurityreview.com/wp-content/uploads/2023/12/image-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://dailysecurityreview.com/wp-content/uploads/2023/12/image-9.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/spear-phishing-vs-phishing-how-do-spear-phishing-attacks-differ-from-standard-phishing-attacks/</loc>
		<lastmod>2024-08-16T17:03:21+00:00</lastmod>
		<image:image>
			<image:loc>http://dailysecurityreview.com/wp-content/uploads/2023/12/image-16.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://dailysecurityreview.com/wp-content/uploads/2023/12/image-17.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://dailysecurityreview.com/wp-content/uploads/2023/12/image-18.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://dailysecurityreview.com/wp-content/uploads/2023/12/image-19.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://dailysecurityreview.com/wp-content/uploads/2023/12/image-20.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://dailysecurityreview.com/wp-content/uploads/2023/12/image-21.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://dailysecurityreview.com/wp-content/uploads/2023/12/image-22.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/cyber-security/google-settles-5-billion-lawsuit/</loc>
		<lastmod>2024-08-16T16:55:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/cyber-security/oilrig-apt-uses-downloader-malware-for-cyberespionage/</loc>
		<lastmod>2024-08-16T16:55:41+00:00</lastmod>
		<image:image>
			<image:loc>http://dailysecurityreview.com/wp-content/uploads/2023/12/image-23.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://dailysecurityreview.com/wp-content/uploads/2023/12/image-24.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://dailysecurityreview.com/wp-content/uploads/2023/12/image-25.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/cyber-security/enhance-your-email-security-15-best-email-security-practices-for-2024/</loc>
		<lastmod>2024-08-16T16:55:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/cyber-security/how-to-conduct-a-cybersecurity-risk-assessment-step-by-step-guide/</loc>
		<lastmod>2024-08-16T16:55:17+00:00</lastmod>
		<image:image>
			<image:loc>https://dailysecurityreview.com/wp-content/uploads/2023/12/cybersecurity-risk-assessment-showing-the-importance-of-cybersecurity-risk-assessment-in-shades-of-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://dailysecurityreview.com/wp-content/uploads/2023/12/vulnerability-scanning-tools-showing-the-importance-of-vulnerability-scanning-tools-in-shades-of-m-984508142.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/ransomware/ace-hardware-cyber-attack/</loc>
		<lastmod>2024-08-16T16:48:52+00:00</lastmod>
		<image:image>
			<image:loc>https://dailysecurityreview.com/wp-content/uploads/2023/12/illustration-of-ransomware-prevention-tips-in-illustration-style-in-shades-of-matte-red-and-black.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/synology-security-advisory-sa-2215-glpi-disclosed-multiple-remote-access-vulnerabilities/</loc>
		<lastmod>2024-08-16T16:48:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/gta-5-source-code-leaked/</loc>
		<lastmod>2024-08-16T16:45:32+00:00</lastmod>
		<image:image>
			<image:loc>https://dailysecurityreview.com/wp-content/uploads/2023/12/image-30.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://dailysecurityreview.com/wp-content/uploads/2023/12/image-31.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://dailysecurityreview.com/wp-content/uploads/2023/12/image-32.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/mr-cooper-data-breach/</loc>
		<lastmod>2024-08-16T16:44:21+00:00</lastmod>
		<image:image>
			<image:loc>https://dailysecurityreview.com/wp-content/uploads/2023/12/image-34.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/integris-health-data-breach/</loc>
		<lastmod>2024-08-16T16:43:36+00:00</lastmod>
		<image:image>
			<image:loc>https://dailysecurityreview.com/wp-content/uploads/2023/12/image-35.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/barracuda-zero-day-vulnerability-exploited-by-unc4841-barracuda-remotely/</loc>
		<lastmod>2024-08-16T16:43:20+00:00</lastmod>
		<image:image>
			<image:loc>https://dailysecurityreview.com/wp-content/uploads/2023/12/image-39.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/yakult-cyber-incident-95-gb-data-leak/</loc>
		<lastmod>2024-08-16T16:42:49+00:00</lastmod>
		<image:image>
			<image:loc>https://dailysecurityreview.com/wp-content/uploads/2023/12/image-37.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://dailysecurityreview.com/wp-content/uploads/2023/12/image-38.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/ransomware/liberty-hospital-cyber-attack/</loc>
		<lastmod>2024-08-16T16:42:14+00:00</lastmod>
		<image:image>
			<image:loc>https://dailysecurityreview.com/wp-content/uploads/2023/12/image-29.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/first-american-cyber-attack/</loc>
		<lastmod>2024-08-16T16:41:41+00:00</lastmod>
		<image:image>
			<image:loc>https://dailysecurityreview.com/wp-content/uploads/2023/12/image-48.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/ransomware/lockbit-ransomware-disrupts-kho/</loc>
		<lastmod>2024-08-16T16:41:07+00:00</lastmod>
		<image:image>
			<image:loc>https://dailysecurityreview.com/wp-content/uploads/2023/12/image-41.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/apt28-targets-ukraine-with-masepie-malware/</loc>
		<lastmod>2024-08-16T16:40:46+00:00</lastmod>
		<image:image>
			<image:loc>https://dailysecurityreview.com/wp-content/uploads/2023/12/image-49.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/steam-game-mod-breach/</loc>
		<lastmod>2024-08-16T16:40:25+00:00</lastmod>
		<image:image>
			<image:loc>https://dailysecurityreview.com/wp-content/uploads/2024/08/image-222.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/anna-jaques-hospital-cyberattack/</loc>
		<lastmod>2024-08-16T16:39:18+00:00</lastmod>
		<image:image>
			<image:loc>https://dailysecurityreview.com/wp-content/uploads/2024/01/image-7.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/cyber-security/albanian-parliament-and-one-albania/</loc>
		<lastmod>2024-08-16T16:39:00+00:00</lastmod>
		<image:image>
			<image:loc>https://dailysecurityreview.com/wp-content/uploads/2024/01/image-6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/ransomware/black-basta-decryptor-recovers-files/</loc>
		<lastmod>2024-08-16T16:38:14+00:00</lastmod>
		<image:image>
			<image:loc>https://dailysecurityreview.com/wp-content/uploads/2024/01/image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://dailysecurityreview.com/wp-content/uploads/2024/01/image-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/kyivstar-cyber-attack/</loc>
		<lastmod>2024-08-16T16:34:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/eagers-automotive-cyberattack-suspend-trades/</loc>
		<lastmod>2024-08-16T16:34:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/news/ohio-lottery-cyber-attack/</loc>
		<lastmod>2024-08-16T16:34:13+00:00</lastmod>
		<image:image>
			<image:loc>https://dailysecurityreview.com/wp-content/uploads/2023/12/image-40.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/news/victoria-court-hack-exposed/</loc>
		<lastmod>2024-08-16T16:33:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/orbit-chain-lost-86-million/</loc>
		<lastmod>2024-08-16T16:33:42+00:00</lastmod>
		<image:image>
			<image:loc>https://dailysecurityreview.com/wp-content/uploads/2024/01/image-8.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/healthec-data-breach/</loc>
		<lastmod>2024-08-16T16:33:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/mandiant-security-breached/</loc>
		<lastmod>2024-08-16T16:30:49+00:00</lastmod>
		<image:image>
			<image:loc>https://dailysecurityreview.com/wp-content/uploads/2024/01/image-9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://dailysecurityreview.com/wp-content/uploads/2024/01/image-10.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/cyber-security/actively-exploited-bugs-chrome/</loc>
		<lastmod>2024-08-16T16:30:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/hackers-access-google-accounts-without-password/</loc>
		<lastmod>2024-08-16T16:29:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/revenge-for-kyivstar/</loc>
		<lastmod>2024-08-16T16:27:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/capital-health-attack/</loc>
		<lastmod>2024-08-16T16:25:48+00:00</lastmod>
		<image:image>
			<image:loc>https://dailysecurityreview.com/wp-content/uploads/2024/01/image-12.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/us-secs-x-account-hack/</loc>
		<lastmod>2024-08-16T16:25:23+00:00</lastmod>
		<image:image>
			<image:loc>https://dailysecurityreview.com/wp-content/uploads/2024/01/image-13.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://dailysecurityreview.com/wp-content/uploads/2024/01/image-14.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/cyber-security/ivanti-critical-epm-bug/</loc>
		<lastmod>2024-08-16T16:24:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/sec-account-hack-again/</loc>
		<lastmod>2024-08-16T16:23:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/cyber-security/juniper-critical-rce-vulnerability/</loc>
		<lastmod>2024-08-16T16:18:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/cyber-security/178k-sonicwall-firewalls-exposed/</loc>
		<lastmod>2024-08-16T16:17:37+00:00</lastmod>
		<image:image>
			<image:loc>https://dailysecurityreview.com/wp-content/uploads/2024/01/image-15.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/cyber-security/windows-smartscreen-vulnerability/</loc>
		<lastmod>2024-08-16T16:17:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/androxgh0st-malware-steal-credentials/</loc>
		<lastmod>2024-08-16T16:16:43+00:00</lastmod>
		<image:image>
			<image:loc>https://dailysecurityreview.com/wp-content/uploads/2024/01/image-18.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/cyber-security/google-discreetly-changes-chromes-incognito-warning/</loc>
		<lastmod>2024-08-16T16:14:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/cyber-security/bigpanzi-botnet-targets-170k-android-tv/</loc>
		<lastmod>2024-08-16T16:14:12+00:00</lastmod>
		<image:image>
			<image:loc>https://dailysecurityreview.com/wp-content/uploads/2024/01/image-19.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://dailysecurityreview.com/wp-content/uploads/2024/01/image-20.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://dailysecurityreview.com/wp-content/uploads/2024/01/image-21.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://dailysecurityreview.com/wp-content/uploads/2024/01/image-22.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://dailysecurityreview.com/wp-content/uploads/2024/01/image-23.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/kansas-state-university-cyberattack/</loc>
		<lastmod>2024-08-16T16:13:54+00:00</lastmod>
		<image:image>
			<image:loc>https://dailysecurityreview.com/wp-content/uploads/2024/01/image-24.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/blackjack-hackers-steal/</loc>
		<lastmod>2024-08-16T16:13:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/phishing/trezor-security-breach-phishing/</loc>
		<lastmod>2024-08-16T16:13:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/ransomware/tietoevry-ransomware-attack/</loc>
		<lastmod>2024-08-16T16:12:10+00:00</lastmod>
		<image:image>
			<image:loc>https://dailysecurityreview.com/wp-content/uploads/2024/01/image-26.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/cyber-security/cisa-issues-emergency-directive-on-ivanti-zero-day/</loc>
		<lastmod>2024-08-16T16:11:51+00:00</lastmod>
		<image:image>
			<image:loc>https://dailysecurityreview.com/wp-content/uploads/2024/01/image-27.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/ukraines-monobank-ddos-attack-hits-non-stop-and-cripples-banks-operations/</loc>
		<lastmod>2024-08-16T16:11:01+00:00</lastmod>
		<image:image>
			<image:loc>https://dailysecurityreview.com/wp-content/uploads/2024/01/image-29.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/loandepot-cyberattack-breach-16-6-million/</loc>
		<lastmod>2024-08-16T16:10:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/sec-sim-swapping-attack/</loc>
		<lastmod>2024-08-16T16:10:31+00:00</lastmod>
		<image:image>
			<image:loc>https://dailysecurityreview.com/wp-content/uploads/2024/01/image-28.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/ransomware/10-types-of-cyber-attacks/</loc>
		<lastmod>2024-08-16T16:09:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/mother-of-all-breaches-moab-exposes-26-billion-records/</loc>
		<lastmod>2024-08-16T16:07:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/jasons-deli-breach/</loc>
		<lastmod>2024-08-16T16:06:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/bucks-county-cybersecurity-incident-disrupts-dispatch-system/</loc>
		<lastmod>2024-08-16T16:06:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/equilend-cyberattack-brings-the-financial-tech-firm-down-trades-with-systems-offline/</loc>
		<lastmod>2024-08-16T16:05:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/hpe-hacked-by-russian-hacker-group-midnight-blizzard/</loc>
		<lastmod>2024-08-16T16:05:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/hackers-stole-raw-genotype-data-health-reports-in-the-23andme-data-breach/</loc>
		<lastmod>2024-08-16T16:04:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/this-week-in-cybersecurity-22nd-jan-25th-jan-mother-of-all-breaches-exposes-26-billion-records/</loc>
		<lastmod>2024-08-16T16:00:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/critical-jenkins-rce-flaw-cve-2024-23897-exploited-in-the-wild/</loc>
		<lastmod>2024-08-16T15:58:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/cyber-security/ukrainian-hackers-wiped-2-petabytes-of-data/</loc>
		<lastmod>2024-08-16T15:56:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/keenan-data-breach-exposes-pii/</loc>
		<lastmod>2024-08-16T15:55:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/ransomware/johnson-controls-ransomware-cost-27-million/</loc>
		<lastmod>2024-08-16T15:54:27+00:00</lastmod>
		<image:image>
			<image:loc>https://dailysecurityreview.com/wp-content/uploads/2024/01/image-32.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/linux-glibc-flaw/</loc>
		<lastmod>2024-08-16T15:54:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/darkgate-malware-phishing/</loc>
		<lastmod>2024-08-16T15:53:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/schneider-electric-hit-by-cactus-ransomware/</loc>
		<lastmod>2024-08-16T15:53:09+00:00</lastmod>
		<image:image>
			<image:loc>https://dailysecurityreview.com/wp-content/uploads/2024/01/image-30.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://dailysecurityreview.com/wp-content/uploads/2024/01/image-31.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/fulton-county-cyberattack/</loc>
		<lastmod>2024-08-16T15:52:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/blackbaud-data-breach-ftc-holds-blackbaud-responsible/</loc>
		<lastmod>2024-08-16T15:51:23+00:00</lastmod>
		<image:image>
			<image:loc>https://dailysecurityreview.com/wp-content/uploads/2024/02/image-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/cloudflare-hacked-in-okta-attack/</loc>
		<lastmod>2024-08-16T15:50:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/data-of-750-million-indian-mobile-users-sold/</loc>
		<lastmod>2024-08-16T15:49:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/ivanti-second-connect-secure-zero-day-exploit/</loc>
		<lastmod>2024-08-16T15:48:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/cisa-advisory-volt-typhoon-attacks/</loc>
		<lastmod>2024-08-16T15:45:55+00:00</lastmod>
		<image:image>
			<image:loc>https://dailysecurityreview.com/wp-content/uploads/2024/02/image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/resumelooters-gang-steal-data-of-2-million-in-xss-attacks-using-sql-injection/</loc>
		<lastmod>2024-08-16T15:44:39+00:00</lastmod>
		<image:image>
			<image:loc>https://dailysecurityreview.com/wp-content/uploads/2024/02/image-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://dailysecurityreview.com/wp-content/uploads/2024/02/image-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://dailysecurityreview.com/wp-content/uploads/2024/02/image-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://dailysecurityreview.com/wp-content/uploads/2024/02/image-5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/hpe-data-breached-hpe-investigates-data-breach-after-data-being-stolen-from-a-test-environment/</loc>
		<lastmod>2024-08-16T15:44:21+00:00</lastmod>
		<image:image>
			<image:loc>https://dailysecurityreview.com/wp-content/uploads/2024/02/image-6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/lurie-childrens-hospital-cyberattack/</loc>
		<lastmod>2024-08-16T15:44:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/verizon-data-breach-compromises-data-of-63000-employees-insider-leaks-data/</loc>
		<lastmod>2024-08-16T15:43:19+00:00</lastmod>
		<image:image>
			<image:loc>https://dailysecurityreview.com/wp-content/uploads/2024/02/image-7.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/french-healthcare-data-breach-millions-at-risk/</loc>
		<lastmod>2024-08-16T15:30:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/ransomware-attack-takes-18-romanian-hospitals-offline/</loc>
		<lastmod>2024-08-16T15:29:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://dailysecurityreview.com/security-spotlight/raspberry-robin-malware-uses-one-day-exploits/</loc>
		<lastmod>2024-08-16T15:29:08+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Rank Math SEO Plugin (c) Rank Math - rankmath.com -->