<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://securityx.space/2023/04/07/conversations-with-silicone-2/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2023/04/dallc2b7e-2023-04-05-23.56.24-a-cubist-style-oil-painting-of-a-robot-sat-in-a-big-black-chair-ready-for-an-interview.png</image:loc><image:title>DALL·E 2023-04-05 23.56.24 - A cubist style oil painting of a robot sat in a big black chair ready for an interview</image:title></image:image><image:image><image:loc>https://securityx.space/wp-content/uploads/2023/04/chatgpt-avatar.png</image:loc><image:title>chatgpt-avatar</image:title></image:image><lastmod>2023-04-05T23:01:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2023/04/05/really-warped-tales-from-the-dark-web/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2023/04/dallc2b7e-2023-04-04-14.50.47-a-surrealist-vision-in-the-style-of-jackson-pollock-of-an-horror-movie-character.png</image:loc><image:title>dallc2b7e-2023-04-04-14.50.47-a-surrealist-vision-in-the-style-of-jackson-pollock-of-an-horror-movie-character</image:title></image:image><lastmod>2023-04-04T14:03:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2023/04/04/popcorn-and-cyber-episode-1-the-matrix/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2023/04/my-project-1-1.jpg</image:loc><image:title>Popcorn and Cyber</image:title><image:caption>Popcorn and Cyber</image:caption></image:image><image:image><image:loc>https://securityx.space/wp-content/uploads/2023/04/my-project-1.jpg</image:loc><image:title>CanP</image:title></image:image><lastmod>2023-04-02T19:47:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2023/04/03/malware-marauders-episode-sql-slammer/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2023/04/pexels-photo-1148820.jpeg</image:loc><image:title>close up photo of mining rig</image:title><image:caption>Photo by panumas nikhomkhai on &lt;a href="https://www.pexels.com/photo/close-up-photo-of-mining-rig-1148820/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2023-04-02T18:40:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2023/04/01/conversations-with-silicone/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2023/04/dallc2b7e-2023-04-01-22.37.41-in-the-renaissance-style-paint-me-a-picture-which-is-half-computer-and-half-shakespeare.png</image:loc><image:title>DALL·E 2023-04-01 22.37.41 - In the renaissance style paint me a picture which is half computer and half shakespeare</image:title></image:image><lastmod>2023-04-01T23:04:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2023/03/28/how-quantum-computers-and-ai-could-blow-up-public-key-cryptography/</loc><lastmod>2023-03-28T13:40:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2023/03/31/the-future-of-threat-intelligence-is-here-its-all-about-machine-learning/</loc><lastmod>2023-03-25T22:48:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2023/03/30/iso-270012022-is-here-and-it-will-shock-you-especially-the-annex-a-controls/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2023/03/iso_logo_red_square.svg_.png</image:loc><image:title>ISO_Logo_(Red_square).svg</image:title></image:image><lastmod>2023-03-24T11:58:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2023/03/29/how-low-code-no-code-development-can-make-you-cry-or-laugh-about-cyber-security/</loc><lastmod>2023-03-24T11:43:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2023/03/27/how-to-become-a-risk-intelligence-superstar-in-5-easy-steps/</loc><lastmod>2023-03-22T11:38:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2023/03/24/the-aptocalypse-whos-who-in-the-world-of-cyber-threats/</loc><lastmod>2023-03-22T00:44:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2023/03/23/quantum-computing-a-friend-or-foe-of-cryptography/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2023/03/4058451581_ab9d45ca31_b.jpg</image:loc><image:title>Quantum Gravity Photon Race</image:title><image:caption>&lt;a href="https://www.flickr.com/photos/24662369@N07/4058451581" rel="nofollow"&gt;Quantum Gravity Photon Race&lt;/a&gt; by &lt;a href="https://www.flickr.com/photos/24662369@N07" rel="nofollow"&gt;NASA Goddard Photo and Video&lt;/a&gt; is licensed under &lt;a href="https://creativecommons.org/licenses/by/2.0/" rel="nofollow"&gt;CC-BY 2.0&lt;/a&gt;</image:caption></image:image><lastmod>2023-03-22T00:32:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2023/03/22/blockchain-security-no-laughing-matter/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2023/03/chjpdmf0zs9sci9pbwfnzxmvd2vic2l0zs8ymdiylta1l3b4mtm3mja2my1pbwfnzs1rd3z4ennoac5qcgc.jpg</image:loc><image:title>Free public domain CC0 photo.</image:title></image:image><lastmod>2023-03-22T00:24:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2023/03/22/microsoft-fixes-80-bugs-in-march-2023-better-late-than-never/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2023/03/pexels-photo-3755755.jpeg</image:loc><image:title>young troubled woman using laptop at home</image:title><image:caption>Photo by Andrea Piacquadio on &lt;a href="https://www.pexels.com/photo/young-troubled-woman-using-laptop-at-home-3755755/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2023-03-22T00:09:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2022/07/08/cybersecurity-threat-maps-are-they-actually-any-good/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2022/07/pexels-photo-4021262.jpeg</image:loc><image:title>global coronavirus map with country statistics</image:title><image:caption>Photo by Anton Uniqueton on &lt;a href="https://www.pexels.com/photo/global-coronavirus-map-with-country-statistics-4021262/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://securityx.space/wp-content/uploads/2022/07/image-11.png</image:loc><image:title>image-11</image:title></image:image><image:image><image:loc>https://securityx.space/wp-content/uploads/2022/07/image-10.png</image:loc><image:title>image-10</image:title></image:image><image:image><image:loc>https://securityx.space/wp-content/uploads/2022/07/image-9.png</image:loc><image:title>image-9</image:title></image:image><image:image><image:loc>https://securityx.space/wp-content/uploads/2022/07/image-8.png</image:loc><image:title>image-8</image:title></image:image><image:image><image:loc>https://securityx.space/wp-content/uploads/2022/07/image-7.png</image:loc><image:title>image-7</image:title></image:image><image:image><image:loc>https://securityx.space/wp-content/uploads/2022/07/image-6.png</image:loc><image:title>image-6</image:title></image:image><image:image><image:loc>https://securityx.space/wp-content/uploads/2022/07/image-5.png</image:loc><image:title>image-5</image:title></image:image><image:image><image:loc>https://securityx.space/wp-content/uploads/2022/07/image-4.png</image:loc><image:title>image-4</image:title></image:image><image:image><image:loc>https://securityx.space/wp-content/uploads/2022/07/image-3.png</image:loc><image:title>image-3</image:title></image:image><lastmod>2022-07-08T17:15:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2020/05/05/aldi-tastic/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2020/05/aldi-phish.jpg</image:loc><image:title>aldi-phish</image:title></image:image><lastmod>2020-05-05T11:31:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2020/04/20/the-great-covid-19-phish/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2020/04/covid-google.jpg</image:loc><image:title>COVID-19 Search Results</image:title><image:caption>The results of searching for COVID-19 images.</image:caption></image:image><lastmod>2020-04-20T16:11:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2020/04/17/zooming/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2020/04/screen-shot-2019-03-18-at-5.33.08-am.png</image:loc><image:title>screen-shot-2019-03-18-at-5.33.08-am</image:title></image:image><lastmod>2020-04-17T12:37:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2020/04/14/crooks-target-healthcare-facilities-involved-in-coronavirus-containment-with-ransomware/</loc><lastmod>2020-04-14T15:46:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2020/04/14/will-zoom-manage-to-retain-security-conscious-customers/</loc><lastmod>2020-04-14T15:46:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2020/04/14/threat-roundup-for-april-3-to-april-10/</loc><lastmod>2020-04-14T08:20:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2020/04/14/zoom-adds-choose-your-own-routing-adventure-to-keep-chats-out-of-china/</loc><lastmod>2020-04-14T08:19:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2020/04/14/zoom-credentials-database-available-on-dark-web/</loc><lastmod>2020-04-14T08:12:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2020/04/14/exclusive-personal-data-of-1-41m-us-doctors-sold-on-hacker-forum/</loc><lastmod>2020-04-14T08:01:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2020/04/10/attack-matrix-for-kubernetes-by-microsoft/</loc><lastmod>2020-04-10T10:40:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2020/04/10/promising-results-for-post-quantum-certificates-in-tls-1-3/</loc><lastmod>2020-04-10T10:40:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2020/04/10/compromised-zoom-credentials-swapped-in-underground-forums/</loc><lastmod>2020-04-10T10:38:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2020/04/09/this-zoom-hate-is-silly/</loc><lastmod>2020-04-09T17:07:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2020/04/09/zoom-taps-ex-facebook-ciso-amid-security-snafus-lawsuit/</loc><lastmod>2020-04-09T15:01:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2020/04/09/interest-in-zoom-zero-day-hacks-is-sky-high-as-meetings-move-online/</loc><lastmod>2020-04-09T15:01:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2020/04/09/zoom-working-on-security-improvements-amid-more-bans/</loc><lastmod>2020-04-09T13:20:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2020/04/09/german-foreign-ministry-limits-the-use-of-zoom-over-security-concerns/</loc><lastmod>2020-04-09T13:15:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2020/04/09/threat-mapper-powerful-vulnerability-scanner-for-kubernetes-and-more/</loc><lastmod>2020-04-09T12:09:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/10/07/threat-roundup-for-september-27-to-october-4/</loc><lastmod>2019-10-07T08:33:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/10/04/new-0-day-flaw-affecting-most-android-phones-being-exploited-in-the-wild/</loc><lastmod>2019-10-04T09:18:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/10/02/extensive-list-of-useful-mindmaps/</loc><lastmod>2019-10-02T08:53:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/09/27/threat-roundup-for-september-20-to-september-27/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2019/09/5d444be8ea7dc-550x444.png</image:loc><image:title>5d444be8ea7dc-550x444</image:title></image:image><lastmod>2019-09-27T14:40:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/09/27/hacker-releases-unpatchable-jailbreak-for-all-ios-devices-iphone-4s-to-iphone-x-usb-access-required/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2019/09/8372e-ios-jailbreak-tool.png</image:loc><image:title>Cyie0uU_suMpRdqeFOQX9ERF-V05iPNKACLcBGAsYHQ</image:title></image:image><lastmod>2019-09-27T14:25:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/09/24/russian-apt-map-reveals-22000-connections-between-2000-malware-samples/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2019/09/eb403-russian-hacking-groups-maps.jpg</image:loc><image:title>um0Aprmac7oqh7TMbzpGdrnjATIKcUCPwCLcBGAsYHQ</image:title></image:image><lastmod>2019-09-24T15:39:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/09/24/microsoft-releases-emergency-patches-for-ie-0-day-and-windows-defender-flaw/</loc><lastmod>2019-09-24T08:53:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/09/16/threat-roundup-for-september-6-to-september-13/</loc><lastmod>2019-09-16T08:42:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/09/12/apis-get-their-own-top-10-security-list/</loc><lastmod>2019-09-12T16:05:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/09/11/netscout-warns-of-increased-apt-activity-targeting-airlines/</loc><lastmod>2019-09-11T15:13:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/09/11/netcat-new-attack-lets-hackers-remotely-steal-data-from-intel-cpus/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2019/09/f6b8a-intel-side-channel-vulnerability.jpg</image:loc><image:title>eqxQS3V9tcoPE4MVs-jKx_gaDz8E6Ze6wCLcBGAsYHQ</image:title></image:image><lastmod>2019-09-11T14:21:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/09/11/patch-tuesday-roundup/</loc><lastmod>2019-09-11T09:08:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/09/11/mozilla-launches-firefox-private-network-vpn-service-as-a-browser-extension/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2019/09/3efc3-firefox-privacy-vpn-service.jpg</image:loc><image:title>yRmQZnCtwYwdWBtWax6udGClU4qUyHqZgCLcBGAsYHQ</image:title></image:image><lastmod>2019-09-11T08:43:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/09/10/adobe-releases-security-patches-for-critical-flash-player-vulnerabilities/</loc><lastmod>2019-09-10T16:03:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/09/10/metasploit-project-publishes-exploit-for-bluekeep-bug/</loc><lastmod>2019-09-10T09:55:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/09/10/robert-downey-jrs-instagram-account-has-been-hacked/</loc><lastmod>2019-09-10T08:59:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/09/09/threat-roundup-for-august-30-to-september-6/</loc><lastmod>2019-09-09T11:03:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/09/09/brave-accuses-google-of-sidestepping-gdpr/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2019/09/brave.png</image:loc><image:title>brave</image:title></image:image><lastmod>2019-09-09T11:02:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/09/05/400-mn-facebook-users-phone-numbers-exposed-in-privacy-lapse-reports/</loc><lastmod>2019-09-05T11:52:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/09/05/wordpress-5-2-3-security-and-maintenance-release/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2019/09/wordpress-bg-medblue.png</image:loc><image:title>wordpress-bg-medblue</image:title></image:image><lastmod>2019-09-05T08:34:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/09/03/threat-roundup-for-august-23-to-august-30/</loc><lastmod>2019-09-03T09:33:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/08/30/google-warns-of-system-controlling-chrome-bug/</loc><lastmod>2019-08-30T10:18:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/08/30/google-uncovers-how-just-visiting-some-sites-were-secretly-hacking-iphones-for-years/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2019/08/f9490-iphone-hacking-software.jpg</image:loc><image:title>LeC_7bUauFcYPizAq3Zzga22P95D1manwCLcBGAs</image:title></image:image><lastmod>2019-08-30T08:50:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/08/29/mit-boffins-create-nanotube-risc-processor/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2019/08/mit-nanotube-transistors-02.jpg</image:loc><image:title>mit-nanotube-transistors-02</image:title></image:image><lastmod>2019-08-29T09:32:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/08/22/cisco-220-series-public-exploit-available/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2019/08/cisco2.jpg</image:loc><image:title>cisco2</image:title></image:image><lastmod>2019-08-22T10:18:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/08/22/researcher-discloses-second-steam-zero-day-after-valve-bug-bounty-ban/</loc><lastmod>2019-08-22T08:24:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/08/20/dejablue-analyzing-a-rdp-heap-overflow/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2019/08/bindiff.png</image:loc><image:title>bindiff</image:title></image:image><lastmod>2019-08-20T11:26:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/08/20/vlc-media-player-allows-desktop-takeover-via-malicious-video-files/</loc><lastmod>2019-08-20T11:17:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/08/19/threat-roundup-for-august-9-to-august-16/</loc><lastmod>2019-08-19T08:34:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/08/15/python-tool-leveraging-rapid7s-open-data-osint-dataset/</loc><lastmod>2019-08-15T13:33:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/08/15/sploitus-com-exploit-search-database/</loc><lastmod>2019-08-15T10:39:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/08/15/new-bluetooth-vulnerability-allows-attackers-to-intercept-traffic/</loc><lastmod>2019-08-15T09:59:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/08/14/microsoft-fixes-over-90-security-bugs-in-august-2019-updates-http-2-dos-bugs/</loc><lastmod>2019-08-14T08:48:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/08/13/google-discloses-20-year-old-unpatched-flaw-affecting-all-versions-of-windows/</loc><lastmod>2019-08-13T16:37:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/08/13/threat-roundup-for-august-2-to-august-9/</loc><lastmod>2019-08-13T09:36:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/08/13/over-40-drivers-could-let-hackers-install-persistent-backdoor-on-windows-pcs/</loc><lastmod>2019-08-13T09:36:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/08/13/nmap-7-80-released-a-mature-npcap-windows-packet-capturing-driver-11-new-nse-scripts/</loc><lastmod>2019-08-13T09:35:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/08/13/sqlite-vulnerabilities-demoed-with-hacking-of-iphone-malware-cc/</loc><lastmod>2019-08-13T09:17:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/08/09/fireeye-finding-evil-in-windows-10-compressed-memory-part-three-automating-undocumented-structure-extraction/</loc><lastmod>2019-08-09T09:01:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/08/09/fireeye-finding-evil-in-windows-10-compressed-memory-part-two-virtual-store-deep-dive/</loc><lastmod>2019-08-09T08:59:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/08/08/vbscript-is-dead-long-live-vbscript/</loc><lastmod>2019-08-08T10:11:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/08/08/http-desync-attacks/</loc><lastmod>2019-08-08T09:57:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/08/08/superhedgys-attacksurfacemapper/</loc><lastmod>2019-08-08T09:44:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/08/08/scapy-a-packet-manipulation-tool/</loc><lastmod>2019-08-08T09:39:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/08/08/cisco-patches-critical-flaws-in-network-switches/</loc><lastmod>2019-08-08T08:52:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/08/08/severe-local-0-day-escalation-exploit-found-in-steam-client-services/</loc><lastmod>2019-08-08T08:46:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/08/08/reverse-rdp-attack-also-enables-guest-to-host-escape-in-microsoft-hyper-v/</loc><lastmod>2019-08-08T08:44:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/08/07/kde-linux-desktops-could-get-hacked-without-even-opening-malicious-files/</loc><lastmod>2019-08-07T08:24:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/08/06/sqlmap-automatic-sql-injection-tool-1-3-8/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2019/08/screenshot.png</image:loc><image:title>screenshot</image:title></image:image><lastmod>2019-08-06T09:22:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/08/06/microsoft-detects-russian-state-hackers-using-compromised-iot-devices-to-launch-attacks/</loc><lastmod>2019-08-06T09:14:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/08/06/new-flaws-in-qualcomm-chips-expose-millions-of-android-devices-to-hacking/</loc><lastmod>2019-08-06T09:08:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/08/05/systembc-a-new-proxy-malware-is-being-distributed-via-fallout-and-rig-ek/</loc><lastmod>2019-08-05T09:56:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/08/05/alfred-lord-exploit-kit/</loc><lastmod>2019-08-05T09:54:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/08/05/threat-roundup-for-july-26-to-aug-2/</loc><lastmod>2019-08-05T09:47:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/08/02/bluekeep-built-into-exploitation-tool-sparks-fear-of-wannacry-style-infection/</loc><lastmod>2019-08-02T10:10:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/08/02/cyber-kill-chain-reimagined-industry-veteran-proposes-cognitive-attack-loop/</loc><lastmod>2019-08-02T08:00:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/08/02/hondas-security-soft-spots-exposed-in-unsecured-database/</loc><lastmod>2019-08-02T07:50:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/08/02/cisco-knowingly-sold-hackable-video-surveillance-system-to-u-s-government/</loc><lastmod>2019-08-02T07:47:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/31/malwarebyte-exploit-kits-summer-2019-review/</loc><lastmod>2019-07-31T09:27:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/31/container-security-is-falling-behind-container-deployments/</loc><lastmod>2019-07-31T09:25:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/31/flaws-allow-attackers-to-bypass-payment-limits-on-visa-contactless-cards/</loc><lastmod>2019-07-31T09:21:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/31/hack-a-small-airplane-yes-we-can-bus-once-we-physically-break-into-one-get-at-its-wiring-plug-in-evil-kit/</loc><lastmod>2019-07-31T09:20:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/30/google-researchers-disclose-pocs-for-4-remotely-exploitable-ios-flaws/</loc><lastmod>2019-07-30T11:25:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/30/series-of-zero-day-vulnerabilities-could-endanger-200-million-devices/</loc><lastmod>2019-07-30T09:16:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/30/capital-one-data-breach-affects-106-million-customers-hacker-arrested/</loc><lastmod>2019-07-30T09:09:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/29/threat-roundup-for-july-19-to-july-26/</loc><lastmod>2019-07-29T08:42:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/29/randip-network-mapper-to-find-servers/</loc><lastmod>2019-07-29T08:40:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/26/fireeye-finding-evil-in-windows-10-compressed-memory/</loc><lastmod>2019-07-26T08:28:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/26/microsoft-new-machine-learning-model-sifts-through-the-good-to-unearth-the-bad-in-evasive-malware/</loc><lastmod>2019-07-26T08:24:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/26/trump-oblivious-to-trolling-with-fake-presidential-logo/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2019/07/tls7nlhwkikgawr33rgz.jpg</image:loc><image:title>tls7nlhwkikgawr33rgz</image:title></image:image><lastmod>2019-07-26T08:22:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/25/software-developers-and-security/</loc><lastmod>2019-07-25T15:04:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/25/popular-malware-families-using-process-doppelganging-to-evade-detection/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2019/07/52d0b-process-doppelganging-malware.png</image:loc><image:title>9bOemK4X0EUv7Vm1Yl68O1OqUFwnlFkAACLcBGAs</image:title></image:image><lastmod>2019-07-25T15:01:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/25/threatlist-human-error-is-behind-one-quarter-of-data-breaches/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2019/07/ooops.jpg</image:loc><image:title>ooops</image:title></image:image><lastmod>2019-07-25T08:52:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/25/new-android-spyware-created-by-russian-defense-contractor-found-in-the-wild/</loc><lastmod>2019-07-25T08:51:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/24/apt34-spread-malware-via-linkedin-invites/</loc><lastmod>2019-07-24T09:45:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/24/siemens-contractor-pleads-guilty-to-planting-logic-bomb-in-spreadsheets/</loc><lastmod>2019-07-24T09:45:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/24/apple-patches-22-vulnerabilities-in-webkit/</loc><lastmod>2019-07-24T09:08:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/24/tech-firms-can-and-must-put-backdoors-in-encryption-ag-barr-says/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2019/07/gettyimages-633491780-800x533.jpg</image:loc><image:title>Violent Protests Erupt At UC Berkeley Against Speech By Breitbart Writer</image:title></image:image><lastmod>2019-07-24T09:07:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/23/multistage-attack-delivers-billgates-setag-backdoor-can-turn-elasticsearch-databases-into-ddos-botnet-zombies/</loc><lastmod>2019-07-23T13:41:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/23/lancaster-uni-data-breach-hits-at-least-12500-wannabe-students/</loc><lastmod>2019-07-23T13:39:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/23/proftpd-vulnerability-can-expose-servers-to-attacks/</loc><lastmod>2019-07-23T13:38:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/23/fsb-hackers-drop-files-online/</loc><lastmod>2019-07-23T09:58:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/23/building-resilience-to-foreign-interference-misinformation-activities/</loc><lastmod>2019-07-23T08:41:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/23/firmware-vulnerabilities-show-supply-chain-risks/</loc><lastmod>2019-07-23T08:39:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/23/why-rust-for-safe-systems-programming-msrc/</loc><lastmod>2019-07-23T08:39:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/23/chances-of-destructive-bluekeep-exploit-rise-with-new-explainer-posted-online/</loc><lastmod>2019-07-23T08:30:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/22/we-need-a-safer-systems-programming-language-msrc/</loc><lastmod>2019-07-22T09:00:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/22/threat-roundup-for-july-12-to-july-19/</loc><lastmod>2019-07-22T08:49:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/22/hackers-steal-7-5tb-of-data-from-russian-intel-agency-fsbs-contractor/</loc><lastmod>2019-07-22T08:43:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/18/nipe-make-tor-default-gateway-for-network/</loc><lastmod>2019-07-18T13:46:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/18/vulnerability-allows-hackers-to-take-control-of-drupal-8-websites/</loc><lastmod>2019-07-18T08:35:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/17/evilgnome-a-new-backdoor-implant-spies-on-linux-desktop-users/</loc><lastmod>2019-07-17T14:30:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/17/oracles-july-2019-cpu-includes-319-fixes/</loc><lastmod>2019-07-17T13:41:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/17/critical-wordpress-plugin-flaw-leaves-200000-sites-at-risk/</loc><lastmod>2019-07-17T11:15:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/17/apple-pushes-out-another-silent-update-to-address-flaws-in-ringcentral-and-other-video-conferencing-apps/</loc><lastmod>2019-07-17T11:15:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/17/fbi-publishes-gandcrab-decryption-keys/</loc><lastmod>2019-07-17T08:48:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/17/ncsc-releases-2019-active-cyber-defence-report/</loc><lastmod>2019-07-17T08:45:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/16/researcher-releases-poc-code-for-critical-atlassian-crowd-rce-flaw/</loc><lastmod>2019-07-16T10:28:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/16/meet-extenbro-a-new-dns-changer-trojan-protecting-adware/</loc><lastmod>2019-07-16T08:45:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/16/188m-records-exposed-on-mongodb-database/</loc><lastmod>2019-07-16T08:44:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/16/is-revil-the-new-gandcrab-ransomware/</loc><lastmod>2019-07-16T08:43:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/16/office-365-declared-illegal-in-german-schools-due-to-privacy-risks/</loc><lastmod>2019-07-16T08:38:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/16/turla-apt-returns-with-new-malware-anti-censorship-angle/</loc><lastmod>2019-07-16T08:38:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/16/zoom-rce-flaw-also-affects-its-rebranded-versions-ringcentral-and-zhumu/</loc><lastmod>2019-07-16T08:37:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/15/threat-roundup-for-july-5-to-july-12/</loc><lastmod>2019-07-15T13:14:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/15/first-announces-cvss-version-3-1/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2019/07/first-logo-200x120.png</image:loc><image:title>first-logo-200x120</image:title></image:image><lastmod>2019-07-15T09:21:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/12/japan-firm-says-32-million-missing-in-cryptocurrency-hack/</loc><lastmod>2019-07-12T09:21:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/12/mosca-manual-static-analysis-tool-to-find-bugs/</loc><lastmod>2019-07-12T09:10:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/12/human-workers-can-listen-to-google-assistant-recordings/</loc><lastmod>2019-07-12T09:05:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/11/wondering-how-to-whack-zooms-dodgy-hidden-web-server-on-your-mac-no-worries-apples-done-it-for-you/</loc><lastmod>2019-07-11T13:07:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/11/buhtrap-group-used-windows-zero-day-in-government-attack/</loc><lastmod>2019-07-11T12:53:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/11/magecart-hackers-infect-17000-sites-through-misconfigured-amazon-s3-buckets/</loc><lastmod>2019-07-11T12:53:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/09/marriott-faces-123-million-gdpr-fine-in-the-uk-for-last-years-data-breach/</loc><lastmod>2019-07-09T15:21:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/09/sea-turtle-keeps-on-swimming-finds-new-victims-dns-hijacking-techniques/</loc><lastmod>2019-07-09T15:21:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/09/powload-loads-up-on-evasion-techniques/</loc><lastmod>2019-07-09T13:40:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/09/watch-out-microsoft-spotted-spike-in-astaroth-fileless-malware-attacks/</loc><lastmod>2019-07-09T08:24:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/09/flaw-in-zoom-video-conferencing-software-lets-websites-hijack-mac-webcams/</loc><lastmod>2019-07-09T08:24:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/08/entirely-new-malware-silenttrinity-attacks-croation-government/</loc><lastmod>2019-07-08T11:38:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/08/uk-forensics-firm-paid-ransom-in-cyberattack/</loc><lastmod>2019-07-08T08:35:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/08/threat-roundup-for-june-28-to-july-5/</loc><lastmod>2019-07-08T08:34:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/08/insider-attacks-still-far-more-difficult-to-detect-and-prevent-than-external-cyber-attacks/</loc><lastmod>2019-07-08T08:33:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/08/wordpress-plugin-wp-statistics-patches-xss-flaw/</loc><lastmod>2019-07-08T08:30:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/08/canonical-github-account-hijacked/</loc><lastmod>2019-07-08T08:29:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/08/british-airways-fined-183-million-under-gdpr-over-2018-data-breach/</loc><lastmod>2019-07-08T08:28:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/04/ta505-cybergang-debuts-andromut-downloader-to-deliver-flawedammyy-rat-globally/</loc><lastmod>2019-07-04T10:48:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/04/cisco-releases-security-updates-for-multiple-products/</loc><lastmod>2019-07-04T10:16:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/04/multiple-chinese-groups-share-the-same-rtf-weaponizer/</loc><lastmod>2019-07-04T10:02:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/04/the-internet-broke-today-facebook-verizon-and-more-see-major-outages/</loc><lastmod>2019-07-04T09:51:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/03/sodin-ransomware-exploits-windows-vulnerability-and-processor-architecture/</loc><lastmod>2019-07-03T10:26:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/03/cloudflare-outage-caused-by-bad-software-deploy-updated/</loc><lastmod>2019-07-03T09:28:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/03/vulnerability-spotlight-remote-code-execution-vulnerabilities-in-simple-directmedia-layer/</loc><lastmod>2019-07-03T08:59:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/03/u-s-cyber-command-warns-of-outlook-flaw-exploited-by-iranian-hackers/</loc><lastmod>2019-07-03T08:58:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/02/florida-employee-fired-after-paying-460000-bitcoin-ransom/</loc><lastmod>2019-07-02T14:32:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/02/loocipher-the-new-infernal-ransomware/</loc><lastmod>2019-07-02T13:35:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/02/android-july-2019-security-update-patches-33-new-vulnerabilities/</loc><lastmod>2019-07-02T09:09:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/02/researchers-analyze-vietnamese-hackers-suite-of-rats/</loc><lastmod>2019-07-02T09:05:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/01/talos-discovered-spelevo-ek-an-exploit-kit-spreading-via-b2b-website/</loc><lastmod>2019-07-01T08:27:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/01/amass-automated-attack-surface-mapping/</loc><lastmod>2019-07-01T08:26:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/01/mongodb-leak-exposed-millions-of-medical-insurance-records/</loc><lastmod>2019-07-01T08:10:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/01/trickbot-new-injects-new-host/</loc><lastmod>2019-07-01T08:09:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/07/01/slurp-amazon-aws-s3-bucket-enumerator/</loc><lastmod>2019-07-01T08:09:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/28/threat-roundup-for-june-21-to-june-28/</loc><lastmod>2019-06-28T16:08:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/28/cellebrite-claims-it-can-unlock-any-iphone/</loc><lastmod>2019-06-28T12:42:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/28/russian-based-misinformation-campaign-sends-fake-news-from-spoofed-accounts/</loc><lastmod>2019-06-28T09:52:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/28/fake-jquery-campaign-leads-to-malvertising-and-ad-fraud-schemes/</loc><lastmod>2019-06-28T09:30:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/28/while-we-were-raging-about-putins-meddling-and-kremlin-hackers-five-eyes-were-pwning-yandex-russias-google/</loc><lastmod>2019-06-28T09:29:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/28/chronicle-folds-into-google/</loc><lastmod>2019-06-28T09:28:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/28/new-microsoft-excel-attack-vector-surfaces/</loc><lastmod>2019-06-28T09:23:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/27/every-excel-user-vulnerable-by-default-as-new-flaw-found/</loc><lastmod>2019-06-27T12:42:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/27/chrome-os-75-adds-more-mitigations-for-intel-mds-flaws/</loc><lastmod>2019-06-27T12:42:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/27/exclusive-german-police-raid-omnirat-developer-and-seize-digital-assets/</loc><lastmod>2019-06-27T12:41:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/27/amd-secure-encrypted-virtualisation-sev-firmware-patched/</loc><lastmod>2019-06-27T10:45:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/27/greenflash-sundown-exploit-kit-expands-via-large-malvertising-campaign/</loc><lastmod>2019-06-27T08:30:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/27/the-deep-dive-into-how-verizon-and-a-bgp-optimizer-knocked-large-parts-of-the-internet-offline-monday/</loc><lastmod>2019-06-27T08:30:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/27/threat-actors-are-doing-their-homework-researchers-identify-new-impersonation-techniques/</loc><lastmod>2019-06-27T08:28:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/27/new-attack-spreads-lokibot-nanocore-malware-in-iso-image-files/</loc><lastmod>2019-06-27T08:25:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/27/cisco-warns-of-critical-flaws-in-data-center-network-manager/</loc><lastmod>2019-06-27T08:24:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/27/iranian-state-hackers-reload-their-domains-release-off-the-shelf-rat-malware/</loc><lastmod>2019-06-27T08:24:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/27/a-call-to-arms-apple-remote-management-service-udp-reflection-amplification-ddos-attacks/</loc><lastmod>2019-06-27T08:23:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/26/elastic-siem-speed-scale-and-analytical-power-drive-your-security-operations-and-threat-hunting/</loc><lastmod>2019-06-26T11:53:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/26/vlc-media-player-gets-biggest-security-update-ever/</loc><lastmod>2019-06-26T11:52:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/26/exploitpedia-org/</loc><lastmod>2019-06-26T11:50:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/26/alert-new-malicious-ransomware-thats-evil-is-spreading/</loc><lastmod>2019-06-26T08:54:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/26/silex-malware-bricks-thousands-of-iot-devices-in-a-few-hours/</loc><lastmod>2019-06-26T08:39:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/25/aws-security-hub-aggregates-security-alerts-and-conducts-continuous-compliance-checks/</loc><lastmod>2019-06-25T09:01:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/21/threat-roundup-for-june-14-to-june-21/</loc><lastmod>2019-06-21T15:09:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/21/cve-2019-8635-double-free-vulnerability-in-apple-macos-lets-attackers-escalate-system-privileges-and-execute-arbitrary-code/</loc><lastmod>2019-06-21T14:17:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/21/security-flaw-in-pre-installed-dell-support-software-affects-million-of-computers/</loc><lastmod>2019-06-21T09:33:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/21/mozilla-patches-second-firefox-zero-day-used-in-cryptocurrency-attacks/</loc><lastmod>2019-06-21T09:17:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/19/experts-denounce-facebooks-new-cryptocurrency-as-most-dangerous-form-of-surveillance-yet-cbn-news/</loc><lastmod>2019-06-19T12:40:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/19/another-oracle-weblogic-server-rce-under-active-exploitation/</loc><lastmod>2019-06-19T08:53:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/19/firefox-releases-critical-patch-update-to-stop-ongoing-zero-day-attacks/</loc><lastmod>2019-06-19T08:43:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/18/critical-rce-vulnerability-in-tp-link-wi-fi-extenders-can-grant-attackers-remote-control/</loc><lastmod>2019-06-18T10:27:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/18/plurox-modular-backdoor/</loc><lastmod>2019-06-18T10:08:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/18/facebook-plans-to-launch-its-own-digital-coin/</loc><lastmod>2019-06-18T10:06:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/18/end-of-gandcrab-new-free-decryptor-tool-that-let-victims-to-unlock-all-versions-of-ransomware-infection/</loc><lastmod>2019-06-18T09:01:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/18/homeland-security-has-tested-a-working-bluekeep-remote-code-execution-exploit/</loc><lastmod>2019-06-18T08:55:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/18/irked-researcher-discloses-facebook-wordpress-plugin-flaws/</loc><lastmod>2019-06-18T08:55:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/18/netflix-discovers-sack-panic-and-other-linux-security-flaws/</loc><lastmod>2019-06-18T08:55:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/17/exposed-database-dumps-pii-of-1-6-million-job-seekers/</loc><lastmod>2019-06-17T14:57:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/17/yubico-recalls-fips-yubikey-tokens-after-flaw-found/</loc><lastmod>2019-06-17T12:05:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/17/human-error-still-the-cause-of-many-data-breaches/</loc><lastmod>2019-06-17T08:59:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/17/from-targeted-attack-to-untargeted-attack/</loc><lastmod>2019-06-17T08:53:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/15/threat-roundup-for-june-7-to-june-14/</loc><lastmod>2019-06-15T20:50:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/15/common-hacker-tool-hit-with-hackable-vulnerability/</loc><lastmod>2019-06-15T20:50:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/15/xenotime-threat-actor-now-is-targeting-electric-utilities-in-us-and-apac/</loc><lastmod>2019-06-15T10:23:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/14/aesddos-botnet-malware-infiltrates-containers-via-exposed-docker-apis/</loc><lastmod>2019-06-14T12:11:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/14/evolving-the-kill-chain-approach-to-protect-cloud-based-applications/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2019/06/89uhcu3jqbn8rhthn7wnmg-320-80.jpg</image:loc><image:title>89uhcu3jqbn8rhthn7wnmg-320-80</image:title></image:image><lastmod>2019-06-14T09:03:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/14/yubico-replacing-yubikey-fips-devices-due-to-security-issue/</loc><lastmod>2019-06-14T08:53:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/14/millions-of-exim-mail-servers-are-currently-under-attack/</loc><lastmod>2019-06-14T08:53:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/13/xss-vulnerability-exposed-google-employees-to-attacks/</loc><lastmod>2019-06-13T14:40:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/13/ai-enabled-cyber-attacks-a-reality-soon-warns-mikko-hypponen/</loc><lastmod>2019-06-13T12:29:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/13/ransomware-disrupts-worldwide-production-for-belgian-aircraft-parts-maker/</loc><lastmod>2019-06-13T10:10:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/13/cisco-releases-security-update-for-cisco-ios-xe/</loc><lastmod>2019-06-13T08:47:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/13/vulnerable-software-the-gift-that-keeps-on-giving/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2019/06/website-1024x512-1.jpg</image:loc><image:title>website-1024x512-1</image:title></image:image><lastmod>2019-06-13T08:43:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/13/outlaw-hacking-groups-botnet-observed-spreading-miner-perl-based-backdoor/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2019/06/cyberrime-200x200.jpg</image:loc><image:title>cyberrime-200x200</image:title></image:image><lastmod>2019-06-13T08:39:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/13/researchers-discover-fishwrap-influence-campaign-recycling-old-terror-news/</loc><lastmod>2019-06-13T08:30:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/13/google-expert-disclosed-details-of-an-unpatched-flaw-in-symcrypt-library/</loc><lastmod>2019-06-13T08:27:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/13/flaw-in-evernote-web-clipper-for-chrome-extension-allows-stealing-data/</loc><lastmod>2019-06-13T08:25:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/13/telegram-hit-by-cyber-attack-ceo-points-to-hk-protests-china/</loc><lastmod>2019-06-13T08:25:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/12/predicting-vulnerability-weaponization/</loc><lastmod>2019-06-12T14:51:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/12/shifting-tactics-breaking-down-ta505-groups-use-of-html-rats-and-other-techniques-in-latest-campaigns/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2019/06/fig-18-ta505-obfuscated-vba-macro.png</image:loc><image:title>fig-18-ta505-obfuscated-vba-macro</image:title></image:image><image:image><image:loc>https://securityx.space/wp-content/uploads/2019/06/fig-19-ta505-suspicious-attack-excel-information.png</image:loc><image:title>fig-19-ta505-suspicious-attack-excel-information</image:title></image:image><image:image><image:loc>https://securityx.space/wp-content/uploads/2019/06/fig-20-ta505-excel-information.png</image:loc><image:title>fig-20-ta505-excel-information</image:title></image:image><image:image><image:loc>https://securityx.space/wp-content/uploads/2019/06/fig-11-ta505-executed-parameters.png</image:loc><image:title>fig-11-ta505-executed-parameters</image:title></image:image><image:image><image:loc>https://securityx.space/wp-content/uploads/2019/06/fig-12-ta505-extracted-files.png</image:loc><image:title>fig-12-ta505-extracted-files</image:title></image:image><image:image><image:loc>https://securityx.space/wp-content/uploads/2019/06/fig-13-ta505-rms-rat.png</image:loc><image:title>fig-13-ta505-rms-rat</image:title></image:image><image:image><image:loc>https://securityx.space/wp-content/uploads/2019/06/fig-14-ta505-command-url-userform.jpg</image:loc><image:title>fig-14-ta505-command-url-userform</image:title></image:image><image:image><image:loc>https://securityx.space/wp-content/uploads/2019/06/fig-15-ta505-attached-html.png</image:loc><image:title>fig-15-ta505-attached-html</image:title></image:image><image:image><image:loc>https://securityx.space/wp-content/uploads/2019/06/fig-16-ta505-html-message-before-excel-download.png</image:loc><image:title>fig-16-ta505-html-message-before-excel-download</image:title></image:image><image:image><image:loc>https://securityx.space/wp-content/uploads/2019/06/fig-17-ta505-suspicious-attack-excel-display.png</image:loc><image:title>fig-17-ta505-suspicious-attack-excel-display</image:title></image:image><lastmod>2019-06-12T12:18:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/12/critical-microsoft-ntlm-vulnerabilities-allow-remote-code-execution-on-any-windows-machine/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2019/06/ntlm-relay-basic-flow.jpg</image:loc><image:title>ntlm-relay-basic-flow</image:title></image:image><lastmod>2019-06-12T08:52:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/12/cross-site-scripting-errors-continue-to-be-most-common-web-app-flaw/</loc><lastmod>2019-06-12T08:49:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/12/3-4-billion-fake-emails-are-sent-around-the-world-every-day/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2019/06/valimail-062019-1.jpg</image:loc><image:title>valimail-062019-1</image:title></image:image><image:image><image:loc>https://securityx.space/wp-content/uploads/2019/06/valimail-062019-2.jpg</image:loc><image:title>valimail-062019-2</image:title></image:image><lastmod>2019-06-12T08:47:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/12/new-version-of-shelltea-backdoor-used-by-fin8-hacking-group/</loc><lastmod>2019-06-12T08:39:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/12/new-rambleed-attack-allows-access-to-sensitive-data-in-memory/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2019/06/rambleed.png</image:loc><image:title>rambleed</image:title></image:image><lastmod>2019-06-12T08:30:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/12/google-confirms-presence-of-triada-backdoor-in-cheap-android-phones/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2019/06/google-confirms-presence-of-triada-backdoor-in-cheap-android-phones-2.png</image:loc><image:title>google-confirms-presence-of-triada-backdoor-in-cheap-android-phones-2</image:title></image:image><lastmod>2019-06-12T08:29:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/12/google-decloaks-win-dos-bug-before-patch-is-released/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2019/06/taur63y9_normal.jpg</image:loc><image:title>taur63y9_normal</image:title></image:image><lastmod>2019-06-12T08:27:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/12/microsoft-patch-tuesday-security-updates-for-june-2019-fix-88-flaws/</loc><lastmod>2019-06-12T08:24:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/11/how-ursnif-evolves-to-keep-threatening-italy/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2019/06/ursnif-r1-1.png</image:loc><image:title>ursnif-r1-1</image:title></image:image><lastmod>2019-06-11T14:58:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/11/adobe-issues-critical-patches-for-coldfusion-flash-player-campaign-software/</loc><lastmod>2019-06-11T14:55:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/11/top-secret-from-ciphers-to-cyber-security-science-museum/</loc><lastmod>2019-06-11T13:16:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/11/using-anomaly-detection-to-find-malicious-domains/</loc><lastmod>2019-06-11T13:14:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/11/gdpr-one-year-on-what-have-we-learned/</loc><lastmod>2019-06-11T13:00:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/11/treadstone-71-unveils-cyber-intelligence-lifecycle-solution/</loc><lastmod>2019-06-11T12:59:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/11/new-flaw-in-wordpress-live-chat-plugin-lets-hackers-steal-and-hijack-sessions/</loc><lastmod>2019-06-11T11:54:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/11/rapid7-releases-industry-cyber-exposure-report-ftse-250/</loc><lastmod>2019-06-11T10:11:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/11/hackers-steal-100000-traveler-photos-from-border-patrol-database/</loc><lastmod>2019-06-11T08:50:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/11/vlc-player-gets-patched-for-two-high-severity-bugs/</loc><lastmod>2019-06-11T08:44:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/11/muddywater-apt-group-updated-its-multi-stage-powershell-backdoor-powerstats/</loc><lastmod>2019-06-11T08:41:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/11/cve-2019-2725-oracle-weblogic-flaw-exploited-in-cryptojacking-campaign/</loc><lastmod>2019-06-11T08:41:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/10/shanghai-jiao-tong-university-data-leak-8-4tb-in-email-metadata-exposed/</loc><lastmod>2019-06-10T15:23:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/10/cve-2019-2725-exploited-and-certificate-files-used-for-obfuscation-to-deliver-monero-miner/</loc><lastmod>2019-06-10T08:57:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/10/major-hsm-vulnerabilities-impact-banks-cloud-providers-governments/</loc><lastmod>2019-06-10T08:51:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/07/threat-roundup-for-may-31-to-june-7/</loc><lastmod>2019-06-07T20:06:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/07/sandboxescaper-debuts-byebear-windows-patch-bypass/</loc><lastmod>2019-06-07T20:04:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2019/06/07/forget-bluekeep-beware-the-goldbrute/</loc><lastmod>2019-06-07T20:04:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/06/02/exploiting-difficult-sql-injection-vulnerabilities-using-sqlmap-part-1/</loc><lastmod>2017-06-02T11:27:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/06/02/interesting-http-headers/</loc><lastmod>2017-06-02T11:26:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/06/02/bookfresh-tricky-file-upload-bypass-to-rce-security-geek/</loc><lastmod>2017-06-02T11:24:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/06/02/m1nd-b3nd3rboopsuite/</loc><lastmod>2017-06-02T11:23:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/06/02/tainted-leaks-disinformation-and-phishing-with-a-russian-nexus-the-citizen-lab/</loc><lastmod>2017-06-02T11:22:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/06/02/threatconnect-research-on-fancyb/</loc><lastmod>2017-06-02T11:20:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/06/02/common-weaknesses-in-your-windows-network-fox-it-ntlm-relay/</loc><lastmod>2017-06-02T11:20:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/06/02/secraryinjectproc/</loc><lastmod>2017-06-02T11:20:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/06/02/theshadowbrokers-monthly-dump-service-june-2017-steemit/</loc><lastmod>2017-06-02T11:19:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/06/02/breaking-out-of-citrix-and-other-restricted-desktop-environments-pen-test-partners/</loc><lastmod>2017-06-02T11:18:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/06/02/red-on-red-the-attack-landscape-of-the-dark-web-trendlabs-security-intelligence-blog/</loc><lastmod>2017-06-02T11:18:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/06/02/operation-bachosens-a-detailed-look-into-a-long-running-cyber-crime-campaign/</loc><lastmod>2017-06-02T11:17:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/06/02/wikileaks-releases-pandemic/</loc><lastmod>2017-06-02T11:17:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/05/22/wikileaks-vault-7-aftermidnight-assassin-implant/</loc><lastmod>2017-05-22T09:12:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/05/22/web-developer-security-checklist-simple-security/</loc><lastmod>2017-05-22T09:12:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/05/22/appcanary-everything-you-need-to-know-about-http-security-headers/</loc><lastmod>2017-05-22T09:12:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/05/22/the-increased-use-of-powershell-in-attacks-pdf/</loc><lastmod>2017-05-22T09:11:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/05/22/the-equation-groups-post-exploitation-tools-danderspritz-and-more-part-1/</loc><lastmod>2017-05-22T09:11:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/05/22/ewildedpsychopath/</loc><lastmod>2017-05-22T09:10:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/05/22/at-least-3-different-groups-have-been-leveraging-the-nsa-eternalblue-exploit-whats-went-wrong/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/05/eternalblue-smb-flaw.png</image:loc><image:title>eternalblue-smb-flaw</image:title></image:image><lastmod>2017-05-22T09:08:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/05/12/nhs-hit-by-cyber-attack-at-least-one-hospital-shut-down/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/05/nhs_hosptial_photo_by_marbury_via_shutterstock.jpg</image:loc><image:title>nhs_hosptial_photo_by_marbury_via_shutterstock</image:title></image:image><lastmod>2017-05-12T15:47:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/05/10/new-iot-malware-targets-100000-ip-cameras-via-known-flaw/</loc><lastmod>2017-05-10T09:38:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/05/10/cia-zero-day-that-hijacked-cisco-switches-for-years-is-finally-dead/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/05/cia-lobby-seal-533x380.jpg</image:loc><image:title>cia-lobby-seal-533x380</image:title></image:image><lastmod>2017-05-10T09:35:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/05/10/3-of-4-zero-days-microsoft-patched-yesterday-were-used-by-russian-cyberspies/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/05/zero-day.png</image:loc><image:title>zero-day</image:title></image:image><lastmod>2017-05-10T09:35:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/05/10/vulnerability-allowed-hackers-to-steal-icloud-keychain-secrets/</loc><lastmod>2017-05-10T09:34:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/05/08/website-of-popular-mac-software-hacked-to-spread-malware/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/05/9842f-zfgjnkujmqspo6i_mp-sehwlzbzgwsokqclcb.png</image:loc><image:title>9842f-zfgjnkujmqspo6i_mp-sehwlzbzgwsokqclcb</image:title></image:image><lastmod>2017-05-08T11:39:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/05/08/google-0-day-hunter-finds-worst-windows-rce-exploit-of-all-time/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/05/51160-opyhjyzhbxmhnzy9ci4s2pxo-827sfcsqclcb.png</image:loc><image:title>51160-opyhjyzhbxmhnzy9ci4s2pxo-827sfcsqclcb</image:title></image:image><lastmod>2017-05-08T11:37:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/05/04/exploitbox-io-a-playground-labs-for-hackers-0day-bug-hunters-pentesters-security-researchers/</loc><lastmod>2017-05-04T15:38:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/05/04/russian-hackers-are-believed-to-have-targeted-frances-favorite-to-win-the-presidential-election/</loc><lastmod>2017-05-04T15:36:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/05/04/dont-trust-oauth-why-the-google-docs-worm-was-so-convincing/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/05/google-phish-3-760x380.png</image:loc><image:title>google-phish-3-760x380</image:title></image:image><lastmod>2017-05-04T15:11:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/05/02/intel-patches-nine-year-old-critical-cpu-vulnerability/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/05/protsessor-intel.png</image:loc><image:title>protsessor-intel</image:title></image:image><lastmod>2017-05-02T14:22:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/05/02/ibm-has-been-shipping-malware-infected-usb-sticks/</loc><lastmod>2017-05-02T14:21:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/05/02/greenbugs-dns-isms/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/05/900x688xprayingmantis_2-1024x783-pagespeed-ic-gedsx0feuv.png</image:loc><image:title>900x688xprayingmantis_2-1024x783-pagespeed-ic-gedsx0feuv</image:title></image:image><lastmod>2017-05-02T14:21:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/04/28/google-and-facebook-duped-out-of-100-million-in-phishing-scam/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/04/95824975_gettyimages-516894472.jpg</image:loc><image:title>95824975_gettyimages-516894472</image:title></image:image><lastmod>2017-04-28T16:24:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/04/28/use-of-dns-tunneling-for-cc-communications/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/04/backdoor_dns_eng_8.png</image:loc><image:title>backdoor_dns_eng_8</image:title></image:image><lastmod>2017-04-28T10:50:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/04/28/new-macos-malware-signed-with-legit-apple-id-found-spying-on-https-traffic/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/04/97992-2y5xiqwgwu09yworuztink8q842wwoicgclcb.png</image:loc><image:title>97992-2y5xiqwgwu09yworuztink8q842wwoicgclcb</image:title></image:image><lastmod>2017-04-28T09:28:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/04/28/deep-dive-into-xee/</loc><lastmod>2017-04-28T09:12:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/04/28/mimipenguin/</loc><lastmod>2017-04-28T09:10:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/04/28/new-owasp-top-10-reveals-critical-weakness-in-application-defenses/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/04/owasp10.png</image:loc><image:title>owasp10</image:title></image:image><lastmod>2017-04-28T09:05:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/04/27/discovery-of-8800-c2-servers-sends-warning-to-asian-cybercriminals/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/04/shutterstock_50757469.jpg</image:loc><image:title>shutterstock_50757469</image:title></image:image><lastmod>2017-04-27T16:47:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/04/27/unplug-the-bitcoin-miner-and-do-us-all-a-favour-antminer-has-remote-shutdown-flaw/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/04/bitcoin_photo_via_shutterstock.jpg</image:loc><image:title>bitcoin_photo_via_shutterstock</image:title></image:image><lastmod>2017-04-27T09:12:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/04/27/almost-two-million-androids-infected-by-falseguide-malware-masquerading-as-game-guides/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/04/shadowfight.jpeg</image:loc><image:title>shadowfight</image:title></image:image><lastmod>2017-04-27T09:10:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/04/27/hackers-exploited-word-flaw-for-months-while-microsoft-investigated/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/04/25032d5b641f09745f2932ef97d36f8e.jpg</image:loc><image:title>25032d5b641f09745f2932ef97d36f8e</image:title></image:image><lastmod>2017-04-27T09:09:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/04/27/hajime-vigilante-botnet-growing-rapidly-hijacks-300000-iot-devices-worldwide/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/04/ba85e-8dkouyv2cxmklc8kvf6635fcip_ugj-egclcb.png</image:loc><image:title>ba85e-8dkouyv2cxmklc8kvf6635fcip_ugj-egclcb</image:title></image:image><lastmod>2017-04-27T09:08:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/04/26/nsa-backdoor-detected-on-55000-windows-boxes-can-now-be-remotely-removed/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/04/doublepulsar-uninstall-800x257.jpg</image:loc><image:title>doublepulsar-uninstall-800x257</image:title></image:image><lastmod>2017-04-26T15:03:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/04/21/lazarus-under-the-hood-kaspersky-pdf/</loc><lastmod>2017-04-21T08:07:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/04/21/script-kiddies-pwn-1000s-of-windows-boxes-using-leaked-nsa-hack-tools/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/04/shutterstock_hacker_kid.jpg</image:loc><image:title>shutterstock_hacker_kid</image:title></image:image><lastmod>2017-04-21T08:04:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/04/20/a-surprise-encounter-with-a-telco-apt-pdf/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/04/tumblr_inline_ooo1xqtaye1rda6tj_540.png</image:loc><image:title>tumblr_inline_ooo1xqtaye1rda6tj_540</image:title></image:image><lastmod>2017-04-20T09:15:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/04/20/alessandrozberoot/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/04/tumblr_inline_ooo4886qdu1rda6tj_540.png</image:loc><image:title>tumblr_inline_ooo4886qdu1rda6tj_540</image:title></image:image><lastmod>2017-04-20T09:14:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/04/20/exploits-how-great-is-the-threat/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/04/exploits_eng_1.jpg</image:loc><image:title>exploits_eng_1</image:title></image:image><lastmod>2017-04-20T09:12:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/04/20/introduction-to-the-nist-cybersecurity-framework-for-a-landscape-of-cyber-menaces/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/04/nist-cybersecurity-framework.png</image:loc><image:title>nist-cybersecurity-framework</image:title></image:image><lastmod>2017-04-20T09:11:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/04/19/netsec-cldap-protocol-allows-ddos-attacks-with-70x-amplification-factor/</loc><lastmod>2017-04-19T13:41:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/04/19/netsec-dropping-reverse-shells-via-ssh/</loc><lastmod>2017-04-19T13:40:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/04/19/netsec-the-ring-road-bug/</loc><lastmod>2017-04-19T13:40:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/04/19/feeding-frenzy-the-inside-scoop-on-threat-intelligence-feeds/</loc><lastmod>2017-04-19T13:39:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/04/19/netsec-cve-2017-0199-practical-exploitation-poc-from-httpift-ttvn2j4u/</loc><lastmod>2017-04-19T13:39:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/04/19/netsec-building-a-keyword-monitoring-pipeline-with-python-pastebin-and-searx/</loc><lastmod>2017-04-19T13:39:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/04/19/netsec-unitrends-bug-hunting-remote-code-execution-cve-2017-7820-chapter-2/</loc><lastmod>2017-04-19T13:39:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/04/19/netsec-new-open-source-rat-uses-telegram-protocol-to-steal-data-from-victims/</loc><lastmod>2017-04-19T13:38:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/04/19/of-pigs-and-malware-examining-a-possible-member-of-the-winnti-group/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/04/figure1_winnti.jpg</image:loc><image:title>figure1_winnti</image:title></image:image><lastmod>2017-04-19T13:35:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/04/19/indian-hackers-leaks-1-7-million-snapchat-user-data/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/04/landscape-1476445487-gettyimages-610622764-1.jpg</image:loc><image:title>landscape-1476445487-gettyimages-610622764-1</image:title></image:image><lastmod>2017-04-19T12:51:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/04/19/record-oracle-patch-update-addresses-shadowbrokers-struts-2-vulnerabilities/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/04/oracle_patch1.jpg</image:loc><image:title>oracle_patch1</image:title></image:image><lastmod>2017-04-19T12:49:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/04/18/special-forces-guide-to-information-operations-pdf/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/04/tumblr_inline_ook6ezvocs1rda6tj_540.png</image:loc><image:title>tumblr_inline_ook6ezvocs1rda6tj_540</image:title></image:image><lastmod>2017-04-18T20:44:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/04/18/the-shadow-brokers-lost-in-translation/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/04/tumblr_inline_ook7d7txuc1rda6tj_540.png</image:loc><image:title>tumblr_inline_ook7d7txuc1rda6tj_540</image:title></image:image><lastmod>2017-04-18T20:42:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/04/18/inside-the-stalkerware-surveillance-market-where-ordinary-people-tap-each-others-phones/</loc><lastmod>2017-04-18T20:41:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/04/18/juliocesarfortpublic-pentesting-reports/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/04/tumblr_o7fh4ut9id1unnnneo1_500.gif</image:loc><image:title>tumblr_o7fh4ut9id1unnnneo1_500</image:title></image:image><lastmod>2017-04-18T20:40:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/04/18/evilginx-advanced-phishing-with-two-factor-authentication-bypass/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/04/tumblr_oe2j1h16mj1tdablco1_500.gif</image:loc><image:title>tumblr_oe2j1h16mj1tdablco1_500</image:title></image:image><lastmod>2017-04-18T20:39:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/04/18/the-shadow-brokers-leaked-exploits-explained/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/04/buildabunker.jpg</image:loc><image:title>buildabunker</image:title></image:image><lastmod>2017-04-18T20:36:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/04/18/us-cyber-attacks-may-be-bringing-north-korean-missiles-down/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/04/telemmglpict000125128782-xlarge_trans_nvbqzqnjv4bq4gosuj5tx-coxjjhdsbw9f07bulk_ys21mi2d_qve4.jpeg</image:loc><image:title>telemmglpict000125128782-xlarge_trans_nvbqzqnjv4bq4gosuj5tx-coxjjhdsbw9f07bulk_ys21mi2d_qve4</image:title></image:image><lastmod>2017-04-18T20:36:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/04/18/swift-system-unaffected-following-shadow-brokers-leak/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/04/dr-fb-button.jpg</image:loc><image:title>dr-fb-button</image:title></image:image><lastmod>2017-04-18T20:35:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/04/18/hackers-using-pixel-tracking-to-build-data-for-better-phishing-practices/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/04/screen-933307_1920.jpg</image:loc><image:title>screen-933307_1920</image:title></image:image><lastmod>2017-04-18T20:34:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/04/18/russian-hacker-selling-cheap-ransomware-as-a-service-on-dark-web/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/04/ransomware-as-a-service.png</image:loc><image:title>ransomware-as-a-service</image:title></image:image><lastmod>2017-04-18T20:33:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/04/18/shadow-brokers-leaks-show-us-spies-successfully-hacked-russian-iranian-targets/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/04/nsa_hq_2.jpg</image:loc><image:title>nsa_hq_2</image:title></image:image><lastmod>2017-04-18T20:32:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/04/13/new-breed-of-ddos-attack-on-the-rise/</loc><lastmod>2017-04-13T22:16:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/04/11/solaris-admins-look-out-working-remote-root-exploit-leaked-in-shadow-brokers-dump/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/04/security_shutterstock.jpg</image:loc><image:title>security_shutterstock</image:title></image:image><lastmod>2017-04-11T08:38:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/04/11/evil-isps-could-disrupt-bitcoins-blockchain/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/04/bitcoin_punch_card.jpg</image:loc><image:title>bitcoin_punch_card</image:title></image:image><lastmod>2017-04-11T08:37:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/04/11/microsoft-set-to-patch-new-zero-day-office-vulnerability/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/04/290x195databreachoct2011.jpeg</image:loc><image:title>290x195databreachoct2011</image:title></image:image><lastmod>2017-04-11T08:36:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/04/10/longhorn-tools-used-by-cyberespionage-group-linked-to-vault-7/</loc><lastmod>2017-04-10T21:14:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/04/10/symantec-connects-40-cyber-attacks-to-cia-hacking-tools-exposed-by-wikileaks/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/04/ddde4-sfqbw4vvdbmbbvmsf4oecrzf2svvqg-vaclcb.png</image:loc><image:title>ddde4-sfqbw4vvdbmbbvmsf4oecrzf2svvqg-vaclcb</image:title></image:image><lastmod>2017-04-10T21:08:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/04/10/payday-lender-wonga-confirms-data-breach/</loc><lastmod>2017-04-10T12:01:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/04/10/researchers-warn-of-a-windows-zero-day-attack-observed-in-the-wild/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/04/windows-zero-day-attack.png</image:loc><image:title>windows-zero-day-attack</image:title></image:image><lastmod>2017-04-10T11:59:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/04/10/us-election-hacking-russian-man-arrested-in-spain-at-request-of-american-authorities/</loc><lastmod>2017-04-10T11:58:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/04/09/penquins-moonlit-maze/</loc><lastmod>2017-04-09T20:14:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/04/09/menupass-apt10-quasarrat/</loc><lastmod>2017-04-09T20:11:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/04/09/beware-of-an-unpatched-microsoft-word-0-day-flaw-being-exploited-in-the-wild/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/04/1e003-n4oxcfa1msnmqnzujvjh63y8i1z9twsaclcb.png</image:loc><image:title>1e003-n4oxcfa1msnmqnzujvjh63y8i1z9twsaclcb</image:title></image:image><lastmod>2017-04-09T20:03:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/04/08/shadow-brokers-group-releases-more-stolen-nsa-hacking-tools-exploits/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/04/5f934-mmigvirskzycppvw3g82s7lcfgulhb6maclcb.png</image:loc><image:title>5f934-mmigvirskzycppvw3g82s7lcfgulhb6maclcb</image:title></image:image><lastmod>2017-04-08T20:37:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/04/07/wikileaks-details-cia-tool-for-creating-windows-malware-installers/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/04/cia_hacking_leaks.jpg</image:loc><image:title>cia_hacking_leaks</image:title></image:image><lastmod>2017-04-07T16:44:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/04/07/hackers-take-down-entire-dns-for-brazilian-bank/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/04/bank.jpg</image:loc><image:title>bank</image:title></image:image><lastmod>2017-04-07T09:38:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/04/07/china-based-threat-actor-apt10-ramps-up-cyber-espionage-activity/</loc><lastmod>2017-04-07T09:36:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/04/07/20000-bots-strong-sathurbot-botnet-grows-by-compromising-wordpress-sites/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/04/wordpress-biohazard.jpg</image:loc><image:title>wordpress-biohazard</image:title></image:image><lastmod>2017-04-07T09:35:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/04/07/rash-of-in-the-wild-attacks-permanently-destroys-poorly-secured-iot-devices/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/04/broken-circuit-board-800x533.jpg</image:loc><image:title>broken-circuit-board-800x533</image:title></image:image><lastmod>2017-04-07T09:32:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/04/05/samsungs-tizen-is-riddled-with-security-flaws-amateurishly-written/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/04/samsung-smart-tv-800x450.jpg</image:loc><image:title>samsung-smart-tv-800x450</image:title></image:image><lastmod>2017-04-05T10:24:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/04/05/south-korean-users-targeted-with-a-new-stealthy-malware-the-rokrat-rat/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/04/hangul-word-processor-document.png</image:loc><image:title>hangul-word-processor-document</image:title></image:image><lastmod>2017-04-05T10:23:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/04/04/apple-patches-drive-by-wi-fi-flaw-with-emergency-ios-patch/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/04/wifi.jpg</image:loc><image:title>wifi</image:title></image:image><lastmod>2017-04-04T09:34:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/04/04/hackers-are-emptying-atms-with-a-single-drilled-hole-and-15-worth-of-gear/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/04/atm-hack-564374241-1200x630-e1490999883628.jpg</image:loc><image:title>atm-hack-564374241-1200x630-e1490999883628</image:title></image:image><lastmod>2017-04-04T09:33:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/31/wikileaks-releases-marble-source-code-used-by-the-cia-to-hide-the-source-of-malware-it-deployed/</loc><lastmod>2017-03-31T12:53:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/31/samsung-galaxy-s8s-facial-unlocking-feature-can-be-fooled-with-a-photo/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/03/c05bb-cmuoo34_bkepvaff1qcz0bmjdiogrqbwclcb.png</image:loc><image:title>c05bb-cmuoo34_bkepvaff1qcz0bmjdiogrqbwclcb</image:title></image:image><lastmod>2017-03-31T09:32:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/31/researchers-steal-data-from-shared-cache-of-two-cloud-vms/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/03/road_narrows_648.jpg</image:loc><image:title>road_narrows_648</image:title></image:image><lastmod>2017-03-31T09:26:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/31/people-are-still-the-biggest-security-threat-to-any-organization/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/03/haystax-032017-1.jpg</image:loc><image:title>haystax-032017-1</image:title></image:image><lastmod>2017-03-31T09:25:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/31/the-first-horseman-of-the-privacy-apocalypse-has-already-arrived-verizon-announces-plans-to-install-spyware-on-all-its-android-phones/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/03/icon-privacy-1.png</image:loc><image:title>icon-privacy-1</image:title></image:image><lastmod>2017-03-31T09:25:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/31/hillary-clinton-campaign-staff-targeted-by-russian-hackers-during-election-researcher/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/03/trump_russia_probe_75145-95d9e.jpg</image:loc><image:title>Thomas Rid</image:title></image:image><lastmod>2017-03-31T09:24:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/30/actively-exploited-zero-day-in-iis-6-0-affects-60000-servers/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/03/microsoft-shade.jpg</image:loc><image:title>microsoft-shade</image:title></image:image><lastmod>2017-03-30T10:14:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/30/nuclear-bot-source-code-leaked-online-a-new-threat-will-rapidly-spread-in-the-wild/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/03/nukebot-trojan.png</image:loc><image:title>nukebot-trojan</image:title></image:image><lastmod>2017-03-30T10:13:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/29/new-mirai-variant-used-in-54-hour-ddos-attack-against-us-college/</loc><lastmod>2017-03-29T15:10:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/29/iis-6-0-vulnerability-leads-to-code-execution/</loc><lastmod>2017-03-29T15:08:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/29/millions-of-stolen-us-university-email-credentials-for-sale-on-the-dark-web/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/03/dcaratio-chart-jpg-003.jpg</image:loc><image:title>dcaratio-chart-jpg-003</image:title></image:image><lastmod>2017-03-29T15:07:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/28/symantec-api-flaws-reportedly-let-attackers-steal-private-ssl-keys-and-certificates/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/03/8baac-iesdqluvrte0npeekkbcgktioh1zcal4qclcb.png</image:loc><image:title>8baac-iesdqluvrte0npeekkbcgktioh1zcal4qclcb</image:title></image:image><lastmod>2017-03-28T11:34:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/27/giftghostbot-the-malicious-bot-attempting-to-compromise-gift-cards-across-1000-websites/</loc><lastmod>2017-03-27T14:54:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/27/apt29-domain-fronting-with-tor/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/03/0.jpg</image:loc></image:image><lastmod>2017-03-27T13:24:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/23/vault7-wikileaks-releases-dark-matter-batch-of-cia-hacking-tactics-for-apple-products/</loc><lastmod>2017-03-23T15:56:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/23/winnti-group-uses-github-for-cc-communications/</loc><lastmod>2017-03-23T10:31:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/23/russian-hacker-pleads-guilty-to-developing-and-distributing-citadel-trojan/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/03/f0088-3adfvdbwv3qbiiacu6d91si2fnzewcliaclcb.png</image:loc><image:title>f0088-3adfvdbwv3qbiiacu6d91si2fnzewcliaclcb</image:title></image:image><lastmod>2017-03-23T10:31:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/22/poc-or-gtfo-0x14/</loc><lastmod>2017-03-22T14:51:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/22/the-map-of-cybersecurity-domains-version-2-0/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/03/tumblr_inline_on6fqewf5z1rda6tj_540.png</image:loc><image:title>tumblr_inline_on6fqewf5z1rda6tj_540</image:title></image:image><lastmod>2017-03-22T13:21:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/22/lastpass-flaws-allow-hackers-to-steal-passwords/</loc><lastmod>2017-03-22T13:18:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/22/unpatchable-doubleagent-attack-can-hijack-all-windows-versions-even-your-antivirus/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/03/hack-antivirus-microsoft-application-verifier-dll-injection.png</image:loc><image:title>hack-antivirus-microsoft-application-verifier-dll-injection</image:title></image:image><lastmod>2017-03-22T13:17:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/21/hackers-claim-they-will-wipe-iphones-and-icloud-accounts-unless-apple-pays-ransom/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/03/wipe-device.jpeg</image:loc><image:title>wipe-device</image:title></image:image><lastmod>2017-03-21T14:28:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/21/park-uses-facial-recognition-to-wipe-out-toilet-paper-thieves/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/03/shutterstock_586872473.jpg</image:loc><image:title>shutterstock_586872473</image:title></image:image><lastmod>2017-03-21T12:24:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/21/alexseys-ttps/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/03/tumblr_inline_on4knzeedd1rda6tj_540.png</image:loc><image:title>tumblr_inline_on4knzeedd1rda6tj_540</image:title></image:image><lastmod>2017-03-21T09:53:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/21/old-linux-kernel-security-bug-bites/</loc><lastmod>2017-03-21T09:43:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/21/over-20-million-gmail-and-5-million-yahoo-accounts-available-for-sale-on-the-dark-web/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/03/640000-playstation-accounts-darkweb1.png</image:loc><image:title>640000-playstation-accounts-darkweb1</image:title></image:image><lastmod>2017-03-21T09:43:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/20/disable-telnet-cisco-finds-0-day-in-cia-dump-affecting-over-300-network-switch-models/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/03/3000c-m1ckn0mm_oqcs4ot4j8gwjwld4vtiq0egclcb.png</image:loc><image:title>3000c-m1ckn0mm_oqcs4ot4j8gwjwld4vtiq0egclcb</image:title></image:image><lastmod>2017-03-20T09:26:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/16/personal-data-leak-affects-33-million-us-employees/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/03/dr-fb-button.jpg</image:loc><image:title>dr-fb-button</image:title></image:image><lastmod>2017-03-16T14:01:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/16/ransomware-operators-are-hiding-malware-deeper-in-installer-packages/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/03/nsis-unique-graph.jpg</image:loc><image:title>nsis-unique-graph</image:title></image:image><lastmod>2017-03-16T11:31:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/16/new-majikpos-malware-targets-users-in-across-north-america-and-canada/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/03/majikpos-c2-panel.png</image:loc><image:title>majikpos-c2-panel</image:title></image:image><lastmod>2017-03-16T11:30:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/16/acronym-m-is-for-malware/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/03/500x381xphonehome-300x229-pagespeed-ic-k8qgazp1k8.png</image:loc><image:title>500x381xphonehome-300x229-pagespeed-ic-k8qgazp1k8</image:title></image:image><lastmod>2017-03-16T10:53:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/14/wordpress-rest-api-bug-could-be-used-in-stored-xss-attacks/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/03/wordpress_patch.jpg</image:loc><image:title>wordpress_patch</image:title></image:image><lastmod>2017-03-14T16:32:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/14/cyber-criminals-could-start-holding-smartphones-ransom-warns-authorities/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/03/58c7b0582700003800749cd1.jpeg</image:loc><image:title>Typing</image:title></image:image><lastmod>2017-03-14T10:26:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/13/researchers-infiltrate-cc-server-behind-cryptoblock-ransomware/</loc><lastmod>2017-03-13T23:04:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/13/the-cve-2017-5638-apache-struts-2-command-execution-flaw-affects-cisco-products/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/03/cisco-struts-2.jpg</image:loc><image:title>cisco-struts-2</image:title></image:image><lastmod>2017-03-13T13:27:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/13/chipsec-intel-security-releases-detection-tool-also-for-cia-efi-rootkits/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/03/secure-boot-uefi.jpg</image:loc><image:title>secure-boot-uefi</image:title></image:image><lastmod>2017-03-13T08:57:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/10/rupert-murdochs-news-corp-erased-20-million-emails-amid-phone-hacking-probe/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/03/1489105965745.jpg</image:loc><image:title>1489105965745</image:title></image:image><lastmod>2017-03-10T09:38:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/10/hundreds-of-thousands-of-vulnerable-ip-cameras-easy-target-for-botnet-researcher-says/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/03/ip_camera.png</image:loc><image:title>ip_camera</image:title></image:image><lastmod>2017-03-10T09:35:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/10/middle-east-government-organizations-hit-with-ranran-ransomware/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/03/middle-east-hackers.jpg</image:loc><image:title>middle-east-hackers</image:title></image:image><lastmod>2017-03-10T09:33:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/10/how-schools-outsmart-the-hackers/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/03/keithbockholdt1.jpg</image:loc><image:title>keithbockholdt1</image:title></image:image><lastmod>2017-03-10T09:32:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/10/640000-stolen-playstation-accounts-being-sold-on-the-dark-web/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/03/640000-playstation-accounts-darkweb.png</image:loc><image:title>640000-playstation-accounts-darkweb</image:title></image:image><lastmod>2017-03-10T09:31:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/09/critical-vulnerability-under-massive-attack-imperils-high-impact-sites/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/03/struts-exploit-760x380.jpg</image:loc><image:title>struts-exploit-760x380</image:title></image:image><lastmod>2017-03-09T09:30:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/09/patch-apache-struts-2-now-hackers-are-exploiting-a-remote-code-execution-zero-day-in-the-wild/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/03/apache-struts-2-zero-day.jpg</image:loc><image:title>apache-struts-2-zero-day</image:title></image:image><lastmod>2017-03-09T09:29:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/08/firefox-52-warns-when-you-try-to-enter-passwords-on-non-encrypted-websites/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/03/firefox-password-form.jpeg</image:loc><image:title>firefox-password-form</image:title></image:image><lastmod>2017-03-08T09:47:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/07/wikileaks-releases-alleged-cia-hacking-secrets/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/03/160105-cia-cr-0403_01_07c0a44de854deb571331a51a56b3fd2-nbcnews-fp-1200-800.jpg</image:loc><image:title>160105-cia-cr-0403_01_07c0a44de854deb571331a51a56b3fd2-nbcnews-fp-1200-800</image:title></image:image><lastmod>2017-03-07T15:24:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/07/virustotal-adds-palo-alto-networks-to-intelligence-feeds/</loc><lastmod>2017-03-07T13:55:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/07/macos-rat-uses-0-day-for-root-access/</loc><lastmod>2017-03-07T13:54:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/07/dbltek-goip-gsm-gateways-have-a-backdoor-password/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/03/vintagedoorhandle_404947.jpg</image:loc><image:title>Vintage Door Handle</image:title></image:image><lastmod>2017-03-07T00:32:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/07/destructive-stonedrill-wiper-malware-on-the-loose/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/03/shutterstock_276457952.jpg</image:loc><image:title>shutterstock_276457952</image:title></image:image><lastmod>2017-03-07T00:30:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/07/wordpress-4-7-3-security-and-maintenance-release/</loc><lastmod>2017-03-07T00:29:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/06/mongoaudit-mongodb-auditing-pen-testing-tool/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/03/mongoaudit-mongodb-auditing-pen-testing-tool-640x405.png</image:loc><image:title>mongoaudit-mongodb-auditing-pen-testing-tool-640x405</image:title></image:image><lastmod>2017-03-06T14:37:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/06/spammers-leak-1-4-billion-user-records/</loc><lastmod>2017-03-06T14:35:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/06/google-microsoft-bump-bug-bounties/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/03/clint_eastwood.jpg</image:loc><image:title>clint_eastwood</image:title></image:image><lastmod>2017-03-06T13:38:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/06/chris-vickery-announced-a-1-37-billion-records-data-leak-to-disclose-on-monday/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/03/data-leak-vickery.jpg</image:loc><image:title>data-leak-vickery</image:title></image:image><lastmod>2017-03-06T13:35:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/03/introducing-the-metasploit-vulnerable-service-emulator/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/03/screenshot2017-02-26at6-00-57pm.png</image:loc><image:title>screenshot2017-02-26at6-00-57pm</image:title></image:image><lastmod>2017-03-03T10:02:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/03/researchers-uncover-powershell-trojan-that-uses-dns-queries-to-get-its-orders/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/03/trojan-_horse-800x644.jpg</image:loc><image:title>trojan-_horse-800x644</image:title></image:image><lastmod>2017-03-03T09:58:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/03/amazon-s3-problem-caused-by-command-line-mistake-during-maintenance/</loc><lastmod>2017-03-03T09:57:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/03/pence-used-personal-email-for-state-business-and-was-hacked/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/03/35547429001_5345886386001_5345856760001-vs.jpg</image:loc><image:title>35547429001_5345886386001_5345856760001-vs</image:title></image:image><lastmod>2017-03-03T09:56:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/03/additional-insights-on-shamoon2/</loc><lastmod>2023-09-12T20:26:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/02/previously-unseen-malware-behind-cyberattack-against-uks-biggest-hospital-group/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/03/st-barts-hospital.jpg</image:loc><image:title>st-barts-hospital</image:title></image:image><lastmod>2017-03-02T12:06:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/02/google-recaptcha-bypass-technique-uses-googles-own-tools/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/03/captcha-680x400.png</image:loc><image:title>captcha-680x400</image:title></image:image><lastmod>2017-03-02T12:04:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/02/ransomware-spiked-752-in-new-families/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2017/03/biohazard.jpg</image:loc><image:title>biohazard</image:title></image:image><lastmod>2017-03-02T12:04:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/02/alleged-master-keys-for-the-dharma-ransomware-leaked-on-bleepingcomputer/</loc><lastmod>2017-03-02T12:02:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/02/yahoo-cookie-hacks-affected-32-million-accounts-ceo-forgoes-bonus/</loc><lastmod>2017-03-02T12:02:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/02/slack-quickly-patches-account-hijacking-flaw/</loc><lastmod>2017-03-02T12:01:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/02/over-a-million-websites-could-be-at-risk-from-critical-wordpress-gallery-plugin-flaw/</loc><lastmod>2017-03-02T12:01:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/02/google-employees-help-thousands-of-open-source-projects-patch-critical-mad-gadget-bug/</loc><lastmod>2017-03-02T12:01:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/02/obama-administration-rushed-to-preserve-intelligence-of-russian-election-hacking/</loc><lastmod>2017-03-02T12:00:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/02/ddos-attacks-in-luxembourg/</loc><lastmod>2017-03-02T11:59:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/01/necurs-botnet-developers-add-ddos-capabilities-to-their-modular-malware/</loc><lastmod>2017-03-01T15:00:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/01/google-play-apps-infected-with-malicious-iframes/</loc><lastmod>2017-03-01T13:44:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/01/dridex-trojan-updated-with-atombombing-evasion-techniques/</loc><lastmod>2017-03-01T12:34:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/01/xss-flaws-in-zscaler-cloud-management-software-allow-logged-attackers-to-hack-coworkers/</loc><lastmod>2017-03-01T12:33:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2017/03/01/million-plus-wordpress-sites-exposed-by-vulnerable-plugin/</loc><lastmod>2017-03-01T12:32:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/11/18/inside-the-mind-of-cyber-criminals/</loc><lastmod>2016-11-18T10:00:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/11/18/netsec-q3-2016-state-of-the-internet-security-report-by-akamai/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2016/11/akamai.png</image:loc><image:title>akamai</image:title></image:image><lastmod>2016-11-18T09:59:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/11/16/__trashed-8/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2016/11/nginx.png</image:loc><image:title>nginx</image:title></image:image><lastmod>2016-11-18T09:47:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/11/15/risk-design-google-chrome-fedora/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2016/11/google.png</image:loc><image:title>google</image:title></image:image><lastmod>2016-11-15T23:43:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/14/sshowdown-proxy-attacks-a-12-year-old-ssh-bug-exposes-more-than-2m-iot-devices/</loc><lastmod>2016-11-15T23:30:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/threat/</loc><lastmod>2016-11-15T23:17:10+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securityx.space/2016/10/14/air-force-investigating-outage-of-classified-computer-system-at-key-drone-base/</loc><lastmod>2016-10-14T10:58:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/14/keithjjoneshostintel/</loc><lastmod>2016-10-14T10:57:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/14/attempting-to-bypass-aslr-on-windows-7-into-a-reverse-shell-via-rnetsec/</loc><lastmod>2016-10-14T10:47:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/14/tls-nonce-nse-via-rnetsec/</loc><lastmod>2016-10-14T10:47:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/14/the-cyber-threat-at-your-doorstep-location-specific-threat-intelligence/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2016/10/recorded_future_logo.png</image:loc><image:title>recorded_future_logo</image:title></image:image><lastmod>2016-10-14T10:47:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/14/the-breach-response-market-is-broken-and-what-could-be-done-via-rnetsec/</loc><lastmod>2016-10-14T10:46:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/14/ios-app-instrumentation-without-jailbreak-step-by-step-guide-via-rnetsec/</loc><lastmod>2016-10-14T10:45:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/14/birdwatcher-data-analysis-and-osint-framework-for-twitter-via-rnetsec/</loc><lastmod>2016-10-14T10:44:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/14/lockydump-all-your-configs-are-belong-to-us-via-rnetsec/</loc><lastmod>2016-10-14T10:44:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/14/bug-bounties-discussion-of-methodologies-failings-marketing-fluff-via-rnetsec/</loc><lastmod>2016-10-14T10:43:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/14/announcement-of-imminent-hard-fork-for-eip150-gas-cost-changes/</loc><lastmod>2016-10-14T10:43:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/14/abusing-login-mechanisms-to-detect-whether-a-user-is-logged-in-via-rnetsec/</loc><lastmod>2016-10-14T10:42:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/14/defcon-videos-are-up-via-rnetsec/</loc><lastmod>2016-10-14T10:42:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/12/new-odinaff-trojan-targeting-banking-sector-linked-to-carbanak-gang/</loc><lastmod>2016-10-12T09:27:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/12/say-cheese-a-snapshot-of-the-massive-ddos-attacks-coming-from-iot-cameras/</loc><lastmod>2016-10-12T09:26:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/12/australian-bureau-of-meteorologys-computer-system-hacked-authorities-suspect-foreign-hand/</loc><lastmod>2016-10-12T09:25:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/12/scan-ruby-based-apps-for-security-issues-with-dawnscanner/</loc><lastmod>2016-10-12T09:25:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/12/patch-tuesday-microsoft-patches-five-zero-day-vulnerabilities-sc-magazine/</loc><lastmod>2016-10-12T09:23:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/12/dxxd-ransomware-encrypts-files-on-unmapped-network-shares/</loc><lastmod>2016-10-12T09:23:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/12/second-hacking-group-targets-swift-connected-banks-the-register/</loc><lastmod>2016-10-12T09:21:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/12/why-do-you-work-in-security-instead-of-something-more-lasting-via-rnetsec/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2016/10/cyber-security.jpg</image:loc><image:title>cyber-security</image:title></image:image><lastmod>2016-10-12T09:21:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/12/triggering-ms16-030-via-targeted-fuzzing-via-rnetsec/</loc><lastmod>2016-10-12T09:18:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/12/browser-treatment-of-bad-ssl-via-rnetsec/</loc><lastmod>2016-10-12T09:18:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/12/breaking-down-mirai-an-iot-ddos-botnet-analysis-via-rnetsec/</loc><lastmod>2016-10-12T09:17:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/12/operation-ownedcloud-exploitation-and-post-exploitation-persistance-via-rnetsec/</loc><lastmod>2016-10-12T09:17:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/12/new-openssl-double-free-and-invalid-free-vulnerabilities-in-x509-parsing-via-rnetsec/</loc><lastmod>2016-10-12T09:16:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/11/finding-1031-server-variables-on-prezi-com-via-rnetsec/</loc><lastmod>2016-10-11T15:09:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/11/videos-overview-of-different-anti-debugging-techniques-for-windows-via-rnetsec/</loc><lastmod>2016-10-11T15:08:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/11/a-kilobit-hidden-snfs-discrete-logarithm-computation-how-one-could-put-undetectable-trapdoors-in-millions-of-crypto-keys-pdf-via-rnetsec/</loc><lastmod>2016-10-11T15:08:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/11/the-nymaim-malware-deep-technical-dive-via-rnetsec/</loc><lastmod>2016-10-11T15:07:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/11/say-cheese-a-snapshot-of-the-massive-ddos-attacks-coming-from-iot-cameras-via-rnetsec/</loc><lastmod>2016-10-11T15:07:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/11/another-5900-stores-found-skimming-full-list-via-rnetsec/</loc><lastmod>2016-10-11T12:42:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/11/spoofit-ddos-exposed/</loc><lastmod>2016-10-11T12:41:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/11/powershell-payload-execution/</loc><lastmod>2016-10-11T12:40:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/11/joesecuritypafishmacro/</loc><lastmod>2016-10-11T12:39:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/11/strongpity-apt-securelist-kaspersky/</loc><lastmod>2016-10-11T12:39:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/11/more-than-500000-iot-devices-potentially-recruitable-in-the-mirai-botnet/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2016/10/internetofthings.png</image:loc><image:title>internetofthings</image:title></image:image><lastmod>2016-10-11T12:38:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/11/amazon-resets-passwords-of-some-users-after-seeing-email-addresses-passwords-leaked-online-paranoid-move-tech-times/</loc><lastmod>2016-10-11T12:37:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/11/this-interactive-map-shows-wi-fi-passwords-at-airports-around-the-world-techworm/</loc><lastmod>2016-10-11T12:36:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/11/mitre-will-award-50000-for-a-solution-that-detects-rogue-iot-devices/</loc><lastmod>2016-10-11T12:36:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/11/malware-malicious-charging-stations-and-rogue-cell-towers-oh-my-nist-releases-the-mobile-threat-catalogue-for-public-comment-on-github-via-rnetsec/</loc><lastmod>2016-10-11T12:35:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/11/teaching-machines-security-identifying-botnet-panels-with-some-ml-via-rnetsec/</loc><lastmod>2016-10-11T12:34:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/11/imessage-preview-problems-imessage-leaks-your-physical-location-by-simply-receiving-a-phishing-text-message-and-theres-no-way-to-disable-it-via-rnetsec/</loc><lastmod>2016-10-11T12:33:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/11/private-vagrant-box-hosting-with-easy-versioning-via-rnetsec/</loc><lastmod>2016-10-11T12:33:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/11/apache-tomcat-redhat-based-distros-pkgs-root-privilege-escalation-exploit-cve-2016-5425-via-rnetsec/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2016/10/2000px-tomcat-logo-svg.png</image:loc><image:title>2000px-tomcat-logo-svg</image:title></image:image><lastmod>2016-10-11T12:32:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/11/about-27-of-internet-networks-still-allow-ip-spoofing-via-rnetsec/</loc><lastmod>2016-10-11T12:31:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/11/pyshell-shellify-your-http-command-injection-github-via-rnetsec/</loc><lastmod>2016-10-11T12:30:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/11/reversing-the-smarter-coffee-iot-machine-protocol-to-make-coffee-using-the-terminal-via-rnetsec/</loc><lastmod>2016-10-11T12:30:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/11/wordpress-rce-via-specially-crafted-mo-language-file-via-rnetsec/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2016/10/wordpress-logo-notext-rgb.png</image:loc><image:title>wordpress-logo-notext-rgb</image:title></image:image><lastmod>2016-10-11T12:29:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/08/javascript-leads-to-browser-hijacking-via-rnetsec/</loc><lastmod>2016-10-09T10:43:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/08/gitem-a-github-organization-reconnaissance-tool-via-rnetsec/</loc><lastmod>2016-10-08T20:17:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/08/scripts-that-automate-owasp-zap-as-part-of-a-continuous-delivery-pipeline-via-rnetsec/</loc><lastmod>2016-10-08T20:17:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/08/making-jetty-bleed-via-rnetsec/</loc><lastmod>2016-10-08T12:27:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/08/exploiting-the-opennmsjenkins-rmi-java-deserialization-vulnerability-via-rnetsec/</loc><lastmod>2016-10-08T12:27:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/07/air-hammer-new-tool-that-leverages-osint-to-break-into-wpa-enterprise-networks-via-rnetsec/</loc><lastmod>2016-10-08T12:26:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/07/own-automatic-phishing-list-and-tor-to-tor-tunneling-via-rnetsec/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2016/10/f95e06d29b5ae7043170871e39e.jpg</image:loc><image:title>f95e06d29b5ae7043170871e39e</image:title></image:image><lastmod>2016-10-08T08:20:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/07/industrial-control-systems-2016-report-connected-and-vulnerable-via-rnetsec/</loc><lastmod>2016-10-08T08:16:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/07/worlds-largest-netmirai-botnet-client-echo-loader-cnc-source-code-release-via-rnetsec/</loc><lastmod>2016-10-08T08:15:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/08/adventure-time-warsaw-windows-signed-network-driver-ready-to-use-via-rnetsec/</loc><lastmod>2016-10-08T08:05:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/07/analysis-and-exploitation-of-pegasus-kernel-vulnerabilities-cve-2016-4655-cve-2016-4656-%c2%b7-jndoks-blog-via-rnetsec/</loc><lastmod>2016-10-08T08:04:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/07/xss-via-referrer-after-windows-anniversary-update-via-rnetsec/</loc><lastmod>2016-10-08T08:04:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/07/accessing-internal-fileshares-through-exchange-activesync-via-rnetsec/</loc><lastmod>2016-10-08T08:03:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/07/snagging-active-directory-credentials-over-wifi-part-1-via-rnetsec/</loc><lastmod>2016-10-08T08:03:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/07/telling-the-time-owasp-talk-by-chris-anley-on-exploiting-insecure-randomness-in-web-applications-via-rnetsec/</loc><lastmod>2016-10-08T08:03:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/06/nope-non-http-proxy-v1-5-released-dns-portmon-repeater-for-raw-tcp-streams-via-rnetsec/</loc><lastmod>2016-10-06T20:49:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/06/macos-sierra-permanently-remembers-ssh-key-passphrase-by-default-via-rnetsec/</loc><lastmod>2016-10-06T20:49:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/06/crashing-android-phones-via-large-gps-xtra-files-via-rnetsec/</loc><lastmod>2016-10-06T20:49:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/06/senate-republicans-were-skimmed-for-six-months-quietly-fix-store-via-rnetsec/</loc><lastmod>2016-10-06T20:49:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/06/taking-over-zencircle-accounts-for-fun-no-profit-via-rnetsec/</loc><lastmod>2016-10-06T20:49:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/06/brianwarehimeotx_transforms/</loc><lastmod>2016-10-06T09:21:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/06/lgandxpcredz/</loc><lastmod>2016-10-06T09:20:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/06/feds-bust-lizard-squad-computer-hackers/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2016/10/b4q1ajciaaidnbi.jpg</image:loc><image:title>b4q1ajciaaidnbi</image:title></image:image><lastmod>2016-10-06T09:20:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/06/i-want-out-of-windows-patch-hell/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2016/10/windows8patchtuesday_r1_c1_5.jpg</image:loc><image:title>windows8patchtuesday_r1_c1_5</image:title></image:image><lastmod>2023-03-30T08:13:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/06/malwarebytes-gets-tougher-on-pups/</loc><lastmod>2016-10-06T09:17:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/06/fbi-arrests-an-nsa-contractor-suspected-of-stealing-hacking-tools-pcworld/</loc><lastmod>2016-10-06T09:17:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/06/google-patches-dos-vulnerability-in-android/</loc><lastmod>2016-10-06T09:16:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/06/subdomain-takeover-of-blog-snapchat-com-via-rnetsec/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2016/10/snapchat-logo-2d9c3e7ada-seeklogo-com.png</image:loc><image:title>snapchat-logo-2d9c3e7ada-seeklogo-com</image:title></image:image><lastmod>2016-10-06T09:03:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/06/fixing-arcsight-event-categorisation-mapping-for-snort-on-security-onion-via-rnetsec/</loc><lastmod>2016-10-06T09:02:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/06/gandi-security-vulnerability-two-factor-authentication-bypass-via-rnetsec/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2016/10/gandhi1.jpg</image:loc><image:title>gandhi1</image:title></image:image><lastmod>2016-10-06T09:02:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/06/mirai-ddos-source-code-review-via-rnetsec/</loc><lastmod>2016-10-06T09:01:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/06/announcing-cert-basic-fuzzing-framework-version-2-8-via-rnetsec/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2016/10/fuzz.png</image:loc><image:title>fuzz</image:title></image:image><lastmod>2016-10-06T09:00:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/06/update-to-keychaineditor-2-0-can-now-decode-ksecattraccesscontrol-via-rnetsec/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2016/10/macsecurity_26_keychain_access.png</image:loc><image:title>macsecurity_26_keychain_access</image:title></image:image><lastmod>2016-10-06T08:59:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/06/checkmarx-appsec-coach-via-rnetsec/</loc><lastmod>2016-10-06T08:57:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/06/knoxout-cve-2016-6584-bypassing-samsung-knox-via-rnetsec/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2016/10/samsung-logo.png</image:loc><image:title>samsung-logo</image:title></image:image><lastmod>2016-10-06T08:57:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/05/the-perils-of-abandonware-via-rnetsec/</loc><lastmod>2016-10-05T14:00:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/05/trello-bug-bounty-access-servers-files-using-imagetragick-via-rnetsec/</loc><lastmod>2016-10-05T13:59:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/05/deltaxfluxfluxion-wifi-haxx/</loc><lastmod>2016-10-05T08:53:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/05/microsoft-talk-on-monitoring-and-hunting-targeted-attacks/</loc><lastmod>2016-10-05T08:53:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/05/jeremyngallowaymirai-source-code/</loc><lastmod>2016-10-05T08:53:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/05/wikileaks-julian-assange-to-release-significant-documents-on-us-election-google-arms-trading-over-next-10-weeks/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2016/10/rubon32.png</image:loc><image:title>rubon32</image:title></image:image><lastmod>2016-10-05T08:52:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/05/53-of-ddos-attacks-result-in-additional-compromise/</loc><lastmod>2016-10-05T08:51:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/05/panda-bankers-future-dga/</loc><lastmod>2016-10-05T08:51:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/05/staged-vs-stageless-handlers-metasploit-via-rnetsec/</loc><lastmod>2016-10-05T08:50:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/05/xss-in-angularjs-video-series-walkthrough-explaining-some-angularjs-sandbox-bypasses-which-resulted-in-the-removal-of-the-sandbox-in-1-6-rangularjs-via-rnetsec/</loc><lastmod>2016-10-05T08:50:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/05/how-i-hacked-pornhub-for-fun-and-profit-via-rnetsec/</loc><lastmod>2016-10-05T08:49:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/05/multiple-vulnerabilities-found-in-the-dlink-dwr-932b-backdoor-backdoor-accounts-weak-wps-rce-via-rnetsec/</loc><lastmod>2016-10-05T08:46:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/05/node-js-http-request-smugglng-via-rnetsec/</loc><lastmod>2016-10-05T08:46:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/05/building-an-iot-botnet-bsides-manchester-2016-via-rnetsec/</loc><lastmod>2016-10-05T08:45:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/05/iranian-officials-to-get-secure-telephone-lines-via-rnetsec/</loc><lastmod>2016-10-05T08:45:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/05/knoxout-multiple-vulnerabilities-in-the-implementation-of-samsung-knox-via-rnetsec/</loc><lastmod>2016-10-05T08:45:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/03/a-tale-of-a-dns-packet-a-detailed-walk-thru-and-proof-of-concept-of-binds-cve-2016-2776-via-rnetsec/</loc><lastmod>2016-10-03T23:20:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/03/hidden-service-sells-admin-credentials-for-office-365-accounts-via-rnetsec/</loc><lastmod>2016-10-03T23:20:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/03/the-effect-of-dns-on-tors-anonymity-via-rnetsec/</loc><lastmod>2016-10-03T23:20:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/03/securing-hypercat-a-solution-for-resource-service-discovery-challenges-within-iot-via-rnetsec/</loc><lastmod>2016-10-03T23:20:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/03/dark-web-osint-part-four-using-scikit-learn-to-find-hidden-service-clones-via-rnetsec/</loc><lastmod>2016-10-03T23:20:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/03/github-fireeyeflare-floss-fireeye-labs-obfuscated-string-solver-via-rnetsec/</loc><lastmod>2016-10-03T23:20:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/03/pwning-a-thin-client-in-less-than-one-minute-again-via-rnetsec/</loc><lastmod>2016-10-03T23:20:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/02/how-to-become-part-of-an-iot-botnet-via-rnetsec/</loc><lastmod>2016-10-02T13:25:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/01/hash-length-extension-attack-demo-12-minutes-via-rnetsec/</loc><lastmod>2016-10-02T13:25:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/01/xss-using-gifs-via-rnetsec/</loc><lastmod>2016-10-02T13:24:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/10/01/apples-response-to-the-wosign-incidents-free-ssl-intermediate-distrusted-whitelist-using-certificate-transparency-via-rnetsec/</loc><lastmod>2016-10-02T13:24:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/30/understanding-jquery-security-via-rnetsec/</loc><lastmod>2016-10-02T13:24:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/30/tls-version-intolerance-working-around-bugs-in-legacy-tls-stacks-via-rnetsec/</loc><lastmod>2016-09-30T17:15:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/30/the-cornerstones-of-hunt-operations-via-rnetsec/</loc><lastmod>2016-09-30T17:14:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/30/the-equation-groups-firewall-exploit-chain-via-rnetsec/</loc><lastmod>2016-09-30T13:44:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/30/a-tale-of-an-interesting-source-code-leak-via-rnetsec/</loc><lastmod>2016-09-30T13:44:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/30/nmapnpcap/</loc><lastmod>2016-09-30T08:53:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/30/outflankbvnetshhelperbeacon/</loc><lastmod>2016-09-30T08:52:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/30/gravitationalteleport/</loc><lastmod>2016-09-30T08:52:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/30/dresscode-and-its-potential-impact-for-enterprises/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2016/09/wrahxv2x3mdev.jpg</image:loc><image:title>wrahxv2x3mdev</image:title></image:image><lastmod>2016-09-30T08:51:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/30/vesk-coughs-up-18k-in-ransomware-attack/</loc><lastmod>2016-09-30T08:50:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/30/yahoo-breach-was-not-state-sponsored-researchers-claim/</loc><lastmod>2016-09-30T08:49:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/30/security-analyst-says-yahoo-dropbox-linkedin-tumblr-all-popped-by-same-gang/</loc><lastmod>2016-09-30T08:49:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/30/zerodium-offers-1-5-million-bounty-for-ios-zero-day-exploits/</loc><lastmod>2016-09-30T08:48:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/30/tofsee-malware-distribution-switched-from-exploit-kit-to-spam/</loc><lastmod>2016-09-30T08:47:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/30/rbltracker-effective-website-email-and-social-reputation-monitoring-via-rnetsec/</loc><lastmod>2016-09-30T05:31:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/30/security-blogs-via-rnetsec/</loc><lastmod>2016-09-30T05:31:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/29/crypto-classics-wieners-rsa-attack-via-rnetsec/</loc><lastmod>2016-09-30T05:31:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/29/the-pyramid-of-pain-in-threat-hunting-for-locky-ransomware-via-rnetsec/</loc><lastmod>2016-09-29T21:05:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/29/new-report-to-u-s-senate-describes-how-criminals-put-data-to-use-via-rnetsec/</loc><lastmod>2016-09-29T21:05:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/29/patching-an-android-application-to-view-tls-traffic-without-bypassing-certificate-pinning-via-rnetsec/</loc><lastmod>2016-09-29T21:05:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/29/an-unlikely-xxe-in-hikvisions-remote-access-camera-cloud-via-rnetsec/</loc><lastmod>2016-09-29T21:04:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/29/cybervault-library/</loc><lastmod>2016-09-29T12:25:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/29/on-the-need-for-an-open-security-journal-via-rnetsec/</loc><lastmod>2016-09-29T09:01:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/29/how-to-crash-systemd-in-one-line-as-any-user-via-rnetsec/</loc><lastmod>2016-09-29T09:00:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/29/a-valiant-effort-at-a-stealthy-backdoor-via-rnetsec/</loc><lastmod>2016-09-29T08:58:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/29/a-curated-list-of-resources-for-learning-about-application-security-github-paragonieawesome-appsec-via-rnetsec/</loc><lastmod>2016-09-29T08:58:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/28/dos-by-local-user-triggers-assert-in-systemd-via-rnetsec/</loc><lastmod>2016-09-28T21:08:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/28/defending-against-hackers-took-a-back-seat-at-yahoony-times-article-via-rnetsec/</loc><lastmod>2016-09-28T21:08:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/28/about-slowloris-via-rnetsec/</loc><lastmod>2016-09-28T21:08:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/28/metasploit-cheat-sheet-a-handy-printable-reference-guide-via-rnetsec/</loc><lastmod>2016-09-28T21:08:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/28/forescout-joins-splunks-adaptive-response-initiative/</loc><lastmod>2016-09-28T16:42:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/28/rethinking-connection-security-indicators-via-rnetsec/</loc><lastmod>2016-09-28T16:39:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/28/rig-exploit-kit-from-the-afraidgate-campaign-wed-sep-28th/</loc><lastmod>2016-09-28T14:22:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/28/swift-toughens-customer-security-with-new-mandatory-rules/</loc><lastmod>2016-09-28T14:21:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/28/locky-ransomware-drops-offline-mode/</loc><lastmod>2016-09-28T14:21:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/28/cisco-cracks-goznym-trojan-dga-sinkholes-botnet/</loc><lastmod>2016-09-28T14:20:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/28/thedarkoverlord-holds-investment-bank-to-ransom-or-else-hacked-files-will-be-released/</loc><lastmod>2016-09-28T14:20:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/28/recorded-future-announces-its-participation-in-splunks-adaptive-response-initiative/</loc><lastmod>2016-09-28T14:20:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/28/derbycon-2016-ctf-write-up-via-rnetsec/</loc><lastmod>2016-09-28T14:19:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/28/a-curated-list-of-cryptography-resources-and-links-via-rnetsec/</loc><lastmod>2016-09-28T14:19:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/28/we-are-just-hackers-helping-hackers-thats-what-we-do-via-rnetsec/</loc><lastmod>2016-09-28T14:19:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/28/effective-darkcomet-rat-analysis-in-10-minutes-and-3-clicks/</loc><lastmod>2016-09-28T07:22:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/27/ms-ieedge-script-error-leak-on-workers-sop-bypass-via-rnetsec/</loc><lastmod>2016-09-27T23:46:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/27/windows-network-security-now-easier-with-osquery-via-rnetsec/</loc><lastmod>2016-09-27T23:46:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/27/xssing-your-router-via-rnetsec/</loc><lastmod>2016-09-27T23:46:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/27/cve-2016-2776-remote-bind9-denial-of-service-via-rnetsec/</loc><lastmod>2016-09-27T23:46:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/27/ultimate-security-bundle-engineered-for-pc-gamers-appears-on-steam-its-just-a-simple-whitelist-via-rnetsec/</loc><lastmod>2016-09-27T23:45:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/27/adobe-flash-local-with-filesystem-sandbox-bypass-end-of-the-love-story-between-flash-and-local-files-via-rnetsec/</loc><lastmod>2016-09-27T23:45:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/27/fancy-bear-hackers-use-a-new-mac-trojan-against-aerospace-industry/</loc><lastmod>2016-09-27T11:48:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/27/talos-shadowgate-take-down-global-malvertising-campaign-thwarted-2/</loc><lastmod>2016-09-27T11:47:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/27/microsoft-pushes-its-three-pillars-at-ignite-security-intelligence-and-cloud-ars-technica/</loc><lastmod>2016-09-27T11:47:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/27/microsoft-equips-edge-with-hardware-based-container/</loc><lastmod>2016-09-27T11:47:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/27/152k-cameras-in-990gbps-record-breaking-dual-ddos/</loc><lastmod>2016-09-27T11:47:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/27/as-you-read-this-teen-social-site-is-leaking-millions-of-plaintext-passwords/</loc><lastmod>2016-09-27T11:47:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/27/wooyun-group-arrested-via-rnetsec/</loc><lastmod>2016-09-27T11:46:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/27/java-deserialization-cheat-sheet-the-cheat-sheet-about-java-deserialization-vulnerabilities-via-rnetsec/</loc><lastmod>2016-09-27T11:46:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/27/solving-the-pgp-revocation-problem-with-opentimestamps-for-git-commits-via-rnetsec/</loc><lastmod>2016-09-27T11:46:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/27/an-overview-of-tls-1-3-via-rnetsec/</loc><lastmod>2016-09-27T11:45:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/26/rotten-potato-privilege-escalation-from-service-accounts-to-system-by-foxglove-security-via-rnetsec/</loc><lastmod>2016-09-26T21:14:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/26/cve-2016-7545-selinux-sandbox-escape-via-rnetsec/</loc><lastmod>2016-09-26T20:05:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/26/mozilla-to-distrust-wosign-and-startcom-via-rnetsec/</loc><lastmod>2016-09-26T20:05:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/26/microsoft-previews-project-springfield-a-cloud-based-bug-detector-via-rnetsec/</loc><lastmod>2016-09-26T20:05:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/26/reshaping-web-defenses-with-strict-content-security-policy-via-rnetsec/</loc><lastmod>2016-09-26T20:04:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/26/top-20-cis-critical-security-controls-csc-through-the-eyes-of-a-hacker-csc-1-12-via-rnetsec/</loc><lastmod>2016-09-26T20:04:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/26/smart-phishing-defeating-email-sandboxes-via-rnetsec/</loc><lastmod>2016-09-26T20:04:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/26/kerberos-security-feature-bypass/</loc><lastmod>2016-09-26T12:58:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/26/you-got-uninitialized-kernel-memory-via-rnetsec/</loc><lastmod>2016-09-26T12:55:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/25/introducing-mailsniper-a-tool-for-searching-every-users-email-for-sensitive-data-via-rnetsec/</loc><lastmod>2016-09-25T17:38:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/25/how-i-found-a-persistent-cross-site-scripting-in-pr0nhub-via-rnetsec/</loc><lastmod>2016-09-25T17:37:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/25/my-first-smashing-the-stack-into-a-reverse-shell-via-rnetsec/</loc><lastmod>2016-09-25T11:41:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/25/ios-10-security-weakness-discovered-backup-passwords-much-easier-to-break-via-rnetsec/</loc><lastmod>2016-09-25T11:41:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/24/windows-10s-undocumented-certificate-pinning-feature-via-rnetsec/</loc><lastmod>2016-09-24T21:22:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/24/memory-disclosure-mitigations-in-copperheados-via-rnetsec/</loc><lastmod>2016-09-24T12:10:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/24/ms-edge-address-bar-spoof-via-rnetsec/</loc><lastmod>2016-09-24T12:09:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/24/the-biggest-data-breaches-of-online-services-yahoo-is-the-leading-one-via-rnetsec/</loc><lastmod>2016-09-24T12:09:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/24/luckystrike-malicious-document-generation-tool-via-rnetsec/</loc><lastmod>2016-09-24T12:08:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/24/tls-certificates-from-the-top-million-sites-via-rnetsec/</loc><lastmod>2016-09-24T12:08:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/23/whatwg-blog-w3c-refuses-to-protect-security-researchers-studying-drm-enabling-web-extension-via-rnetsec/</loc><lastmod>2016-09-23T22:47:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/23/an-overview-of-tls-1-3-and-qa-videotranscript-via-rnetsec/</loc><lastmod>2016-09-23T22:47:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/23/introducing-ponce-one-click-symbolic-execution-via-rnetsec/</loc><lastmod>2016-09-23T16:49:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/23/hosting-provider-ovh-hit-by-1-tbps-ddos-attack/</loc><lastmod>2016-09-23T15:25:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/23/akamai-kicks-off-brian-krebs-from-its-network-after-665-gbps-ddos-attack/</loc><lastmod>2016-09-23T15:25:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/23/critical-dos-flaw-found-in-openssl-how-it-works/</loc><lastmod>2016-09-23T15:25:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/23/the-leak-of-nsa-hacking-tools-was-caused-by-a-staffer-mistake/</loc><lastmod>2016-09-23T15:24:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/23/extensive-list-of-net-sec-research-papers-academic-articles-and-textbooks-from-a-professor-of-the-university-of-michigan-via-rnetsec/</loc><lastmod>2016-09-23T12:33:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/23/upgrade-your-ssh-keys-how-to-get-rid-of-dsa-and-upgrade-to-ed25519-via-rnetsec/</loc><lastmod>2016-09-23T12:32:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/23/sql-server-command-execution-without-xp_cmdshell-via-agent-jobs-via-rnetsec/</loc><lastmod>2016-09-23T12:32:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/23/extrabacon-2-0-support-for-more-9-x-versions-new-python-code-a-metasploit-module-and-an-offset-finder-via-rnetsec/</loc><lastmod>2016-09-23T12:32:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/22/what-is-threat-intelligence-definition-and-examples/</loc><lastmod>2016-09-22T21:24:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/22/yahoo-hack-hit-500-mn-users-likely-state-sponsored-via-rnetsec/</loc><lastmod>2016-09-22T21:24:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/22/transaction-spam-attack-next-steps/</loc><lastmod>2016-09-22T21:24:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/22/the-most-exhaustive-list-of-known-bug-bounty-programs-on-the-internet-via-rnetsec/</loc><lastmod>2016-09-22T21:24:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/22/malware-evades-detection-with-novel-technique/</loc><lastmod>2016-09-22T15:20:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/22/the-ethereum-network-is-currently-undergoing-a-dos-attack/</loc><lastmod>2016-09-22T15:16:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/22/all-public-leaks-in-one-place-with-cracked-hashes-too-via-rnetsec/</loc><lastmod>2016-09-22T15:15:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/22/im-the-creator-of-world-of-vnc-i-just-published-a-new-scan-dated-september-20th-via-rnetsec/</loc><lastmod>2016-09-22T15:15:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/22/porting-an-exploit-to-a-netgear-router-via-rnetsec/</loc><lastmod>2016-09-22T15:15:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/22/yahoo-is-expected-to-confirm-massive-data-breach-impacting-hundreds-of-millions-of-users-via-rnetsec/</loc><lastmod>2016-09-22T15:15:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/22/15-vulnerable-sites-to-legally-practice-your-hacking-skills-via-rnetsec/</loc><lastmod>2016-09-22T15:15:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/22/openssl-preview-issue-by-akamai-maybe-accidental-early-drop-via-rnetsec/</loc><lastmod>2016-09-22T15:15:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/22/education-now-suffers-the-most-ransomware-attacks/</loc><lastmod>2016-09-22T08:05:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/22/rig-picks-up-where-neutrino-left-off-pushes-crypmic-ransomware/</loc><lastmod>2016-09-22T08:04:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/22/just-for-men-website-served-up-password-stealing-malware-international-business-times-uk/</loc><lastmod>2016-09-22T08:04:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/22/apples-new-macos-sierra-fixes-over-60-security-flaws-itworld/</loc><lastmod>2016-09-22T08:04:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/22/swift-confirms-banks-still-being-targeted-announces-mitigation-tool/</loc><lastmod>2016-09-22T08:03:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/22/ex-ksu-student-accused-of-hacking-system-changing-grades-wsb-atlanta/</loc><lastmod>2016-09-22T08:03:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/22/raum-tool-allows-to-spread-malware-through-torrent-files/</loc><lastmod>2016-09-22T08:03:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/22/ispy-a-new-sophisticated-commercial-keylogger-in-the-criminal-underground/</loc><lastmod>2016-09-22T08:03:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/22/hackers-remotely-attack-moving-tesla-model-s-pc-magazine/</loc><lastmod>2016-09-22T08:02:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/22/easy-root-on-aver-eh6108h-hybrid-dvr-and-more-via-rnetsec/</loc><lastmod>2016-09-22T07:50:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/22/common-x509-certificate-creation-and-verification-pitfalls-via-rnetsec/</loc><lastmod>2016-09-22T07:50:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/22/tldr-video-of-the-sweet32-attack-on-the-practical-in-security-of-64-bit-block-ciphers-via-rnetsec/</loc><lastmod>2016-09-22T07:50:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/22/concolic-execution-and-code-coverage-with-triton-via-rnetsec/</loc><lastmod>2016-09-22T07:49:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/21/more-hacking-sql-servers-without-a-password-with-cool-python-script-anitian-blog-via-rnetsec/</loc><lastmod>2016-09-21T19:42:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/21/amsi-how-windows-10-plans-to-stop-script-based-attacks-and-how-well-it-does-it-via-rnetsec/</loc><lastmod>2016-09-21T19:41:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/21/stealing-machine-learning-models-via-prediction-apis-via-rnetsec/</loc><lastmod>2016-09-21T19:41:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/21/csrf-vulnerability-allows-for-remote-compromise-of-monero-wallets-via-rnetsec/</loc><lastmod>2016-09-21T19:41:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/21/cappsule-open-source-hypervisor-to-sandbox-apps-via-rnetsec/</loc><lastmod>2016-09-21T12:19:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/21/commonexploitsvlan-hopping/</loc><lastmod>2016-09-21T09:55:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/21/mandatoryprogrammernorthkoreadnsleak/</loc><lastmod>2016-09-21T09:55:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/21/x-keyscore-as-a-sigdev-tool-2009-pdf/</loc><lastmod>2016-09-21T09:55:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/21/netbiosxpentest-bookmarks/</loc><lastmod>2016-09-21T09:55:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/21/hddcryptor-ransomware-uses-open-source-tools-to-thoroughly-own-systems/</loc><lastmod>2016-09-21T09:55:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/21/symantec-patches-products-against-exploitation-via-malicious-rar-files-softpedia-news/</loc><lastmod>2016-09-21T09:54:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/21/experts-found-apps-in-google-play-serving-the-overseer-malware-to-overseas-travelers/</loc><lastmod>2016-09-21T09:54:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/21/hacking-forward-with-weaponized-intelligence-dark-reading/</loc><lastmod>2016-09-21T09:54:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/21/hijacking-tons-of-instapage-expired-users-domains-subdomains-via-rnetsec/</loc><lastmod>2016-09-21T09:54:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/21/brian-krebs-blog-hit-by-665-gbps-ddos-attack/</loc><lastmod>2016-09-21T09:54:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/21/untangling-the-forget-me-knot-secure-account-recovery-made-simple-via-rnetsec/</loc><lastmod>2016-09-21T09:53:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/21/how-backconnect-performed-bgp-hijacks-via-rnetsec/</loc><lastmod>2016-09-21T09:53:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/20/rce-exploit-found-in-metasploit-itself-delighting-irony-lovers-everywhere-via-rnetsec/</loc><lastmod>2016-09-20T16:58:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/20/how-to-maximize-the-return-from-your-threat-intelligence-reporting/</loc><lastmod>2016-09-20T16:58:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/20/north-korea-accidentally-leaks-dns-for-kp-only-28-domains-via-rnetsec/</loc><lastmod>2016-09-20T11:41:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/20/microsoft-lets-beijing-fondle-its-bits-in-new-source-code-audit-hub/</loc><lastmod>2016-09-20T10:12:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/20/cisco-finds-new-zero-day-exploit-linked-to-nsa-hackers/</loc><lastmod>2016-09-20T10:11:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/20/remote-attack-tesla-motors-video-demonstration-by-keen-security-via-rnetsec/</loc><lastmod>2016-09-20T06:54:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/20/ruby-openssl-gcm-nonce-reuse-bug-via-rnetsec/</loc><lastmod>2016-09-20T06:54:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/19/heap-based-overflow-exploitation-use-case-the-macabre-dance-of-memory-chunks-via-rnetsec/</loc><lastmod>2016-09-20T06:54:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/19/burp-suite-rest-api-for-automated-security-testing-via-rnetsec/</loc><lastmod>2016-09-20T06:54:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/19/vawtrak-v2-a-close-look-at-the-cybercriminal-groups-behind-the-threat/</loc><lastmod>2016-09-19T21:57:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/19/detecting-analysts-before-installing-malware-via-rnetsec/</loc><lastmod>2016-09-19T14:19:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/19/fenixlocker-virus-decrypt-centrumfrindia-com-files/</loc><lastmod>2016-09-19T12:25:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/19/the-necurs-botnet/</loc><lastmod>2016-09-19T12:25:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/19/palo-alto-networks-researcher-discovers-eight-critical-vulnerabilities-in-adobe-flash-player/</loc><lastmod>2016-09-19T12:25:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/19/armada-collective-back-with-ransom-linked-ddos-assaults/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2016/09/cyber-security-threat-290x230-istockphoto-thinkstock.jpg</image:loc><image:title>cyber-security-threat-290x230-istockphoto-thinkstock</image:title><image:caption>Web threat</image:caption></image:image><lastmod>2016-09-19T11:06:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/19/blizzard-hit-with-ddos-attack-disrupting-play-for-gamers-zdnet/</loc><lastmod>2016-09-19T11:05:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/19/the-hddcryptor-ransomware-able-to-lock-victims-hard-drives/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2016/09/poor_cloud_data_protection_worse_than_cyber_spies.jpeg</image:loc><image:title>Silhouette of a hacker isloated on black</image:title><image:caption>Silhouette of a hacker isloated on black with binary codes on background</image:caption></image:image><lastmod>2016-09-19T11:05:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/19/fbi-overpaid-999900-to-crack-san-bernardino-iphone-5c-password/</loc><lastmod>2016-09-19T08:56:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/19/untangling-the-ripper-atm-malware/</loc><lastmod>2016-09-19T08:56:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/19/mozilla-will-fix-the-cross-platform-rce-flaw-that-threatened-tor-anonymity/</loc><lastmod>2016-09-19T08:55:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/19/cve-2016-6415-cisco-confirms-a-new-zero-day-linked-to-equation-group-hack/</loc><lastmod>2016-09-19T08:55:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/19/security-alert-all-geth-nodes-crash-due-to-an-out-of-memory-bug/</loc><lastmod>2016-09-19T08:42:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/18/bypass-uac-powershell-framework-for-uac-attacks-no-injecting-dlls-into-explorer-via-rnetsec/</loc><lastmod>2016-09-18T18:53:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/18/reverse-engineering-cisco-asa-for-extrabacon-offsets-via-rnetsec/</loc><lastmod>2016-09-18T18:53:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/18/twice-the-bits-twice-the-trouble-vulnerabilities-induced-by-migrating-to-64-bit-platforms-pdf-via-rnetsec/</loc><lastmod>2016-09-18T14:28:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/18/fixing-unquoted-search-paths-using-powershell-via-rnetsec/</loc><lastmod>2016-09-18T14:28:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/18/blind-java-deserialization-vulnerability-with-apache-commonscollections-and-ysoserial-via-rnetsec/</loc><lastmod>2016-09-18T14:28:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/18/mass-analyzing-a-chunk-of-the-internet-via-rnetsec/</loc><lastmod>2016-09-18T14:28:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/18/hstspreload-com-a-simple-api-to-check-browser-hsts-preload-status-via-rnetsec/</loc><lastmod>2016-09-18T14:27:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/18/active-or-aspiring-pentester-here-are-13-helpful-pentesting-blogs-via-rnetsec/</loc><lastmod>2016-09-18T14:27:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/18/facebook-page-takeover-bugbounty-via-rnetsec/</loc><lastmod>2016-09-18T14:27:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/16/powershell-empire-cve-2016-0189-profit-via-rnetsec/</loc><lastmod>2016-09-17T13:05:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/16/control-flow-enforcement-technology-preview-via-rnetsec/</loc><lastmod>2016-09-17T13:05:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/16/config-and-payload-extraction-for-cuckoo-sandbox-via-rnetsec/</loc><lastmod>2016-09-17T13:04:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/16/basic-windows-privilege-escalation-via-rnetsec/</loc><lastmod>2016-09-16T19:50:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/16/safe-mode-still-easy-to-exploit-via-rnetsec/</loc><lastmod>2016-09-16T16:17:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/16/swift-hackers-steal-10-million-from-ukrainian-bank/</loc><lastmod>2016-09-16T11:19:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/16/ransomware-scum-infect-comic-relief-server-internal-systems-taken-down/</loc><lastmod>2016-09-16T11:18:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/16/malicious-domains-to-block-2016-09-16/</loc><lastmod>2016-09-16T11:18:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/16/testing-for-sweet32-with-yawast-via-rnetsec/</loc><lastmod>2016-09-16T11:15:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/16/mat-metadata-anonymisation-toolkit/</loc><lastmod>2016-09-16T08:54:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/16/cisco-drops-patch-for-nasty-webex-remote-code-execution-hole/</loc><lastmod>2016-09-16T08:53:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/16/akamai-q2-2016-report-the-number-of-ddos-attacks-has-doubled-in-one-year/</loc><lastmod>2016-09-16T08:53:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/16/mamba-the-new-full-disk-encryption-ransomware-family-member/</loc><lastmod>2016-09-16T08:38:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/16/best-blog-series-to-understand-the-tor-architecture-via-rnetsec/</loc><lastmod>2016-09-16T08:38:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/16/1609-04327-the-bumpy-road-towards-iphone-5c-nand-mirroring-via-rnetsec/</loc><lastmod>2016-09-16T08:36:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/16/on-pentesting-professionalism-chill-via-rnetsec/</loc><lastmod>2016-09-16T08:36:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/16/hunting-for-vulnerabilities-in-signal-part-1-attachments-mac-bypass-via-rnetsec/</loc><lastmod>2016-09-16T08:36:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/15/naxsi-waf-for-nginx-via-rnetsec/</loc><lastmod>2016-09-15T22:37:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/15/deep-dive-certificate-pinning-vuln-in-firefox-and-tor-browser-via-rnetsec/</loc><lastmod>2016-09-15T22:36:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/15/chief-information-security-officers-should-be-reporting-to-chief-risk-officers/</loc><lastmod>2016-09-15T15:19:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/15/35000-arris-cable-modems-at-risk-from-firmware-dumper-bot/</loc><lastmod>2016-09-15T15:18:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/15/ammyy-admin-website-hacked-drops-latest-cerber-ransomware/</loc><lastmod>2016-09-15T15:18:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/15/wifi-pentesting-with-a-pineapple-nano-os-x-and-bettercap-via-rnetsec/</loc><lastmod>2016-09-15T15:12:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/15/6-steps-for-defending-against-ddos-attacks/</loc><lastmod>2016-09-15T12:17:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/15/recently-patched-drupal-flaw-exploited-in-the-wild/</loc><lastmod>2016-09-15T12:17:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/15/alessandrozlazagne/</loc><lastmod>2016-09-15T08:41:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/15/fancy-bears-hack-team/</loc><lastmod>2016-09-15T08:41:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/15/whats-next-for-threat-intelligence-itproportal/</loc><lastmod>2016-09-15T08:41:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/15/microsoft-patches-zero-day-flaw-used-in-two-massive-malvertising-campaigns-dark-reading/</loc><lastmod>2016-09-15T08:41:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/15/preparing-for-a-black-swan-cyberattack-harvard-business-review/</loc><lastmod>2016-09-15T08:40:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/15/notorious-russian-hacking-group-leaks-more-athlete-medical-records-fox-news/</loc><lastmod>2016-09-15T08:40:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/15/colin-powells-emails-leaked-online-he-calls-trump-national-disgrace/</loc><lastmod>2016-09-15T08:40:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/14/apache-mina-2-0-13-remote-command-execution-via-rnetsec/</loc><lastmod>2016-09-14T20:55:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/14/an-interesting-stackexchange-thread-on-why-its-generally-a-bad-idea-to-reveal-all-wrongly-entered-passwords-after-a-successful-login-via-rnetsec/</loc><lastmod>2016-09-14T20:54:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/14/how-to-access-tmobiles-national-lte-data-network-for-free-using-a-proxy-server-via-rnetsec/</loc><lastmod>2016-09-14T18:15:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/14/xiaomi-can-install-any-package-they-want-silently-via-rnetsec/</loc><lastmod>2016-09-14T15:12:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/14/burp-extension-non-http-intercepting-proxy-dns-server-via-rnetsec/</loc><lastmod>2016-09-14T13:36:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/14/google-will-pay-you-200000-to-hack-a-nexus-6p-and-5x/</loc><lastmod>2016-09-14T08:48:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/14/dnc-chair-blasts-trump-for-encouraging-cybercrime-in-new-statement-on-hacking-theblaze-com/</loc><lastmod>2016-09-14T08:48:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/14/the-automated-publicprivate-intel-sharing-system-that-enables-cisa/</loc><lastmod>2016-09-14T08:47:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/14/findadetour-the-tool-that-tests-for-vulnerable-microsofts-detours-via-rnetsec/</loc><lastmod>2016-09-14T08:43:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/14/microsoft-patches-47-vulnerabilities-with-september-patch-tuesday/</loc><lastmod>2016-09-14T08:43:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/14/6-6-million-plaintext-passwords-exposed-as-site-gets-hacked-to-the-bone-ars-technica/</loc><lastmod>2016-09-14T08:43:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/13/xt_sslpin-match-ssltls-certificate-finger-prints-at-the-netfilter-level-via-rnetsec/</loc><lastmod>2016-09-13T21:22:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/13/a-diagram-for-sabotaging-cryptosystems-via-rnetsec/</loc><lastmod>2016-09-13T19:08:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/13/pop-superstar-niall-horan-fell-victim-to-an-instagram-hacking-attack-via-rnetsec/</loc><lastmod>2016-09-13T19:08:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/13/profiling-site-visitors-by-timing-attacks-on-facebook-via-rnetsec/</loc><lastmod>2016-09-13T19:08:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/13/dualtoy-new-windows-trojan-sideloads-risky-apps-to-android-and-ios-devices/</loc><lastmod>2016-09-13T14:22:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/13/lab-test-reveals-10x-productivity-gain-from-real-time-threat-intelligence-for-siems/</loc><lastmod>2016-09-13T14:19:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/13/two-israeli-teenagers-have-been-arrested-for-allegedly-running-a-hacking-service-techradar/</loc><lastmod>2016-09-13T10:56:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/13/thousands-of-infected-ftp-servers-net-attackers-e77k-in-cryptocurrency/</loc><lastmod>2016-09-13T10:56:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/13/govrat-2-0-continues-to-target-us-companies-and-government/</loc><lastmod>2016-09-13T10:56:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/13/punkspider-a-web-vulnerability-search-engine/</loc><lastmod>2016-09-13T10:56:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/13/dropbox-apologies-for-clunky-administrator-account-access-on-macs/</loc><lastmod>2016-09-13T10:55:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/13/netspipowerupsql/</loc><lastmod>2016-09-13T10:55:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/13/shekyanslowhttptest/</loc><lastmod>2016-09-13T10:54:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/13/security-onion-conference-2016-videos-via-rnetsec/</loc><lastmod>2016-09-13T10:19:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/13/vulnerability-scannervuls-v0-1-6-released-scan-speed-20x-faster-on-ubuntu-via-rnetsec/</loc><lastmod>2016-09-13T10:18:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/13/imagesvgxml-considered-harmful-via-rnetsec/</loc><lastmod>2016-09-13T10:16:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/12/the-nightmare-behind-the-cross-platform-mobile-apps-dream-blackhat-asia-2015-via-rnetsec/</loc><lastmod>2016-09-12T20:44:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/12/edgeie-referer-spoofing-and-defeating-the-xss-filter-via-rnetsec/</loc><lastmod>2016-09-12T20:44:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/12/r2con-2016-recap-and-slidesvideos-links-via-rnetsec/</loc><lastmod>2016-09-12T20:44:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/12/luabot-malware-targeting-cable-modems-via-rnetsec/</loc><lastmod>2016-09-12T20:44:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/12/hidden-snmp-community-in-cisco-sg220-series-via-rnetsec/</loc><lastmod>2016-09-12T20:43:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/12/whitehat-ctf-pwn3-writeup-fun-with-faking-fclose-via-rnetsec/</loc><lastmod>2016-09-12T20:43:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/12/ultimate-guide-to-cracking-foreign-character-passwords-using-hashcat-via-rnetsec/</loc><lastmod>2016-09-12T12:18:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/12/mysql-remote-root-code-execution-privilege-escalation-0day-exploit-cve-2016-6662-via-rnetsec/</loc><lastmod>2016-09-12T12:18:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/12/escaping-the-lua-5-2-sandbox-with-untrusted-bytecode-pdf-via-rnetsec/</loc><lastmod>2016-09-12T12:18:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/11/sect-ctf-writeup-bypassing-path-restriction-on-whitelisted-cdns-using-double-encoding-to-circumvent-csp-protections-via-rnetsec/</loc><lastmod>2016-09-12T12:18:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/11/bsides-augusta-2016-videos-via-rnetsec/</loc><lastmod>2016-09-12T12:17:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/11/damn-vulnerable-redis-container-a-docker-container-demonstrating-remote-code-execution-through-redis-using-csrf-victims-running-unauthenticated-redis-locally-need-only-click-a-malicious-link-via/</loc><lastmod>2016-09-11T08:00:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/10/how-dropbox-gives-itself-accessibility-permissions-on-your-mac-via-rnetsec/</loc><lastmod>2016-09-10T19:49:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/10/internet-explorer-has-a-url-problem-via-rnetsec/</loc><lastmod>2016-09-10T15:49:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/10/everything-about-the-csv-excel-macro-injection-via-rnetsec/</loc><lastmod>2016-09-10T10:17:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/10/intercepting-https-traffic-of-android-nougat-applications-via-rnetsec/</loc><lastmod>2016-09-10T10:17:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/10/google-hacker-finds-way-to-exploit-yet-another-stagefright-bug-via-rnetsec/</loc><lastmod>2016-09-10T10:17:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/09/some-friday-humor-our-security-auditor-is-an-idiot-how-do-i-give-him-the-information-he-wants-x-post-from-rsysadmin-via-rnetsec/</loc><lastmod>2016-09-09T17:27:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/09/technical-analysis-of-necurs-one-of-the-biggest-spam-botnets-via-rnetsec/</loc><lastmod>2016-09-09T17:27:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/09/ducktoolkit-ng-hak5-usb-rubber-ducky-tool-via-rnetsec/</loc><lastmod>2016-09-09T17:27:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/09/sidestepping-your-lockscreen-with-an-innocent-looking-usb-stick/</loc><lastmod>2016-09-09T13:19:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/09/2-5-million-possibly-impacted-by-new-malware-in-google-play/</loc><lastmod>2016-09-09T13:18:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/09/oh-its-on-sale-usb-kill-to-destroy-any-computer-within-seconds/</loc><lastmod>2016-09-09T13:18:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/09/blatsting-command-and-control-protocol-via-rnetsec/</loc><lastmod>2016-09-09T13:07:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/09/accessurl-share-accounts-without-usernames-and-passwords/</loc><lastmod>2016-09-09T08:55:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/09/osquery-osx-attacks/</loc><lastmod>2016-09-09T08:55:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/09/the-missing-piece-sophisticated-os-x-backdoor-discovered/</loc><lastmod>2016-09-09T08:55:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/09/doctor-web-discovers-linux-trojan-written-in-rust/</loc><lastmod>2016-09-09T08:55:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/09/hackers-threatening-to-launch-a-huge-new-ddos-attack/</loc><lastmod>2016-09-09T08:54:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/09/talos-shadowgate-take-down-global-malvertising-campaign-thwarted/</loc><lastmod>2016-09-09T08:54:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/09/43-7-of-cloud-based-malware-delivers-ransomware/</loc><lastmod>2016-09-09T08:54:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/09/two-alleged-members-of-crackas-with-attitude-group-arrested-for-hacking-us-gov-officials/</loc><lastmod>2016-09-09T08:54:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/09/ddos-extortionist-copycats-continue-to-hound-victims-forbes/</loc><lastmod>2016-09-09T08:53:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/09/how-my-rogue-android-app-could-monitor-brute-force-your-apps-sensitive-metadata-via-rnetsec/</loc><lastmod>2016-09-09T08:53:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/09/bugbounty-decoding-a-%f0%9f%98%b1000-00-htpasswd-bounty-via-rnetsec/</loc><lastmod>2016-09-09T08:53:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/09/fault-attacks-on-rsas-signatures-via-rnetsec/</loc><lastmod>2016-09-09T08:53:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/09/how-tiaa-uses-threat-intelligence-to-enhance-security-awareness/</loc><lastmod>2016-09-09T02:41:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/09/how-a-scammer-on-reddit-stole-500-from-me-and-in-the-end-begged-me-not-to-tell-his-parents-via-rnetsec/</loc><lastmod>2016-09-09T02:41:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/08/nexmon-enable-monitor-mode-and-run-arbitrary-code-on-bcm4339-wifi-chip-nexus-5-via-rnetsec/</loc><lastmod>2016-09-08T18:59:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/08/online-banking-vulnerabilities-authorization-flaws-lead-the-way-research-summary-via-rnetsec/</loc><lastmod>2016-09-08T18:58:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/08/google-will-mark-http-pages-in-chrome-as-not-secure-via-rnetsec/</loc><lastmod>2016-09-08T18:58:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/08/announcing-a-microsoft-net-core-and-asp-net-core-bug-bounty-via-rnetsec/</loc><lastmod>2016-09-08T18:58:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/08/irresponsible-disclosure-a-manifesto-via-rnetsec/</loc><lastmod>2016-09-08T18:58:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/08/cry-csto-ransomware-uses-google-maps-udp-and-imgur-removal-guide/</loc><lastmod>2016-09-08T13:45:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/08/cryptomining-malware-on-nas-servers-is-one-of-them-yours/</loc><lastmod>2016-09-08T13:44:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/08/politicians-password-accidentally-tweeted-to-thousands/</loc><lastmod>2016-09-08T13:44:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/08/hacker-interviews-the-anonrising-irc-collective/</loc><lastmod>2016-09-08T13:44:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/08/cross-platform-mokes-backdoor-os-x-exists-and-is-spreading-in-the-wild/</loc><lastmod>2016-09-08T13:44:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/08/poc-video-of-cve-2016-4264-adobe-coldfusion-xxe-exploit-via-rnetsec/</loc><lastmod>2016-09-08T13:44:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/08/common-python-vulnerabilities-via-rnetsec/</loc><lastmod>2016-09-08T13:44:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/08/angular-1-6-expression-sandbox-removal-via-rnetsec/</loc><lastmod>2016-09-08T13:43:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/08/last-fm-longest-cracked-passwords-via-rnetsec/</loc><lastmod>2016-09-08T13:43:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/08/finding-phishing-websites/</loc><lastmod>2016-09-08T08:33:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/08/uks-cyber-amateurs-battle-shadowy-hackers/</loc><lastmod>2016-09-08T08:33:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/08/data-stealing-mac-os-x-backdoor-uncovered/</loc><lastmod>2016-09-08T08:33:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/08/wordpress-4-6-1-upgrades-security-fixes-15-bugs/</loc><lastmod>2016-09-08T08:33:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/08/ten-year-old-windows-media-player-hack-is-the-new-black-again/</loc><lastmod>2016-09-08T08:33:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/08/warning-this-cross-platform-malware-can-hack-windows-linux-and-os-x-computers/</loc><lastmod>2016-09-08T08:32:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/08/russia-hacks-us-systems-all-the-time-said-director-of-national-intelligence/</loc><lastmod>2016-09-08T08:32:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/08/nobex-a-tool-for-testing-bluetooth-phone-and-messaging-profiles-in-infotainment-systems-via-rnetsec/</loc><lastmod>2016-09-08T08:31:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/07/crypteron-just-released-a-free-community-edition-encryption-key-management-and-one-click-data-breach-response-for-net-via-rnetsec/</loc><lastmod>2016-09-07T23:05:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/07/uber-bug-bounty-reading-uber-emails-worth-10000-via-rnetsec/</loc><lastmod>2016-09-07T23:05:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/07/project-zero-exploiting-libutils-on-android-via-rnetsec/</loc><lastmod>2016-09-07T19:48:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/07/expanding-on-a-known-vulnerability-attacking-with-jython-via-rnetsec/</loc><lastmod>2016-09-07T19:46:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/07/how-to-generate-secure-random-numbers-in-various-programming-languages-via-rnetsec/</loc><lastmod>2016-09-07T19:46:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/07/hacker-interviews-h0t_p0ppy-the-hacktivist/</loc><lastmod>2016-09-07T12:15:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/07/heres-how-to-hack-windowsmac-os-x-login-password-when-locked/</loc><lastmod>2016-09-07T12:15:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/07/telnet-is-not-dead-at-least-not-on-smart-devices-via-rnetsec/</loc><lastmod>2016-09-07T12:10:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/07/dridex-banking-trojan-will-soon-target-crypto-currency-wallets-softpedia-news/</loc><lastmod>2016-09-07T10:14:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/07/china-linked-apt3-group-focuses-attacks-on-hong-kong/</loc><lastmod>2016-09-07T10:13:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/07/fortinet-firewall-egregiousblunder-checker/</loc><lastmod>2016-09-07T10:07:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/07/running-a-tor-exit-node-for-fun-and-e-mails/</loc><lastmod>2016-09-07T10:07:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/07/google-emits-three-sets-of-android-patches-to-fend-off-evil-texts-files/</loc><lastmod>2016-09-07T10:07:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/07/mirai-linux-trojan-corrals-iot-devices-into-ddos-botnets/</loc><lastmod>2016-09-07T10:07:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/07/sonys-playstation-network-psn-goes-down-hack-read/</loc><lastmod>2016-09-07T10:06:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/06/bypassing-mcafees-application-whitelisting-for-critical-infrastructure-systems-via-rnetsec/</loc><lastmod>2016-09-06T21:42:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/06/lineinfile-be-damned-how-ansibles-lineinfile-module-helped-us-improve-our-apache-httpd-tls-configurations-via-rnetsec/</loc><lastmod>2016-09-06T21:41:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/06/alex-ionescu-the-linux-kernel-hidden-inside-windows-10-pdf-via-rnetsec/</loc><lastmod>2016-09-06T21:41:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/06/re-thinking-access-management-for-digital-business-via-rnetsec/</loc><lastmod>2016-09-06T21:41:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/06/pdf-usbee-air-gap-covert-channel-via-electromagnetic-emission-from-usb-via-rnetsec/</loc><lastmod>2016-09-06T20:38:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/06/stealing-data-from-inputs-and-textareas-in-edge-via-rnetsec/</loc><lastmod>2016-09-06T20:38:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/06/building-an-effective-network-defense-using-threat-intelligence/</loc><lastmod>2016-09-06T14:58:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/06/numerous-cisco-devices-still-vulnerable-to-extrabacon/</loc><lastmod>2016-09-06T14:58:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/06/school-ransomware-a-threat-to-be-aware-of/</loc><lastmod>2016-09-06T14:58:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/06/warner-brothers-informed-its-own-website-as-illegal-ask-google-to-remove-it-via-rnetsec/</loc><lastmod>2016-09-06T14:50:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/06/hundreds-of-certificates-ssh-host-keys-matching-private-keys-found-in-embedded-system-firmware-released-via-rnetsec/</loc><lastmod>2016-09-06T14:50:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/06/ivan-ristic-is-http-public-key-pinning-dead-via-rnetsec/</loc><lastmod>2016-09-06T14:50:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/06/pegasus-ios-kernel-vulnerability-explained-part-2-via-rnetsec/</loc><lastmod>2016-09-06T14:48:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/06/sec-consult-sa-20160906-0-private-key-for-browser-trusted-certificate-embedded-in-multiple-aruba-networks-alcatel-lucent-products/</loc><lastmod>2016-09-06T11:36:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/06/hackers-find-twitter-exploit-and-resurrect-banned-accounts/</loc><lastmod>2016-09-06T11:35:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/06/banking-trojan-gugi-evolves-to-bypass-android-6-protection/</loc><lastmod>2016-09-06T11:35:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/06/snagging-creds-from-locked-windows-machines-via-rnetsec/</loc><lastmod>2016-09-06T09:41:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/06/searchpass-a-simple-tool-for-offline-searching-of-default-credentials-for-network-devices-web-applications-and-more-via-rnetsec/</loc><lastmod>2016-09-06T09:41:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/06/github-ail-framework-analysis-information-leak-framework-via-rnetsec/</loc><lastmod>2016-09-06T08:50:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/06/hacker-takes-down-ceo-wire-transfer-scammers-sends-their-win-10-creds-to-the-cops/</loc><lastmod>2016-09-06T08:02:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/06/luabot-is-the-first-botnet-malware-coded-in-lua-targeting-linux-platforms-softpedia-news/</loc><lastmod>2016-09-06T08:02:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/06/russias-largest-portal-hacked-nearly-100-million-plaintext-passwords-leaked/</loc><lastmod>2016-09-06T08:02:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/06/asus-broken-api-authentication-via-rnetsec/</loc><lastmod>2016-09-06T08:02:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/06/ms-edge-how-to-guess-visited-sites-from-the-user-via-rnetsec/</loc><lastmod>2016-09-06T08:02:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/05/zigbee-exploited-the-good-the-bad-and-the-ugly-by-tobias-zillner-via-rnetsec/</loc><lastmod>2016-09-05T22:52:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/05/7-million-lifeboat-accounts-from-jan-2016-breach-leaked-online/</loc><lastmod>2016-09-05T19:49:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/05/mmd-0057-2016-new-elf-botnet-linuxluabot/</loc><lastmod>2016-09-05T19:49:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/05/cerber-3-0-ransomware-variant-emerges/</loc><lastmod>2016-09-05T19:49:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/05/google-chrome-fixes-serious-vulnerabilities-thanks-to-bug-fighters/</loc><lastmod>2016-09-05T19:48:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/05/armada-collective-hackers-to-launch-ddos-attacks-on-unwitting-victims-unless-they-pay-1-bitcoin-international-business-times-uk/</loc><lastmod>2016-09-05T19:48:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/05/exposed-almost-800000-brazzers-usernames-and-passwords-revealed-after-forum-hack/</loc><lastmod>2016-09-05T19:48:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/05/locky-ransomware-now-downloaded-as-encrypted-dlls-trendlabs-security-intelligence-blog/</loc><lastmod>2016-09-05T19:48:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/05/security-problems-of-an-11-year-old-via-rnetsec/</loc><lastmod>2016-09-05T17:42:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/05/pokemon-themed-umbreon-linux-rootkit-hits-x86-arm-systems-via-rnetsec/</loc><lastmod>2016-09-05T16:31:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/05/how-i-hacked-your-cfp-and-probably-some-other-things-too-via-rnetsec/</loc><lastmod>2016-09-05T15:15:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/05/open-source-ddos-detection-toolkit-scalable-up-to-1-1-tbps-via-rnetsec/</loc><lastmod>2016-09-05T15:14:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/05/apple-releases-urgent-update-after-spying-malware-uncovered-it-pro/</loc><lastmod>2016-09-05T11:06:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/05/you-dirty-rat-spy-versus-spy-in-the-cybercrime-underworld/</loc><lastmod>2016-09-05T11:06:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/05/after-4-days-gabon-is-getting-back-on-the-internet/</loc><lastmod>2016-09-05T11:06:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/05/pokemon-themed-umbreon-linux-rootkit-hits-x86-arm-systems/</loc><lastmod>2016-09-05T11:05:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/05/state-election-system-hacking-linked-to-previous-attacks/</loc><lastmod>2016-09-05T11:05:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/05/compute-ssdeep-hashes-using-python-for-windows-via-rnetsec/</loc><lastmod>2016-09-05T11:02:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/05/iranian-hacking-tools-treadstone71/</loc><lastmod>2016-09-05T08:15:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/05/a-sneaky-hacker-is-infecting-other-hackers-with-malware-softpedia-news/</loc><lastmod>2016-09-05T08:15:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/05/hillary-clinton-hacker-guccifer-sentenced-to-52-months-for-other-crimes/</loc><lastmod>2016-09-05T08:15:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/05/malvertising-campaign-with-neutrino-exploit-kit-discovered-shut-down/</loc><lastmod>2016-09-05T08:15:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/05/hacking-group-ourmine-takes-control-of-variety-website-spams-readers-with-email-slashgear/</loc><lastmod>2016-09-05T08:15:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/05/hacker-interviews-0xomar-0xomar1337/</loc><lastmod>2016-09-05T08:14:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/05/the-nsas-stash-of-digital-holes-is-a-threat-to-everyone-online-the-guardian/</loc><lastmod>2016-09-05T08:14:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/05/hacked-bitcointalk-org-forum-database-goes-for-sale-on-dark-web/</loc><lastmod>2016-09-05T08:14:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/05/sundown-exploit-kit-authors-champions-of-copy-paste-hacking-the-register/</loc><lastmod>2016-09-05T08:13:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/05/capturing-0day-exploits-with-perfectly-placed-hardware-traps-endgame/</loc><lastmod>2016-09-05T08:13:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/05/how-trojans-manipulate-google-play-securelist/</loc><lastmod>2016-09-05T08:13:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/05/open-tor-botnet-zib/</loc><lastmod>2016-09-05T08:13:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/05/internet-tracking-has-moved-beyond-cookies-via-rnetsec/</loc><lastmod>2016-09-05T08:07:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/05/hop-a-proxy-server-to-enable-arbitrary-protocols-behind-an-http-proxy-comments-on-use-of-proxies-to-block-traffic-via-rnetsec/</loc><lastmod>2016-09-05T08:07:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/03/counter-strike-is-broken-hacking-like-its-the-90s-via-rnetsec/</loc><lastmod>2016-09-03T20:43:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/03/how-to-get-the-raw-ntlm-for-pthopth-out-of-a-ntlm-cr-with-the-new-des-kpa-mode-in-hashcat-via-rnetsec/</loc><lastmod>2016-09-03T15:38:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/03/finnish-security-police-dont-take-your-phone-abroad-with-you-via-rnetsec/</loc><lastmod>2016-09-03T15:38:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/03/end-to-end-encryption-e2ee-secure-chats-in-mobile-apps-via-rnetsec/</loc><lastmod>2016-09-03T09:29:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/03/fireeye-report-on-apt29s-hammertoss-malware-via-rnetsec/</loc><lastmod>2016-09-03T09:29:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/02/mapi-over-http-and-mailrule-pwnage-via-rnetsec/</loc><lastmod>2016-09-03T09:29:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/02/bug-bounty-hunting-tips-via-rnetsec/</loc><lastmod>2016-09-03T09:28:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/02/bringing-home-the-extrabacon-exploit-via-rnetsec/</loc><lastmod>2016-09-03T09:28:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/02/cycript-on-steroids-pumping-up-portability-and-performance-with-frida-via-rnetsec/</loc><lastmod>2016-09-03T09:28:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/02/pegasus-ios-kernel-vulnerability-explained-via-rnetsec/</loc><lastmod>2016-09-02T17:57:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/02/creating-malicious-outlook-rules-via-rnetsec/</loc><lastmod>2016-09-02T15:13:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/02/ursnif-malware-deep-technical-dive-via-rnetsec/</loc><lastmod>2016-09-02T15:13:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/02/recordings-from-the-6th-annual-international-cybersecurity-conference-via-rnetsec/</loc><lastmod>2016-09-02T09:36:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/02/report-on-takedown-of-exploit-kit-3917-domains-that-serve-ransomware-via-rnetsec/</loc><lastmod>2016-09-02T09:36:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/01/talos-shadowgate-take-down-via-rnetsec/</loc><lastmod>2016-09-02T01:21:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/01/csp-is-dead-long-live-csp-on-the-insecurity-of-whitelists-and-the-future-of-content-security-policy-via-rnetsec/</loc><lastmod>2016-09-02T01:21:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/01/pass-unix-password-manager-via-rnetsec/</loc><lastmod>2016-09-02T01:21:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/01/infosectoughguy-cool-xss-tricks-with-anonymous-javascript-functions-via-rnetsec/</loc><lastmod>2016-09-01T19:05:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/01/a-new-tor-bridge-authority-via-rnetsec/</loc><lastmod>2016-09-01T19:05:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/01/almost-impossible-slack-xss-using-chromes-web-custom-data-uti-to-inject-a-stored-xss-via-rnetsec/</loc><lastmod>2016-09-01T19:05:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/01/undocumented-patched-vulnerability-in-nexus-5x-allowed-for-memory-dumping-via-usb-via-rnetsec/</loc><lastmod>2016-09-01T19:05:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/01/why-fairware-ransomware-is-nothing-but-a-scam-via-rnetsec/</loc><lastmod>2016-09-01T19:05:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/01/the-osx-version-of-the-transmission-bittorrent-client-was-infected-for-a-few-hours-on-august-28-2016-via-rnetsec/</loc><lastmod>2016-09-01T19:05:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/01/the-target_blank-vulnerability-by-example-via-rnetsec/</loc><lastmod>2016-09-01T19:05:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/01/hacker-interviews-speaking-with-lorenzo-martinez/</loc><lastmod>2016-09-01T12:17:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/01/atm-malware-hacks-thai-police-issue-arrest-warrant-for-russian-man-suspected-of-role-in-heists-international-business-times-uk/</loc><lastmod>2016-09-01T12:17:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/01/rig-developers-testing-new-exploits-cc-patterns/</loc><lastmod>2016-09-01T12:17:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/01/building-a-new-tor-that-can-resist-next-generation-state-surveillance/</loc><lastmod>2016-09-01T12:16:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/01/one-of-europes-biggest-companies-loses-e40-million-in-online-scam/</loc><lastmod>2016-09-01T08:30:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/01/achieving-the-value-of-threat-intelligence-putting-your-roi-into-infoworld/</loc><lastmod>2016-09-01T08:29:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/01/swift-warns-of-new-attacks-pushes-for-security-upgrades/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2016/09/swift.jpg</image:loc><image:title>swift</image:title></image:image><lastmod>2016-09-01T08:29:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/01/exploitpack-ra-v6-0-ghost-hunter-list-your-new-exploit-on-exploit-pack-you-will-need/</loc><lastmod>2016-09-01T08:28:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/01/dresscode-android-malware-found-in-over-40-google-play-store-apps/</loc><lastmod>2016-09-01T08:27:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/01/new-version-of-cerber-ransomware-distributed-via-malvertising/</loc><lastmod>2016-09-01T08:27:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/01/mr-chows-website-serves-up-ransomware/</loc><lastmod>2016-09-01T08:27:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/01/vulnerabilities-found-in-cars-connected-to-smartphones/</loc><lastmod>2016-09-01T08:27:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/01/electronic-arts-ea-servers-down-poodlecorp-claims-it-ddosed-gaming-giant-hack-read/</loc><lastmod>2016-09-01T08:26:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/01/malware-exposes-payment-card-data-at-kimpton-hotels/</loc><lastmod>2016-09-01T08:26:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/01/new-cloud-attack-takes-full-control-of-virtual-machines-with-little-effort/</loc><lastmod>2016-09-01T08:24:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/01/bashlite-botnets-peaked-1-million-internet-of-thing-devices/</loc><lastmod>2016-09-01T08:24:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/01/spotify-resets-users-passwords-due-to-data-breaches-suffered-by-other-firms/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2016/09/open-graph-default.png</image:loc><image:title>open-graph-default</image:title></image:image><lastmod>2016-09-01T08:23:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/01/malicious-office-docs-install-proxies-to-spy-on-https-traffic/</loc><image:image><image:loc>https://securityx.space/wp-content/uploads/2016/09/campana-o365-todo-lo-que-quizo-saber-sobre-la-nube500.jpg</image:loc><image:title>campana-o365-todo-lo-que-quizo-saber-sobre-la-nube500</image:title></image:image><lastmod>2016-09-01T08:22:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/01/bugs-found-in-gcc-with-the-help-of-pvs-studio-via-rnetsec/</loc><lastmod>2016-09-01T08:08:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/09/01/reported-uk-data-breaches-soar-88-in-a-year-x-post-reuroprivacy-via-rnetsec/</loc><lastmod>2016-09-01T08:08:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/08/31/mssp-aka-misplaced-security-sensor-perlarva-via-rnetsec/</loc><lastmod>2016-08-31T21:21:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/08/31/breaching-a-ca-blind-cross-site-scripting-bxss-in-the-geotrust-ssl-operations-panel-using-xss-hunter-via-rnetsec/</loc><lastmod>2016-08-31T21:18:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/08/31/kali-linux-2016-2-release-via-rnetsec/</loc><lastmod>2016-08-31T21:18:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/08/31/ecos-romfs-structure-and-unpacking-via-rnetsec/</loc><lastmod>2016-08-31T21:18:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/08/31/rio-olympics-take-the-gold-for-540gbsec-sustained-ddos-attacks-x-post-rprogramming-via-rnetsec/</loc><lastmod>2016-08-31T21:18:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/08/31/dark-web-osint-with-python-part-three-visualization-via-rnetsec/</loc><lastmod>2016-08-31T21:18:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/08/31/stealing-all-browser-data-passwordshistory-etc-from-yandex-browser-by-exploiting-a-csrf-in-the-yandexs-sync-system-via-rnetsec/</loc><lastmod>2016-08-31T21:18:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/08/31/enabling-osint-in-activity-based-intelligence-abi/</loc><lastmod>2016-08-31T16:40:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/08/31/rio-olympics-take-the-gold-for-540gbsec-sustained-ddos-attacks/</loc><lastmod>2016-08-31T16:40:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/08/31/trezor-as-fidou2f-key-via-rnetsec/</loc><lastmod>2016-08-31T15:18:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/08/31/over-18000-redis-instances-targeted-by-fake-ransomware-via-rnetsec/</loc><lastmod>2016-08-31T14:26:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/08/31/the-promise-of-intel-sgx-have-you-read-the-fine-print-via-rnetsec/</loc><lastmod>2016-08-31T14:26:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/08/31/researchers-have-replicated-one-of-the-nsas-scariest-hacking-tools/</loc><lastmod>2016-08-31T12:37:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/08/31/can-blockchain-prevent-cybercrime/</loc><lastmod>2016-08-31T12:36:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/08/31/hacker-interviews-northscripts-from-p0werfulgreakarmy/</loc><lastmod>2016-08-31T12:36:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/08/31/cerber3-ransomware-virus-spotted-via-rnetsec/</loc><lastmod>2016-08-31T12:34:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/08/31/the-dropbox-hack-is-real-via-rnetsec/</loc><lastmod>2016-08-31T12:34:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/08/31/if-you-thought-the-finfisher-hack-put-gamma-international-out-of-business-think-again-via-rnetsec/</loc><lastmod>2016-08-31T12:33:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/08/31/so-i-lost-my-openbsd-fde-password-reversing-the-metadata-and-building-a-bruteforcer-via-rnetsec/</loc><lastmod>2016-08-31T12:33:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/08/31/swift-discloses-more-cyber-thefts/</loc><lastmod>2016-08-31T08:56:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/08/31/new-fantom-ransomware-poses-as-windows-update/</loc><lastmod>2016-08-31T08:55:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/08/31/anglers-obituary-super-exploit-kit-was-the-work-of-russias-lurk-group/</loc><lastmod>2016-08-31T08:55:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/08/31/onelogin-breached-hacker-finds-cleartext-credential-notepads/</loc><lastmod>2016-08-31T08:55:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/08/31/ios-9-3-4-and-minor-versions-are-vulnerable-to-the-trident-exploit/</loc><lastmod>2016-08-31T08:54:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/08/31/dropbox-hacked-more-than-68-million-account-details-leaked-online/</loc><lastmod>2016-08-31T08:54:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/08/31/malware-analysis-dridex-loader-part-2/</loc><lastmod>2016-08-31T08:54:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/08/31/how-to-truly-benefit-from-penetration-tests-and-bug-bounties-via-rnetsec/</loc><lastmod>2016-08-31T08:48:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/08/31/wosign-erroneously-issues-github-com-certificate-to-unauthorized-user-then-fails-to-revoke-it-via-rnetsec/</loc><lastmod>2016-08-31T08:48:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/08/31/transmission-bittorrent-infected-again-via-rnetsec/</loc><lastmod>2016-08-31T08:48:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/08/30/icectf-nosqli-via-rnetsec/</loc><lastmod>2016-08-30T22:29:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/08/30/our-free-outlook-plugin-for-windows-users-to-easily-report-suspicious-email-to-your-sec-team-via-rnetsec/</loc><lastmod>2016-08-30T22:29:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/08/30/analyzing-malicious-office-documents-via-rnetsec/</loc><lastmod>2016-08-30T22:29:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/08/30/the-easiest-way-to-bypass-xss-mitigations-via-rnetsec/</loc><lastmod>2016-08-30T22:29:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/08/30/l0phtcrack-7-released-via-rnetsec/</loc><lastmod>2016-08-30T20:19:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/08/30/back-door-penetration-lessons-learned-via-rnetsec/</loc><lastmod>2016-08-30T20:19:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/08/30/advice-on-how-to-retain-and-keep-your-security-talent-happy-via-rnetsec/</loc><lastmod>2016-08-30T16:14:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/08/30/diy-dos-uncontrollable-table-growth-via-rnetsec/</loc><lastmod>2016-08-30T16:14:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/08/30/how-threat-intelligence-can-save-your-business-pc-magazine/</loc><lastmod>2016-08-30T16:14:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/08/30/vipasana-ransomware-virus/</loc><lastmod>2016-08-30T16:14:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/08/30/jduckchallack/</loc><lastmod>2016-08-30T10:21:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/08/30/foospidyhoneypy/</loc><lastmod>2016-08-30T10:20:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/08/30/arthepsyssh-audit/</loc><lastmod>2016-08-30T10:20:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/08/30/cyber-attack-puts-data-of-opera-users-at-risk/</loc><lastmod>2016-08-30T10:20:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/08/30/doctor-web-discovers-windows-trojan-that-installs-fake-chrome-browser/</loc><lastmod>2016-08-30T10:20:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/08/30/the-hunt-for-lurk/</loc><lastmod>2016-08-30T10:19:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/08/30/banker-trojan-goznym-spreading-across-countries-through-spam/</loc><lastmod>2016-08-30T10:19:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/08/30/sri-lankan-teen-arrested-for-hacking-presidents-website-to-demand-that-a-level-exams-be-postponed/</loc><lastmod>2016-08-30T10:19:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/08/30/cyber-threat-grows-for-bitcoin-exchanges/</loc><lastmod>2016-08-30T10:19:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/08/30/codexgigas-malware-profiling-search-engine/</loc><lastmod>2016-08-30T10:19:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/08/30/cozy-bear-suspected-of-hacking-russia-focused-think-tanks-in-d-c-sc-magazine/</loc><lastmod>2016-08-30T10:18:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/08/30/the-ripper-malware-linked-to-the-recent-atm-attacks-in-thailand/</loc><lastmod>2016-08-30T10:18:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/08/30/fbi-flash-alert-says-foreign-hackers-compromised-state-election-systems/</loc><lastmod>2016-08-30T10:18:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/08/30/dark-web-is-a-dangerous-frontier-for-those-trying-to-keep-terrorists-at-bay/</loc><lastmod>2016-08-30T10:17:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/08/30/crowdstrike-machine-learning-and-virustotal/</loc><lastmod>2016-08-30T10:17:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/08/30/nsa-unit-8200-and-malware-proliferation/</loc><lastmod>2016-08-30T10:17:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/08/30/xss-in-kayako-helpdesk-software-via-rnetsec/</loc><lastmod>2016-08-30T10:17:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/08/30/russian-hackers-accessed-2-us-voter-databases-officials-via-rnetsec/</loc><lastmod>2016-08-30T10:17:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space/2016/08/30/hacked-investigating-an-intrusion-on-my-server-via-rnetsec/</loc><lastmod>2016-08-30T10:17:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityx.space</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2023-09-12T20:26:59+00:00</lastmod></url></urlset>
