<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://securelist.com/sitemap.xsl"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd">
<!-- Sitemap is generated on 2026-04-03 13:43:02 GMT -->
	<url>
		<loc>https://securelist.com/</loc>
	</url>
	<url>
		<loc>https://securelist.com/all/</loc>
	</url>
	<url>
		<loc>https://securelist.com/terms-of-use/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ksb-2024/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ksb-2023/</loc>
	</url>
	<url>
		<loc>https://securelist.com/trng-2023/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ksb-2022/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ksb-2021/</loc>
	</url>
	<url>
		<loc>https://securelist.com/user-profile/</loc>
	</url>
	<url>
		<loc>https://securelist.com/threat-categories/</loc>
	</url>
	<url>
		<loc>https://securelist.com/categories/</loc>
	</url>
	<url>
		<loc>https://securelist.com/authors/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ksb-2020/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ksb-2019/</loc>
	</url>
	<url>
		<loc>https://securelist.com/thank-you/</loc>
	</url>
	<url>
		<loc>https://securelist.com/preferences/</loc>
	</url>
	<url>
		<loc>https://securelist.com/unsubscribe/</loc>
	</url>
	<url>
		<loc>https://securelist.com/subscription/</loc>
	</url>
	<url>
		<loc>https://securelist.com/subscribe/</loc>
	</url>
	<url>
		<loc>https://securelist.com/privacy/</loc>
	</url>
	<url>
		<loc>https://securelist.com/terms-of-service/</loc>
	</url>
	<url>
		<loc>https://securelist.com/contacts/</loc>
	</url>
	<url>
		<loc>https://securelist.com/map/</loc>
	</url>
	<url>
		<loc>https://securelist.com/rss-feeds/</loc>
	</url>
	<url>
		<loc>https://securelist.com/tags/</loc>
	</url>
	<url>
		<loc>https://securelist.com/crystalx-rat-with-prankware-features/119283/</loc>
	</url>
	<url>
		<loc>https://securelist.com/litellm-supply-chain-attack/119257/</loc>
	</url>
	<url>
		<loc>https://securelist.com/coruna-framework-updated-operation-triangulation-exploit/119228/</loc>
	</url>
	<url>
		<loc>https://securelist.com/global-report-security-services-2026/119233/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/soc-build-buy-or-hybrid/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/inside-the-dark-web-job-market-their-talent-our-threat/</loc>
	</url>
	<url>
		<loc>https://securelist.com/horabot-campaign/119033/</loc>
	</url>
	<url>
		<loc>https://securelist.com/gopix-banking-trojan/119173/</loc>
	</url>
	<url>
		<loc>https://securelist.com/beatbanker-miner-and-banker/119121/</loc>
	</url>
	<url>
		<loc>https://securelist.com/vulnerabilities-and-exploits-in-q4-2025/119105/</loc>
	</url>
	<url>
		<loc>https://securelist.com/mobile-threat-report-2025/119076/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/hunt-hub-opening-the-black-box-of-edr-detection/</loc>
	</url>
	<url>
		<loc>https://securelist.com/arkanix-stealer/119006/</loc>
	</url>
	<url>
		<loc>https://securelist.com/keenadu-android-backdoor/118913/</loc>
	</url>
	<url>
		<loc>https://securelist.com/renengine-campaign-with-hijackloader-lumma-and-acr-stealer/118891/</loc>
	</url>
	<url>
		<loc>https://securelist.com/spam-and-phishing-report-2025/118785/</loc>
	</url>
	<url>
		<loc>https://securelist.com/stan-ghouls-in-uzbekistan/118738/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/signal-in-the-noise-what-2025-hacktivism-reveals-about-the-modern-threat-landscape/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/kaspersky-security-bulletin-2025-decoding-the-finance-sector-threats/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/state-of-ai-in-cybersecurity-ai-trends-predictions-for-2026/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/ksb-kaspersky-ics-cert-trends-and-predictions-for-2026/</loc>
	</url>
	<url>
		<loc>https://securelist.com/notepad-supply-chain-attack/118708/</loc>
	</url>
	<url>
		<loc>https://securelist.com/escan-supply-chain-attack/118688/</loc>
	</url>
	<url>
		<loc>https://securelist.com/honeymyte-updates-coolclient-uses-browser-stealers-and-scripts/118664/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/ai-agents-vs-prompt-injections/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/the-quantum-threat-preparing-for-next-generation-cyber-risks/</loc>
	</url>
	<url>
		<loc>https://securelist.com/honeymyte-kernel-mode-rootkit/118590/</loc>
	</url>
	<url>
		<loc>https://securelist.com/industrial-threat-report-q3-2025/118602/</loc>
	</url>
	<url>
		<loc>https://securelist.com/evasive-panda-apt/118576/</loc>
	</url>
	<url>
		<loc>https://securelist.com/siem-effectiveness-assessment/118560/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webrat-distributed-via-github/118555/</loc>
	</url>
	<url>
		<loc>https://securelist.com/cloud-atlas-h1-2025-campaign/118517/</loc>
	</url>
	<url>
		<loc>https://securelist.com/lateral-movement-via-dcom-abusing-control-panel/118232/</loc>
	</url>
	<url>
		<loc>https://securelist.com/operation-forumtroll-new-targeted-campaign/118492/</loc>
	</url>
	<url>
		<loc>https://securelist.com/attacking-car-modem/118463/</loc>
	</url>
	<url>
		<loc>https://securelist.com/frogblight-banker/118440/</loc>
	</url>
	<url>
		<loc>https://securelist.com/what-happens-to-stolen-data-after-phishing-attacks/118180/</loc>
	</url>
	<url>
		<loc>https://securelist.com/zigbee-protocol-security-assessment/118373/</loc>
	</url>
	<url>
		<loc>https://securelist.com/detecting-mythic-in-network-traffic/118291/</loc>
	</url>
	<url>
		<loc>https://securelist.com/cve-2025-55182-exploitation/118331/</loc>
	</url>
	<url>
		<loc>https://securelist.com/goodbye-dark-telegram/118286/</loc>
	</url>
	<url>
		<loc>https://securelist.com/shai-hulud-2-0/118214/</loc>
	</url>
	<url>
		<loc>https://securelist.com/vulnerabilities-and-exploits-in-q3-2025/118197/</loc>
	</url>
	<url>
		<loc>https://securelist.com/kaspersky-security-bulletin-2025-statistics/118189/</loc>
	</url>
	<url>
		<loc>https://securelist.com/tomiris-new-tools/118143/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ntlm-abuse-in-2025/118132/</loc>
	</url>
	<url>
		<loc>https://securelist.com/black-friday-threat-report-2025/118083/</loc>
	</url>
	<url>
		<loc>https://securelist.com/toddycat-apt-steals-email-data-from-outlook/118044/</loc>
	</url>
	<url>
		<loc>https://securelist.com/dark-web-job-market-2023-2025/118057/</loc>
	</url>
	<url>
		<loc>https://securelist.com/tsundere-node-js-botnet-uses-ethereum-blockchain/117979/</loc>
	</url>
	<url>
		<loc>https://securelist.com/malware-report-q3-2025-mobile-statistics/118013/</loc>
	</url>
	<url>
		<loc>https://securelist.com/malware-report-q3-2025-pc-iot-statistics/118020/</loc>
	</url>
	<url>
		<loc>https://securelist.com/bluenoroff-apt-campaigns-ghostcall-and-ghosthire/117842/</loc>
	</url>
	<url>
		<loc>https://securelist.com/forumtroll-apt-hacking-team-dante-spyware/117851/</loc>
	</url>
	<url>
		<loc>https://securelist.com/betterbank-defi-protocol-esteem-token-bonus-minting/117822/</loc>
	</url>
	<url>
		<loc>https://securelist.com/email-phishing-techniques-2025/117801/</loc>
	</url>
	<url>
		<loc>https://securelist.com/passiveneuron-campaign-with-apt-implants-and-cobalt-strike/117745/</loc>
	</url>
	<url>
		<loc>https://securelist.com/adaptixc2-agent-found-in-an-npm-package/117784/</loc>
	</url>
	<url>
		<loc>https://securelist.com/seo-spam-hidden-links/117782/</loc>
	</url>
	<url>
		<loc>https://securelist.com/maverick-banker-distributing-via-whatsapp/117715/</loc>
	</url>
	<url>
		<loc>https://securelist.com/mysterious-elephant-apt-ttps-and-tools/117596/</loc>
	</url>
	<url>
		<loc>https://securelist.com/dfi-meta-hacktivist-report/117708/</loc>
	</url>
	<url>
		<loc>https://securelist.com/forensic-artifacts-in-windows-11/117680/</loc>
	</url>
	<url>
		<loc>https://securelist.com/building-ml-model-to-detect-dll-hijacking/117565/</loc>
	</url>
	<url>
		<loc>https://securelist.com/detecting-dll-hijacking-with-machine-learning-in-kaspersky-siem/117567/</loc>
	</url>
	<url>
		<loc>https://securelist.com/amcache-forensic-artifact/117622/</loc>
	</url>
	<url>
		<loc>https://securelist.com/shai-hulud-worm-infects-500-npm-packages-in-a-supply-chain-attack/117547/</loc>
	</url>
	<url>
		<loc>https://securelist.com/industrial-threat-report-q2-2025/117532/</loc>
	</url>
	<url>
		<loc>https://securelist.com/revengehotels-attacks-with-ai-and-venomrat-across-latin-america/117493/</loc>
	</url>
	<url>
		<loc>https://securelist.com/model-context-protocol-for-ai-integration-abused-in-supply-chain-attacks/117473/</loc>
	</url>
	<url>
		<loc>https://securelist.com/three-hacktivist-apt-clusters-tools-and-ttps/117324/</loc>
	</url>
	<url>
		<loc>https://securelist.com/malware-report-q2-2025-mobile-statistics/117349/</loc>
	</url>
	<url>
		<loc>https://securelist.com/malware-report-q2-2025-pc-iot-statistics/117421/</loc>
	</url>
	<url>
		<loc>https://securelist.com/cookies-and-session-hijacking/117390/</loc>
	</url>
	<url>
		<loc>https://securelist.com/macos-security-and-typical-attacks/117367/</loc>
	</url>
	<url>
		<loc>https://securelist.com/vulnerabilities-and-exploits-in-q2-2025/117333/</loc>
	</url>
	<url>
		<loc>https://securelist.com/automotive-security-trends-2025/117326/</loc>
	</url>
	<url>
		<loc>https://securelist.com/godrat/117119/</loc>
	</url>
	<url>
		<loc>https://securelist.com/pipemagic/117270/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/fortify-your-mobile-protection-building-customer-trust-with-advanced-security/</loc>
	</url>
	<url>
		<loc>https://securelist.com/new-phishing-and-scam-trends-in-2025/117217/</loc>
	</url>
	<url>
		<loc>https://securelist.com/efimer-trojan/117148/</loc>
	</url>
	<url>
		<loc>https://securelist.com/av-killer-exploiting-throttlestop-sys/117026/</loc>
	</url>
	<url>
		<loc>https://securelist.com/cobalt-strike-attacks-using-quora-github-social-media/117085/</loc>
	</url>
	<url>
		<loc>https://securelist.com/toolshell-explained/117045/</loc>
	</url>
	<url>
		<loc>https://securelist.com/apt41-in-africa/116986/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ghostcontainer/116953/</loc>
	</url>
	<url>
		<loc>https://securelist.com/userassist-artifact-forensic-value-for-incident-response/116911/</loc>
	</url>
	<url>
		<loc>https://securelist.com/open-source-package-for-cursor-ai-turned-into-a-crypto-heist/116908/</loc>
	</url>
	<url>
		<loc>https://securelist.com/zos-mainframe-pentesting-resource-access-control-facility/116873/</loc>
	</url>
	<url>
		<loc>https://securelist.com/batavia-spyware-steals-data-from-russian-organizations/116866/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/unmasking-email-dangers-detecting-and-defending-against-mail-threats/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/kaspersky-scan-engine-built-to-integrate-engineered-to-protect/</loc>
	</url>
	<url>
		<loc>https://securelist.com/smb-threat-report-2025/116830/</loc>
	</url>
	<url>
		<loc>https://securelist.com/sparkkitty-ios-android-malware/116793/</loc>
	</url>
	<url>
		<loc>https://securelist.com/browservenom-mimicks-deepseek-to-use-malicious-proxy/115728/</loc>
	</url>
	<url>
		<loc>https://securelist.com/librarian-ghouls-apt-wakes-up-computers-to-steal-data-and-mine-crypto/116536/</loc>
	</url>
	<url>
		<loc>https://securelist.com/mirai-botnet-variant-targets-dvr-devices-with-cve-2024-3721/116742/</loc>
	</url>
	<url>
		<loc>https://securelist.com/malware-report-q1-2025-pc-iot-statistics/116686/</loc>
	</url>
	<url>
		<loc>https://securelist.com/malware-report-q1-2025-mobile-statistics/116676/</loc>
	</url>
	<url>
		<loc>https://securelist.com/host-based-logs-container-based-threats/116643/</loc>
	</url>
	<url>
		<loc>https://securelist.com/vulnerabilities-and-exploits-in-q1-2025/116624/</loc>
	</url>
	<url>
		<loc>https://securelist.com/evolution-of-zanubis-banking-trojan-for-android/116588/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/kasperskys-way-of-cloud-workload-protection/</loc>
	</url>
	<url>
		<loc>https://securelist.com/dero-miner-infects-containers-through-docker-api/116546/</loc>
	</url>
	<url>
		<loc>https://securelist.com/industrial-threat-report-q1-2025/116505/</loc>
	</url>
	<url>
		<loc>https://securelist.com/agent-for-mythic-c2-with-beacon-object-files/115259/</loc>
	</url>
	<url>
		<loc>https://securelist.com/state-of-ransomware-in-2025/116475/</loc>
	</url>
	<url>
		<loc>https://securelist.com/outlaw-botnet/116444/</loc>
	</url>
	<url>
		<loc>https://securelist.com/triada-trojan-modules-analysis/116380/</loc>
	</url>
	<url>
		<loc>https://securelist.com/operation-synchole-watering-hole-attacks-by-lazarus/116326/</loc>
	</url>
	<url>
		<loc>https://securelist.com/new-backdoor-mimics-security-software-update/116246/</loc>
	</url>
	<url>
		<loc>https://securelist.com/lumma-fake-captcha-attacks-analysis/116274/</loc>
	</url>
	<url>
		<loc>https://securelist.com/svg-phishing/116256/</loc>
	</url>
	<url>
		<loc>https://securelist.com/mysterysnail-new-version/116226/</loc>
	</url>
	<url>
		<loc>https://securelist.com/streamlining-detection-engineering/116186/</loc>
	</url>
	<url>
		<loc>https://securelist.com/goffee-apt-new-attacks/116139/</loc>
	</url>
	<url>
		<loc>https://securelist.com/miner-clipbanker-sourceforge-campaign/116088/</loc>
	</url>
	<url>
		<loc>https://securelist.com/toddycat-apt-exploits-vulnerability-in-eset-software-for-dll-proxying/116086/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ms-rpc-security-mechanism-step-by-step/116036/</loc>
	</url>
	<url>
		<loc>https://securelist.com/tookps/116019/</loc>
	</url>
	<url>
		<loc>https://securelist.com/operation-forumtroll/115989/</loc>
	</url>
	<url>
		<loc>https://securelist.com/financial-threat-report-2024/115966/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ics-cert-q4-2024-report/115944/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/in-depth-analysis-of-cyberattacks-key-findings-from-kasperskys-incident-response-report/</loc>
	</url>
	<url>
		<loc>https://securelist.com/arcane-stealer/115919/</loc>
	</url>
	<url>
		<loc>https://securelist.com/head-mare-twelve-collaboration/115887/</loc>
	</url>
	<url>
		<loc>https://securelist.com/kaspersky-incident-response-report-2024/115873/</loc>
	</url>
	<url>
		<loc>https://securelist.com/new-wave-of-attacks-with-dcrat-backdoor-distributed-by-maas/115850/</loc>
	</url>
	<url>
		<loc>https://securelist.com/sidewinder-apt-updates-its-toolset-and-targets-nuclear-sector/115847/</loc>
	</url>
	<url>
		<loc>https://securelist.com/backdoors-and-stealers-prey-on-deepseek-and-grok/115801/</loc>
	</url>
	<url>
		<loc>https://securelist.com/silentcryptominer-spreads-through-blackmail-on-youtube/115788/</loc>
	</url>
	<url>
		<loc>https://securelist.com/mobile-threat-report-2024/115494/</loc>
	</url>
	<url>
		<loc>https://securelist.com/soc-files-web-shell-chase/115714/</loc>
	</url>
	<url>
		<loc>https://securelist.com/vulnerabilities-and-exploits-in-q4-2024/115761/</loc>
	</url>
	<url>
		<loc>https://securelist.com/gitvenom-campaign/115694/</loc>
	</url>
	<url>
		<loc>https://securelist.com/angry-likho-apt-attacks-with-lumma-stealer/115663/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/silent-shields-digital-dragons-mdrs-proactive-protection/</loc>
	</url>
	<url>
		<loc>https://securelist.com/kaspersky-managed-detection-and-response-report-2024/115635/</loc>
	</url>
	<url>
		<loc>https://securelist.com/spam-and-phishing-report-2024/115536/</loc>
	</url>
	<url>
		<loc>https://securelist.com/starydobry-campaign-spreads-xmrig-miner-via-torrents/115509/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/from-chaos-to-control-streamlining-detection-engineering-in-security-operation-centers/</loc>
	</url>
	<url>
		<loc>https://securelist.com/nigerian-scams-2024/115388/</loc>
	</url>
	<url>
		<loc>https://securelist.com/sparkcat-stealer-in-app-store-and-google-play/115385/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/%d1%81rimeware-and-financial-cyberthreats-in-2025/</loc>
	</url>
	<url>
		<loc>https://securelist.com/group-policies-in-cyberattacks/115331/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/global-it-outages-and-supply-chain-attacks-2024s-lessons-and-tomorrows-cyberthreats/</loc>
	</url>
	<url>
		<loc>https://securelist.com/tria-stealer-collects-sms-data-from-android-devices/115295/</loc>
	</url>
	<url>
		<loc>https://securelist.com/industrial-threat-predictions-2025/115327/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/missed-cyberthreats-real-world-cases-where-compromise-assessment-uncovered-what-was-overlooked/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/unreliable-ai-addressing-the-cybersecurity-risks-of-llm-based-system/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/on-the-path-to-reveal-the-mystery-with-digital-forensics/</loc>
	</url>
	<url>
		<loc>https://securelist.com/mercedes-benz-head-unit-security-research/115218/</loc>
	</url>
	<url>
		<loc>https://securelist.com/eagerbee-backdoor/115175/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ics-cert-q3-2024-report/115182/</loc>
	</url>
	<url>
		<loc>https://securelist.com/cloud-atlas-attacks-with-new-backdoor-vbcloud/115103/</loc>
	</url>
	<url>
		<loc>https://securelist.com/bellacpp-cpp-version-of-bellaciao/115087/</loc>
	</url>
	<url>
		<loc>https://securelist.com/patched-forticlient-ems-vulnerability-exploited-in-the-wild/115046/</loc>
	</url>
	<url>
		<loc>https://securelist.com/lazarus-new-malware/115059/</loc>
	</url>
	<url>
		<loc>https://securelist.com/cyber-anarchy-squad-attacks-with-uncommon-trojans/114990/</loc>
	</url>
	<url>
		<loc>https://securelist.com/mamont-banker-disguised-as-parcel-tracking-app/115006/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ksb-dark-web-predictions-2025/114966/</loc>
	</url>
	<url>
		<loc>https://securelist.com/careto-is-back/114942/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ksb-story-of-the-year-2024/114883/</loc>
	</url>
	<url>
		<loc>https://securelist.com/exploits-and-vulnerabilities-q3-2024/114839/</loc>
	</url>
	<url>
		<loc>https://securelist.com/hrtng-ida-pro-plugin/114780/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ksb-2024-statistics/114795/</loc>
	</url>
	<url>
		<loc>https://securelist.com/horns-n-hooves-campaign-delivering-netsupport-rat/114740/</loc>
	</url>
	<url>
		<loc>https://securelist.com/malware-report-q3-2024-non-mobile-statistics/114695/</loc>
	</url>
	<url>
		<loc>https://securelist.com/malware-report-q3-2024-mobile-statistics/114692/</loc>
	</url>
	<url>
		<loc>https://securelist.com/malware-report-q3-2024/114678/</loc>
	</url>
	<url>
		<loc>https://securelist.com/apt-report-q3-2024/114623/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ksb-consumer-and-privacy-predictions-2025/114620/</loc>
	</url>
	<url>
		<loc>https://securelist.com/elpaco-ransomware-a-mimic-variant/114635/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ksb-apt-predictions-2025/114582/</loc>
	</url>
	<url>
		<loc>https://securelist.com/black-friday-report-2024/114589/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ksb-financial-and-crimeware-predictions-2025/114565/</loc>
	</url>
	<url>
		<loc>https://securelist.com/internet-exposed-gnss-receivers-in-2024/114548/</loc>
	</url>
	<url>
		<loc>https://securelist.com/new-ymir-ransomware-found-in-colombia/114493/</loc>
	</url>
	<url>
		<loc>https://securelist.com/cloudcomputating-qsc-framework/114438/</loc>
	</url>
	<url>
		<loc>https://securelist.com/steelfox-trojan-drops-stealer-and-miner/114414/</loc>
	</url>
	<url>
		<loc>https://securelist.com/llm-phish-blunders/114367/</loc>
	</url>
	<url>
		<loc>https://securelist.com/compromise-assessment-cases/114332/</loc>
	</url>
	<url>
		<loc>https://securelist.com/fake-captcha-delivers-lumma-amadey/114312/</loc>
	</url>
	<url>
		<loc>https://securelist.com/lazarus-apt-steals-crypto-with-a-tank-game/114282/</loc>
	</url>
	<url>
		<loc>https://securelist.com/grandoreiro-banking-trojan/114257/</loc>
	</url>
	<url>
		<loc>https://securelist.com/kral-amos-vidar-acr-stealers/114237/</loc>
	</url>
	<url>
		<loc>https://securelist.com/crypt-ghouls-hacktivists-tools-overlap-analysis/114217/</loc>
	</url>
	<url>
		<loc>https://securelist.com/sas-ctf-windows-7-challenge-explained/114180/</loc>
	</url>
	<url>
		<loc>https://securelist.com/sidewinder-apt/114089/</loc>
	</url>
	<url>
		<loc>https://securelist.com/meta-threat-landscape-h1-2024/114164/</loc>
	</url>
	<url>
		<loc>https://securelist.com/awaken-likho-apt-new-implant-campaign/114101/</loc>
	</url>
	<url>
		<loc>https://securelist.com/miner-campaign-misuses-open-source-siem-agent/114022/</loc>
	</url>
	<url>
		<loc>https://securelist.com/machine-learning-in-threat-hunting/114016/</loc>
	</url>
	<url>
		<loc>https://securelist.com/key-group-ransomware-samples-and-telegram-schemes/114025/</loc>
	</url>
	<url>
		<loc>https://securelist.com/industrial-threat-landscape-q2-2024/113981/</loc>
	</url>
	<url>
		<loc>https://securelist.com/blackjack-hacktivists-connection-with-twelve/113959/</loc>
	</url>
	<url>
		<loc>https://securelist.com/web-trackers-report-2023-2024/113778/</loc>
	</url>
	<url>
		<loc>https://securelist.com/necro-trojan-is-back-on-google-play/113881/</loc>
	</url>
	<url>
		<loc>https://securelist.com/twelve-group-unified-kill-chain/113877/</loc>
	</url>
	<url>
		<loc>https://securelist.com/sambaspy-rat-targets-italian-users/113851/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/inside-the-dark-web-exploring-the-human-side-of-cybercriminals/</loc>
	</url>
	<url>
		<loc>https://securelist.com/loki-agent-for-mythic/113596/</loc>
	</url>
	<url>
		<loc>https://securelist.com/new-tropic-trooper-web-shell-infection/113737/</loc>
	</url>
	<url>
		<loc>https://securelist.com/mallox-ransomware/113529/</loc>
	</url>
	<url>
		<loc>https://securelist.com/incident-response-interesting-cases-2023/113611/</loc>
	</url>
	<url>
		<loc>https://securelist.com/it-threat-evolution-q2-2024-pc-statistics/113683/</loc>
	</url>
	<url>
		<loc>https://securelist.com/it-threat-evolution-q2-2024-mobile-statistics/113678/</loc>
	</url>
	<url>
		<loc>https://securelist.com/it-threat-evolution-q2-2024/113669/</loc>
	</url>
	<url>
		<loc>https://securelist.com/head-mare-hacktivists/113555/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/the-cybersecurity-buyers-dilemma-hype-vs-true-expertise/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/cybersecuritys-human-factor-more-than-an-unpatched-vulnerability/</loc>
	</url>
	<url>
		<loc>https://securelist.com/hz-rat-attacks-wechat-and-dingtalk/113513/</loc>
	</url>
	<url>
		<loc>https://securelist.com/suricata-freerdp-memory-corruption/113489/</loc>
	</url>
	<url>
		<loc>https://securelist.com/vulnerability-exploit-report-q2-2024/113455/</loc>
	</url>
	<url>
		<loc>https://securelist.com/zos-mainframe-pentesting/113427/</loc>
	</url>
	<url>
		<loc>https://securelist.com/blindeagle-apt/113414/</loc>
	</url>
	<url>
		<loc>https://securelist.com/tusk-infostealers-campaign/113367/</loc>
	</url>
	<url>
		<loc>https://securelist.com/eastwind-apt-campaign/113345/</loc>
	</url>
	<url>
		<loc>https://securelist.com/apt-trends-report-q2-2024/113275/</loc>
	</url>
	<url>
		<loc>https://securelist.com/indirect-prompt-injection-in-the-wild/113295/</loc>
	</url>
	<url>
		<loc>https://securelist.com/lianspy-android-spyware/113253/</loc>
	</url>
	<url>
		<loc>https://securelist.com/sexi-key-group-mallox-ransomware/113183/</loc>
	</url>
	<url>
		<loc>https://securelist.com/mandrake-apps-return-to-google-play/113147/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/building-and-prioritizing-detection-engineering-backlogs-with-mitre-attck/</loc>
	</url>
	<url>
		<loc>https://securelist.com/spear-phishing-meets-mass/113125/</loc>
	</url>
	<url>
		<loc>https://securelist.com/detection-engineering-backlog-prioritization/113099/</loc>
	</url>
	<url>
		<loc>https://securelist.com/cloudsorcerer-new-apt-cloud-actor/113056/</loc>
	</url>
	<url>
		<loc>https://securelist.com/smb-threat-report-2024/113010/</loc>
	</url>
	<url>
		<loc>https://securelist.com/xz-backdoor-part-3-hooking-ssh/113007/</loc>
	</url>
	<url>
		<loc>https://securelist.com/password-brute-force-time/112984/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/analyzing-last-years-cyber-incident-cases/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/industrial-cybersecurity-in-2024-trends-and-forecasts/</loc>
	</url>
	<url>
		<loc>https://securelist.com/telit-cinterion-modem-vulnerabilities/112915/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/mdr-report-2023-analyzing-the-state-of-the-global-threat-landscape/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/soc-consulting-insights-and-live-on-cases/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/take-your-reverse-engineering-to-another-level-with-ghidra/</loc>
	</url>
	<url>
		<loc>https://securelist.com/biometric-terminal-vulnerabilities/112800/</loc>
	</url>
	<url>
		<loc>https://securelist.com/2fa-phishing/112805/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/email-security-top-threats-and-how-to-counter-them/</loc>
	</url>
	<url>
		<loc>https://securelist.com/it-threat-evolution-q1-2024-mobile-statistics/112750/</loc>
	</url>
	<url>
		<loc>https://securelist.com/it-threat-evolution-q1-2024/112742/</loc>
	</url>
	<url>
		<loc>https://securelist.com/it-threat-evolution-q1-2024-pc-statistics/112754/</loc>
	</url>
	<url>
		<loc>https://securelist.com/trusted-relationship-attack/112731/</loc>
	</url>
	<url>
		<loc>https://securelist.com/message-board-scam/112691/</loc>
	</url>
	<url>
		<loc>https://securelist.com/industrial-threat-landscape-q1-2024/112683/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ransomware-abuses-bitlocker/112643/</loc>
	</url>
	<url>
		<loc>https://securelist.com/no-auth-domain-information-enumeration/112629/</loc>
	</url>
	<url>
		<loc>https://securelist.com/crimeware-report-stealers/112633/</loc>
	</url>
	<url>
		<loc>https://securelist.com/cve-2024-30051/112618/</loc>
	</url>
	<url>
		<loc>https://securelist.com/kaspersky-incident-response-report-2023/112504/</loc>
	</url>
	<url>
		<loc>https://securelist.com/apt-trends-report-q1-2024/112473/</loc>
	</url>
	<url>
		<loc>https://securelist.com/state-of-ransomware-2023/112590/</loc>
	</url>
	<url>
		<loc>https://securelist.com/vulnerability-report-q1-2024/112554/</loc>
	</url>
	<url>
		<loc>https://securelist.com/financial-threat-report-2023/112526/</loc>
	</url>
	<url>
		<loc>https://securelist.com/kaspersky-mdr-report-2023/112411/</loc>
	</url>
	<url>
		<loc>https://securelist.com/xz-backdoor-story-part-2-social-engineering/112476/</loc>
	</url>
	<url>
		<loc>https://securelist.com/toddycat-traffic-tunneling-data-extraction-tools/112443/</loc>
	</url>
	<url>
		<loc>https://securelist.com/dunequixote/112425/</loc>
	</url>
	<url>
		<loc>https://securelist.com/soumnibot-android-banker-obfuscates-app-manifest/112334/</loc>
	</url>
	<url>
		<loc>https://securelist.com/lockbit-3-0-based-custom-targeted-ransomware/112375/</loc>
	</url>
	<url>
		<loc>https://securelist.com/xz-backdoor-story-part-1/112354/</loc>
	</url>
	<url>
		<loc>https://securelist.com/dinodasrat-linux-implant/112284/</loc>
	</url>
	<url>
		<loc>https://securelist.com/crimeware-report-android-malware/112121/</loc>
	</url>
	<url>
		<loc>https://securelist.com/threat-landscape-for-industrial-automation-systems-h2-2023/112153/</loc>
	</url>
	<url>
		<loc>https://securelist.com/windows-vulnerabilities/112232/</loc>
	</url>
	<url>
		<loc>https://securelist.com/trojanized-text-editor-apps/112167/</loc>
	</url>
	<url>
		<loc>https://securelist.com/state-of-stalkerware-2023/112135/</loc>
	</url>
	<url>
		<loc>https://securelist.com/top-10-web-app-vulnerabilities/112144/</loc>
	</url>
	<url>
		<loc>https://securelist.com/spam-phishing-report-2023/112015/</loc>
	</url>
	<url>
		<loc>https://securelist.com/network-tunneling-with-qemu/111803/</loc>
	</url>
	<url>
		<loc>https://securelist.com/smart-robot-security-research/111938/</loc>
	</url>
	<url>
		<loc>https://securelist.com/mobile-malware-report-2023/111964/</loc>
	</url>
	<url>
		<loc>https://securelist.com/coyote-multi-stage-banking-trojan/111846/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ksb-ics-predictions-2024/111835/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ksb-privacy-predictions-2024/111815/</loc>
	</url>
	<url>
		<loc>https://securelist.com/new-macos-backdoor-crypto-stealer/111778/</loc>
	</url>
	<url>
		<loc>https://securelist.com/darknet-predictions-for-2024/111763/</loc>
	</url>
	<url>
		<loc>https://securelist.com/shutdown-log-lightweight-ios-malware-detection-method/111734/</loc>
	</url>
	<url>
		<loc>https://securelist.com/operation-triangulation-the-last-hardware-mystery/111669/</loc>
	</url>
	<url>
		<loc>https://securelist.com/windows-clfs-exploits-ransomware-cve-2023-23376/111593/</loc>
	</url>
	<url>
		<loc>https://securelist.com/windows-clfs-exploits-ransomware-october-2022/111591/</loc>
	</url>
	<url>
		<loc>https://securelist.com/windows-clfs-exploits-ransomware-september-2022/111584/</loc>
	</url>
	<url>
		<loc>https://securelist.com/windows-clfs-exploits-ransomware/111560/</loc>
	</url>
	<url>
		<loc>https://securelist.com/windows-clfs-exploits-ransomware-cve-2022-24521/111580/</loc>
	</url>
	<url>
		<loc>https://securelist.com/windows-clfs-exploits-ransomware-cve-2023-28252/111601/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/the-future-of-ai-in-cybersecurity-2024/</loc>
	</url>
	<url>
		<loc>https://securelist.com/unveiling-nkabuse/111512/</loc>
	</url>
	<url>
		<loc>https://securelist.com/crimeware-report-fakesg-akira-amos/111483/</loc>
	</url>
	<url>
		<loc>https://securelist.com/what-to-do-if-your-company-was-mentioned-on-darknet/111358/</loc>
	</url>
	<url>
		<loc>https://securelist.com/story-of-the-year-2023-ai-impact-on-cybersecurity/111341/</loc>
	</url>
	<url>
		<loc>https://securelist.com/trojan-proxy-for-macos/111325/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/responding-to-a-data-breach-a-step-by-step-guide/</loc>
	</url>
	<url>
		<loc>https://securelist.com/bluenoroff-new-macos-malware/111290/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ksb-2023-statistics/111156/</loc>
	</url>
	<url>
		<loc>https://securelist.com/it-threat-evolution-q3-2023-mobile-statistics/111224/</loc>
	</url>
	<url>
		<loc>https://securelist.com/it-threat-evolution-q3-2023/111171/</loc>
	</url>
	<url>
		<loc>https://securelist.com/it-threat-evolution-q3-2023-non-mobile-statistics/111228/</loc>
	</url>
	<url>
		<loc>https://securelist.com/kaspersky-security-bulletin-consumer-threats-2024/111135/</loc>
	</url>
	<url>
		<loc>https://securelist.com/hrserv-apt-web-shell/111119/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/2024-advanced-persistent-threat-predictions/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/modern-car-compromise-techniques-and-protection/</loc>
	</url>
	<url>
		<loc>https://securelist.com/kaspersky-security-bulletin-crimeware-financial-threats-2024/111093/</loc>
	</url>
	<url>
		<loc>https://securelist.com/black-friday-cyberthreat-report-2023/111076/</loc>
	</url>
	<url>
		<loc>https://securelist.com/kaspersky-security-bulletin-apt-predictions-2024/111048/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ducktail-fashion-week/111017/</loc>
	</url>
	<url>
		<loc>https://securelist.com/modern-asia-apt-groups-ttp/111009/</loc>
	</url>
	<url>
		<loc>https://securelist.com/game-related-threat-report-2023/110960/</loc>
	</url>
	<url>
		<loc>https://securelist.com/spyware-whatsapp-mod/110984/</loc>
	</url>
	<url>
		<loc>https://securelist.com/unveiling-lazarus-new-campaign/110888/</loc>
	</url>
	<url>
		<loc>https://securelist.com/operation-triangulation-catching-wild-triangle/110916/</loc>
	</url>
	<url>
		<loc>https://securelist.com/stripedfly-perennially-flying-under-the-radar/110903/</loc>
	</url>
	<url>
		<loc>https://securelist.com/crimeware-report-gopix-lumar-rhysida/110871/</loc>
	</url>
	<url>
		<loc>https://securelist.com/triangulation-validators-modules/110847/</loc>
	</url>
	<url>
		<loc>https://securelist.com/miner-keylogger-backdoor-attack-b2b/110761/</loc>
	</url>
	<url>
		<loc>https://securelist.com/updated-mata-attacks-industrial-companies-in-eastern-europe/110829/</loc>
	</url>
	<url>
		<loc>https://securelist.com/apt-trends-report-q3-2023/110752/</loc>
	</url>
	<url>
		<loc>https://securelist.com/a-hack-in-hand-is-worth-two-in-the-bush/110794/</loc>
	</url>
	<url>
		<loc>https://securelist.com/llm-based-chatbots-privacy/110733/</loc>
	</url>
	<url>
		<loc>https://securelist.com/toddycat-keep-calm-and-check-logs/110696/</loc>
	</url>
	<url>
		<loc>https://securelist.com/crimeware-report-asmcrypt-loader-lumma-stealer-zanubis-banker/110512/</loc>
	</url>
	<url>
		<loc>https://securelist.com/qr-codes-in-phishing/110676/</loc>
	</url>
	<url>
		<loc>https://securelist.com/iot-threat-report-2023/110644/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/2023-apt-landscape-unveiled/</loc>
	</url>
	<url>
		<loc>https://securelist.com/threat-landscape-for-industrial-automation-systems-statistics-for-h1-2023/110605/</loc>
	</url>
	<url>
		<loc>https://securelist.com/backdoored-free-download-manager-linux-malware/110465/</loc>
	</url>
	<url>
		<loc>https://securelist.com/cuba-ransomware/110533/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/cybersecurity-risks-in-alternative-energy-sources/</loc>
	</url>
	<url>
		<loc>https://securelist.com/trojanized-telegram-mod-attacking-chinese-users/110482/</loc>
	</url>
	<url>
		<loc>https://securelist.com/it-threat-evolution-q2-2023-non-mobile-statistics/110413/</loc>
	</url>
	<url>
		<loc>https://securelist.com/it-threat-evolution-q2-2023-mobile-statistics/110427/</loc>
	</url>
	<url>
		<loc>https://securelist.com/it-threat-evolution-q2-2023/110355/</loc>
	</url>
	<url>
		<loc>https://securelist.com/lockbit-ransomware-builder-analysis/110370/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/securing-ics-workstations-vulnerability-identification-with-oval/</loc>
	</url>
	<url>
		<loc>https://securelist.com/phishing-with-hacked-sites/110334/</loc>
	</url>
	<url>
		<loc>https://securelist.com/focus-on-droxidat-systembc/110302/</loc>
	</url>
	<url>
		<loc>https://securelist.com/common-ttps-of-attacks-against-industrial-organizations/110319/</loc>
	</url>
	<url>
		<loc>https://securelist.com/emotet-darkgate-lokibot-crimeware-report/110286/</loc>
	</url>
	<url>
		<loc>https://securelist.com/anomaly-detection-in-certificate-based-tgt-requests/110242/</loc>
	</url>
	<url>
		<loc>https://securelist.com/apt-trends-report-q2-2023/110231/</loc>
	</url>
	<url>
		<loc>https://securelist.com/analysis-of-attack-samples-exploiting-cve-2023-23397/110202/</loc>
	</url>
	<url>
		<loc>https://securelist.com/hot-and-cold-cryptowallet-phishing/110136/</loc>
	</url>
	<url>
		<loc>https://securelist.com/lazarus-andariel-mistakes-and-easyrat/110119/</loc>
	</url>
	<url>
		<loc>https://securelist.com/smb-threat-report-2023/110097/</loc>
	</url>
	<url>
		<loc>https://securelist.com/crimeware-report-lockbit-switchsymb/110068/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/the-darknet-maas-model/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/cyber-incident-response-in-a-large-company/</loc>
	</url>
	<url>
		<loc>https://securelist.com/triangledb-triangulation-implant/110050/</loc>
	</url>
	<url>
		<loc>https://securelist.com/smart-pet-feeder-vulnerabilities/110028/</loc>
	</url>
	<url>
		<loc>https://securelist.com/malware-as-a-service-market/109980/</loc>
	</url>
	<url>
		<loc>https://securelist.com/doublefinger-loader-delivering-greetingghoul-cryptocurrency-stealer/109982/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/cyberthreats-to-modern-automotive-industry/</loc>
	</url>
	<url>
		<loc>https://securelist.com/it-threat-evolution-q1-2023/109838/</loc>
	</url>
	<url>
		<loc>https://securelist.com/it-threat-evolution-q1-2023-mobile-statistics/109893/</loc>
	</url>
	<url>
		<loc>https://securelist.com/it-threat-evolution-q1-2023-pc-statistics/109917/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/applying-attck-to-analyze-ransomware-campaigns/</loc>
	</url>
	<url>
		<loc>https://securelist.com/satacom-delivers-cryptocurrency-stealing-browser-extension/109807/</loc>
	</url>
	<url>
		<loc>https://securelist.com/find-the-triangulation-utility/109867/</loc>
	</url>
	<url>
		<loc>https://securelist.com/operation-triangulation/109842/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/ransomware-trends-in-2023/</loc>
	</url>
	<url>
		<loc>https://securelist.com/goldenjackal-apt-group/109677/</loc>
	</url>
	<url>
		<loc>https://securelist.com/cloudwizard-apt/109722/</loc>
	</url>
	<url>
		<loc>https://securelist.com/minas-miner-on-the-way-to-complexity/109692/</loc>
	</url>
	<url>
		<loc>https://securelist.com/kaspersky-incident-response-report-2022/109680/</loc>
	</url>
	<url>
		<loc>https://securelist.com/new-ransomware-trends-in-2023/109660/</loc>
	</url>
	<url>
		<loc>https://securelist.com/fleckpe-a-new-family-of-trojan-subscribers-on-google-play/109643/</loc>
	</url>
	<url>
		<loc>https://securelist.com/mdr-report-2022/109599/</loc>
	</url>
	<url>
		<loc>https://securelist.com/chatgpt-anti-phishing/109590/</loc>
	</url>
	<url>
		<loc>https://securelist.com/apt-trends-report-q1-2023/109581/</loc>
	</url>
	<url>
		<loc>https://securelist.com/tomiris-called-they-want-their-turla-malware-back/109552/</loc>
	</url>
	<url>
		<loc>https://securelist.com/qbot-banker-business-correspondence/109535/</loc>
	</url>
	<url>
		<loc>https://securelist.com/crimeware-report-uncommon-infection-methods-2/109522/</loc>
	</url>
	<url>
		<loc>https://securelist.com/the-lazarus-group-deathnote-campaign/109490/</loc>
	</url>
	<url>
		<loc>https://securelist.com/nokoyawa-ransomware-attacks-with-windows-zero-day/109483/</loc>
	</url>
	<url>
		<loc>https://securelist.com/google-play-threats-on-the-dark-web/109452/</loc>
	</url>
	<url>
		<loc>https://securelist.com/telegram-phishing-services/109383/</loc>
	</url>
	<url>
		<loc>https://securelist.com/gopuram-backdoor-deployed-through-3cx-supply-chain-attack/109344/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/cryptocurrency-threat-landscape-trends-in-2023/</loc>
	</url>
	<url>
		<loc>https://securelist.com/selecting-the-right-mssp/109321/</loc>
	</url>
	<url>
		<loc>https://securelist.com/financial-cyberthreats-in-2022/109219/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/ransomware-groups-negotiation-tactics/</loc>
	</url>
	<url>
		<loc>https://securelist.com/copy-paste-heist-clipboard-injector-targeting-cryptowallets/109186/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ipfs-phishing/109158/</loc>
	</url>
	<url>
		<loc>https://securelist.com/understanding-metrics-to-measure-soc-effectiveness/109061/</loc>
	</url>
	<url>
		<loc>https://securelist.com/developing-an-incident-response-playbook/109145/</loc>
	</url>
	<url>
		<loc>https://securelist.com/bad-magic-apt/109087/</loc>
	</url>
	<url>
		<loc>https://securelist.com/dark-web-deals-and-regulations/109034/</loc>
	</url>
	<url>
		<loc>https://securelist.com/malvertising-through-search-engines/108996/</loc>
	</url>
	<url>
		<loc>https://securelist.com/the-state-of-stalkerware-in-2022/108985/</loc>
	</url>
	<url>
		<loc>https://securelist.com/threat-landscape-for-industrial-automation-systems-for-h2-2022/108958/</loc>
	</url>
	<url>
		<loc>https://securelist.com/mobile-threat-report-2022/108844/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/chatgpt-ai-impact-on-cybersecurity/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/crimeware-and-financial-predictions-for-2023/</loc>
	</url>
	<url>
		<loc>https://securelist.com/spam-phishing-scam-report-2022/108692/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ioc-detection-experiments-with-chatgpt/108756/</loc>
	</url>
	<url>
		<loc>https://securelist.com/how-the-analyst-can-enhance-pentest/108652/</loc>
	</url>
	<url>
		<loc>https://securelist.com/web-beacons-on-websites-and-in-email/108632/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/advanced-persistent-threat-predictions-for-2023/</loc>
	</url>
	<url>
		<loc>https://securelist.com/prilex-modification-now-targeting-contactless-credit-card-transactions/108569/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/reversing-mobile-threats-in-2022/</loc>
	</url>
	<url>
		<loc>https://securelist.com/darknet-it-headhunting/108526/</loc>
	</url>
	<url>
		<loc>https://securelist.com/soc-socc-predictions-2023/108512/</loc>
	</url>
	<url>
		<loc>https://securelist.com/roaming-mantis-dns-changer-in-malicious-mobile-app/108464/</loc>
	</url>
	<url>
		<loc>https://securelist.com/corporate-threat-predictions-2023/108456/</loc>
	</url>
	<url>
		<loc>https://securelist.com/how-much-security-is-enough/108434/</loc>
	</url>
	<url>
		<loc>https://securelist.com/bluenoroff-methods-bypass-motw/108383/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ransomware-and-wiper-signed-with-stolen-certificates/108350/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/cyberwar-2022-lessons-learned/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/the-practical-versatility-of-soc/</loc>
	</url>
	<url>
		<loc>https://securelist.com/cve-2022-41040-and-cve-2022-41082-zero-days-in-ms-exchange/108364/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/how-an-analyst-can-boost-penetration-testing-results/</loc>
	</url>
	<url>
		<loc>https://securelist.com/reassessing-cyberwarfare-lessons-learned-in-2022/108328/</loc>
	</url>
	<url>
		<loc>https://securelist.com/how-to-train-your-ghidra/108272/</loc>
	</url>
	<url>
		<loc>https://securelist.com/deathstalker-targets-legal-entities-with-new-janicab-variant/108131/</loc>
	</url>
	<url>
		<loc>https://securelist.com/phishing-scam-techniques-tricks/108247/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/dealing-with-incident-response/</loc>
	</url>
	<url>
		<loc>https://securelist.com/crimeware-report-ransomware-tactics-vulnerable-drivers/108197/</loc>
	</url>
	<url>
		<loc>https://securelist.com/how-to-collect-and-use-indicators-of-compromise/108184/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ksb-2022-statistics/108129/</loc>
	</url>
	<url>
		<loc>https://securelist.com/privacy-predictions-2023/108068/</loc>
	</url>
	<url>
		<loc>https://securelist.com/consumer-threats-2023/108112/</loc>
	</url>
	<url>
		<loc>https://securelist.com/tracker-report-2021-2022/108079/</loc>
	</url>
	<url>
		<loc>https://securelist.com/black-friday-report-2022/108042/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ics-cyberthreats-in-2023/108011/</loc>
	</url>
	<url>
		<loc>https://securelist.com/policy-trends-2023/108008/</loc>
	</url>
	<url>
		<loc>https://securelist.com/crimeware-financial-cyberthreats-2023/108005/</loc>
	</url>
	<url>
		<loc>https://securelist.com/it-threat-evolution-in-q3-2022-non-mobile-statistics/107963/</loc>
	</url>
	<url>
		<loc>https://securelist.com/it-threat-evolution-in-q3-2022-mobile-statistics/107978/</loc>
	</url>
	<url>
		<loc>https://securelist.com/it-threat-evolution-q3-2022/107957/</loc>
	</url>
	<url>
		<loc>https://securelist.com/dtrack-targeting-europe-latin-america/107798/</loc>
	</url>
	<url>
		<loc>https://securelist.com/advanced-threat-predictions-for-2023/107939/</loc>
	</url>
	<url>
		<loc>https://securelist.com/cryptojacking-report-2022/107898/</loc>
	</url>
	<url>
		<loc>https://securelist.com/cybersecurity-threats-2023/107888/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ddos-report-q3-2022/107860/</loc>
	</url>
	<url>
		<loc>https://securelist.com/server-side-attacks-cc-in-public-clouds-mdr-cases/107826/</loc>
	</url>
	<url>
		<loc>https://securelist.com/apt-trends-report-q3-2022/107787/</loc>
	</url>
	<url>
		<loc>https://securelist.com/apt10-tracking-down-lodeinfo-2022-part-ii/107745/</loc>
	</url>
	<url>
		<loc>https://securelist.com/apt10-tracking-down-lodeinfo-2022-part-i/107742/</loc>
	</url>
	<url>
		<loc>https://securelist.com/diceyf-deploys-gameplayerframework-in-online-casino-development-studio/107723/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ongoing-exploitation-of-cve-2022-41352-zimbra-0-day/107703/</loc>
	</url>
	<url>
		<loc>https://securelist.com/malicious-whatsapp-mod-distributed-through-legitimate-apps/107690/</loc>
	</url>
	<url>
		<loc>https://securelist.com/top-10-unattributed-apt-mysteries/107676/</loc>
	</url>
	<url>
		<loc>https://securelist.com/atm-pos-malware-landscape-2020-2022/107656/</loc>
	</url>
	<url>
		<loc>https://securelist.com/uncommon-infection-and-malware-propagation-methods/107640/</loc>
	</url>
	<url>
		<loc>https://securelist.com/onionpoison-infected-tor-browser-installer-youtube/107627/</loc>
	</url>
	<url>
		<loc>https://securelist.com/defttorero-tactics-techniques-and-procedures/107610/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/iiot-threats-protection-gateway-level/</loc>
	</url>
	<url>
		<loc>https://securelist.com/the-secrets-of-schneider-electrics-umas-protocol/107435/</loc>
	</url>
	<url>
		<loc>https://securelist.com/prilex-atm-pos-malware-evolution/107551/</loc>
	</url>
	<url>
		<loc>https://securelist.com/nullmixer-oodles-of-trojans-in-a-single-dropper/107498/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/soc-consulting-projects-common-methodology-and-insights/</loc>
	</url>
	<url>
		<loc>https://securelist.com/agent-tesla-malicious-spam-campaign/107478/</loc>
	</url>
	<url>
		<loc>https://securelist.com/external-attack-surface-and-ongoing-cybercriminal-activity-in-apac-region/107430/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/how-to-effectively-detect-prevent-respond-to-threats-with-threat-intelligence/</loc>
	</url>
	<url>
		<loc>https://securelist.com/self-spreading-stealer-attacks-gamers-via-youtube/107407/</loc>
	</url>
	<url>
		<loc>https://securelist.com/threat-landscape-for-industrial-automation-systems-for-h1-2022/107373/</loc>
	</url>
	<url>
		<loc>https://securelist.com/gaming-related-cyberthreats-2021-2022/107346/</loc>
	</url>
	<url>
		<loc>https://securelist.com/the-nature-of-cyber-incidents/107119/</loc>
	</url>
	<url>
		<loc>https://securelist.com/kimsukys-golddragon-cluster-and-its-c2-operations/107258/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ransomware-updates-1-day-exploits/107291/</loc>
	</url>
	<url>
		<loc>https://securelist.com/black-hat-usa-2022-and-def-con-30/107184/</loc>
	</url>
	<url>
		<loc>https://securelist.com/two-more-malicious-python-packages-in-the-pypi/107218/</loc>
	</url>
	<url>
		<loc>https://securelist.com/threat-in-your-browser-extensions/107181/</loc>
	</url>
	<url>
		<loc>https://securelist.com/it-threat-evolution-in-q2-2022-mobile-statistics/107123/</loc>
	</url>
	<url>
		<loc>https://securelist.com/it-threat-evolution-in-q2-2022-non-mobile-statistics/107133/</loc>
	</url>
	<url>
		<loc>https://securelist.com/it-threat-evolution-q2-2022/107099/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/the-dark-side-of-potential-unwanted-applications/</loc>
	</url>
	<url>
		<loc>https://securelist.com/opentip-command-line-edition/107109/</loc>
	</url>
	<url>
		<loc>https://securelist.com/vilerat-deathstalkers-continuous-strike/107075/</loc>
	</url>
	<url>
		<loc>https://securelist.com/andariel-deploys-dtrack-and-maui-ransomware/107063/</loc>
	</url>
	<url>
		<loc>https://securelist.com/targeted-attack-on-industrial-enterprises-and-public-institutions/107054/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ddos-attacks-in-q2-2022/107025/</loc>
	</url>
	<url>
		<loc>https://securelist.com/lofylife-malicious-npm-packages/107014/</loc>
	</url>
	<url>
		<loc>https://securelist.com/apt-trends-report-q2-2022/106995/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/toddycat-an-overview-of-a-new-apt-group/</loc>
	</url>
	<url>
		<loc>https://securelist.com/cosmicstrand-uefi-firmware-rootkit/106973/</loc>
	</url>
	<url>
		<loc>https://securelist.com/luna-black-basta-ransomware/106950/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/the-power-of-threat-attribution/</loc>
	</url>
	<url>
		<loc>https://securelist.com/mail-text-scam/106926/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/sigma-rules-and-how-to-use-them/</loc>
	</url>
	<url>
		<loc>https://securelist.com/dynamic-analysis-of-firmware-components-in-iot-devices/106901/</loc>
	</url>
	<url>
		<loc>https://securelist.com/the-sessionmanager-iis-backdoor/106868/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/windows-incident-response-webinar-live-analysis-with-powershell/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/ransomware-today-tactics-techniques-and-procedures/</loc>
	</url>
	<url>
		<loc>https://securelist.com/modern-ransomware-groups-ttps/106824/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/the-darknet-market-of-corporate-data/</loc>
	</url>
	<url>
		<loc>https://securelist.com/toddycat/106799/</loc>
	</url>
	<url>
		<loc>https://securelist.com/unpacking-technical-attribution/106791/</loc>
	</url>
	<url>
		<loc>https://securelist.com/initial-access-data-price-on-the-dark-web/106740/</loc>
	</url>
	<url>
		<loc>https://securelist.com/router-security-2021/106711/</loc>
	</url>
	<url>
		<loc>https://securelist.com/cve-2022-30190-follina-vulnerability-in-msdt-description-and-counteraction/106703/</loc>
	</url>
	<url>
		<loc>https://securelist.com/windealer-dealing-on-the-side/105946/</loc>
	</url>
	<url>
		<loc>https://securelist.com/it-threat-evolution-in-q1-2022-mobile-statistics/106589/</loc>
	</url>
	<url>
		<loc>https://securelist.com/it-threat-evolution-q1-2022/106513/</loc>
	</url>
	<url>
		<loc>https://securelist.com/it-threat-evolution-in-q1-2022-non-mobile-statistics/106531/</loc>
	</url>
	<url>
		<loc>https://securelist.com/managed-detection-and-response-in-2021/106540/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/ransomware-trends-in-2022/</loc>
	</url>
	<url>
		<loc>https://securelist.com/the-verizon-2022-dbir/105844/</loc>
	</url>
	<url>
		<loc>https://securelist.com/third-party-automotive-app-security/106538/</loc>
	</url>
	<url>
		<loc>https://securelist.com/isapwn-research-on-the-security-of-isagraf-runtime/106521/</loc>
	</url>
	<url>
		<loc>https://securelist.com/evaluation-of-cyber-activities-and-the-threat-landscape-in-ukraine/106484/</loc>
	</url>
	<url>
		<loc>https://securelist.com/html-attachments-in-phishing-e-mails/106481/</loc>
	</url>
	<url>
		<loc>https://securelist.com/new-ransomware-trends-in-2022/106457/</loc>
	</url>
	<url>
		<loc>https://securelist.com/mobile-subscription-trojans-and-their-tricks/106412/</loc>
	</url>
	<url>
		<loc>https://securelist.com/a-new-secret-stash-for-fileless-malware/106393/</loc>
	</url>
	<url>
		<loc>https://securelist.com/apt-trends-report-q1-2022/106351/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ddos-attacks-in-q1-2022/106358/</loc>
	</url>
	<url>
		<loc>https://securelist.com/how-to-recover-files-encrypted-by-yanluowang/106332/</loc>
	</url>
	<url>
		<loc>https://securelist.com/emotet-modules-and-recent-attacks/106290/</loc>
	</url>
	<url>
		<loc>https://securelist.com/the-state-of-stalkerware-in-2021/106193/</loc>
	</url>
	<url>
		<loc>https://securelist.com/a-bad-luck-blackcat/106254/</loc>
	</url>
	<url>
		<loc>https://securelist.com/spring4shell-cve-2022-22965/106239/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/mobile-malware-reverse-engineering-workshop/</loc>
	</url>
	<url>
		<loc>https://securelist.com/lazarus-trojanized-defi-app/106195/</loc>
	</url>
	<url>
		<loc>https://securelist.com/phishing-kit-market-whats-inside-off-the-shelf-phishing-packages/106149/</loc>
	</url>
	<url>
		<loc>https://securelist.com/cve-2022-0847-aka-dirty-pipe-vulnerability-in-linux-kernel/106088/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinar-on-cyberattacks-in-ukraine-summary-and-qa/106075/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/ukraine-cyberattack-analysis/</loc>
	</url>
	<url>
		<loc>https://securelist.com/threat-landscape-for-industrial-automation-systems-h2-2021/106001/</loc>
	</url>
	<url>
		<loc>https://securelist.com/elections-goransom-and-hermeticwiper-attack/105960/</loc>
	</url>
	<url>
		<loc>https://securelist.com/financial-cyberthreats-in-2021/105898/</loc>
	</url>
	<url>
		<loc>https://securelist.com/mobile-malware-evolution-2021/105876/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ddos-attacks-in-q4-2021/105784/</loc>
	</url>
	<url>
		<loc>https://securelist.com/spam-and-phishing-in-2021/105713/</loc>
	</url>
	<url>
		<loc>https://securelist.com/roaming-mantis-reaches-europe/105596/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/insights-the-log4shell-attack/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/the-bluenoroff-cryptocurrency-hunt/</loc>
	</url>
	<url>
		<loc>https://securelist.com/telehealth-report-2020-2021/105642/</loc>
	</url>
	<url>
		<loc>https://securelist.com/moonbounce-the-dark-side-of-uefi-firmware/105468/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/atm-pos-threat-landscape/</loc>
	</url>
	<url>
		<loc>https://securelist.com/hunt-for-corporate-credentials-on-ics-networks/105545/</loc>
	</url>
	<url>
		<loc>https://securelist.com/the-bluenoroff-cryptocurrency-hunt-is-still-on/105488/</loc>
	</url>
	<url>
		<loc>https://securelist.com/kaspersky-safe-kids-christmas-gift-report-2021/105396/</loc>
	</url>
	<url>
		<loc>https://securelist.com/answering-log4shell-related-questions/105402/</loc>
	</url>
	<url>
		<loc>https://securelist.com/attack-on-anti-spam-machine-learning-model-deepquarantine/105358/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/log4shell-vulnerability-how-to-stay-secure/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/latam-banking-threats-regional-actors-move-global/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/advanced-static-malware-analysis-workshop/</loc>
	</url>
	<url>
		<loc>https://securelist.com/pseudomanuscrypt-a-mass-scale-spyware-attack-campaign/105286/</loc>
	</url>
	<url>
		<loc>https://securelist.com/kaspersky-managed-detection-and-response-interesting-cases/105214/</loc>
	</url>
	<url>
		<loc>https://securelist.com/kaspersky-security-bulletin-2021-statistics/105205/</loc>
	</url>
	<url>
		<loc>https://securelist.com/owowa-credential-stealer-and-remote-access/105219/</loc>
	</url>
	<url>
		<loc>https://securelist.com/cve-2021-44228-vulnerability-in-apache-log4j-library/105210/</loc>
	</url>
	<url>
		<loc>https://securelist.com/phishing-page-life-cycle/105171/</loc>
	</url>
	<url>
		<loc>https://securelist.com/the-story-of-the-year-ransomware-in-the-headlines/105138/</loc>
	</url>
	<url>
		<loc>https://securelist.com/apt-annual-review-2021/105127/</loc>
	</url>
	<url>
		<loc>https://securelist.com/scarcruft-surveilling-north-korean-defectors-and-human-rights-activists/105074/</loc>
	</url>
	<url>
		<loc>https://securelist.com/wirtes-campaign-in-the-middle-east-living-off-the-land-since-at-least-2019/105044/</loc>
	</url>
	<url>
		<loc>https://securelist.com/it-threat-evolution-in-q3-2021-mobile-statistics/105020/</loc>
	</url>
	<url>
		<loc>https://securelist.com/it-threat-evolution-in-q3-2021-pc-statistics/104982/</loc>
	</url>
	<url>
		<loc>https://securelist.com/it-threat-evolution-q3-2021/104876/</loc>
	</url>
	<url>
		<loc>https://securelist.com/threats-to-ics-and-industrial-enterprises-in-2022/104957/</loc>
	</url>
	<url>
		<loc>https://securelist.com/connected-healthcare-predictions-for-2022/104969/</loc>
	</url>
	<url>
		<loc>https://securelist.com/privacy-predictions-2022/104912/</loc>
	</url>
	<url>
		<loc>https://securelist.com/cyberthreats-to-financial-organizations-in-2022/104974/</loc>
	</url>
	<url>
		<loc>https://securelist.com/black-friday-2021/104915/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/kaspersky-ask-the-analyst/</loc>
	</url>
	<url>
		<loc>https://securelist.com/advanced-threat-predictions-for-2022/104870/</loc>
	</url>
	<url>
		<loc>https://securelist.com/streaming-related-cyberthreats-report-2021/104833/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/financial-threat-predictions-for-2022/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/kasperskys-advanced-targeted-threat-predictions-for-2022/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ddos-attacks-in-q3-2021/104796/</loc>
	</url>
	<url>
		<loc>https://securelist.com/spam-and-phishing-in-q3-2021/104741/</loc>
	</url>
	<url>
		<loc>https://securelist.com/how-we-took-part-in-mlsec-and-almost-won/104699/</loc>
	</url>
	<url>
		<loc>https://securelist.com/extracting-type-information-from-go-binaries/104715/</loc>
	</url>
	<url>
		<loc>https://securelist.com/apt-trends-report-q3-2021/104708/</loc>
	</url>
	<url>
		<loc>https://securelist.com/russian-speaking-cybercrime-evolution-2016-2021/104656/</loc>
	</url>
	<url>
		<loc>https://securelist.com/trickbot-module-descriptions/104603/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/sas-2021-workshop-asset-discovery-and-monitoring-for-bug-hunters-101/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/sas-2021-workshop-company-wide-sast/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/sas-2021-how-do-you-say-chinese-supply-chain-attack-in-farsi/</loc>
	</url>
	<url>
		<loc>https://securelist.com/lyceum-group-reborn/104586/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/sas-2021-workshop-zero-knowledge-go-reverse-engineering/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/sas-2021-workshop-writing-better-yara-rules/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/sas-2021-workshop-prevent-detect-security-threats-in-the-kubernetes-era/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/sas-2021-time-to-make-the-donuts/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/sas-2021-learning-to-chacha-with-apt41/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/sas-2021-fireside-chat-with-chris-bing/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/sas-2021-operation-software-concepts/</loc>
	</url>
	<url>
		<loc>https://securelist.com/mysterysnail-attacks-with-windows-zero-day/104509/</loc>
	</url>
	<url>
		<loc>https://securelist.com/cis-ransomware/104452/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ghostemperor-from-proxylogon-to-kernel-mode/104407/</loc>
	</url>
	<url>
		<loc>https://securelist.com/darkhalo-after-solarwinds-the-tomiris-connection/104311/</loc>
	</url>
	<url>
		<loc>https://securelist.com/finspy-unseen-findings/104322/</loc>
	</url>
	<url>
		<loc>https://securelist.com/bloodystealer-and-gaming-assets-for-sale/104319/</loc>
	</url>
	<url>
		<loc>https://securelist.com/sas-at-home-2021/104303/</loc>
	</url>
	<url>
		<loc>https://securelist.com/detection-evasion-in-clr-and-tips-on-how-to-detect-such-attacks/104226/</loc>
	</url>
	<url>
		<loc>https://securelist.com/exploitation-of-the-cve-2021-40444-vulnerability-in-mshtml/104218/</loc>
	</url>
	<url>
		<loc>https://securelist.com/kids-report-summer-2021/104078/</loc>
	</url>
	<url>
		<loc>https://securelist.com/incident-response-analyst-report-2020/104080/</loc>
	</url>
	<url>
		<loc>https://securelist.com/threat-landscape-for-industrial-automation-systems-in-h1-2021/104017/</loc>
	</url>
	<url>
		<loc>https://securelist.com/applied-yara-training-qa/104007/</loc>
	</url>
	<url>
		<loc>https://securelist.com/qakbot-technical-analysis/103931/</loc>
	</url>
	<url>
		<loc>https://securelist.com/triada-trojan-in-whatsapp-mod/103679/</loc>
	</url>
	<url>
		<loc>https://securelist.com/game-related-cyberthreats/103675/</loc>
	</url>
	<url>
		<loc>https://securelist.com/it-threat-evolution-q2-2021/103597/</loc>
	</url>
	<url>
		<loc>https://securelist.com/it-threat-evolution-q2-2021-mobile-statistics/103636/</loc>
	</url>
	<url>
		<loc>https://securelist.com/it-threat-evolution-in-q2-2021-pc-statistics/103607/</loc>
	</url>
	<url>
		<loc>https://securelist.com/spam-and-phishing-in-q2-2021/103548/</loc>
	</url>
	<url>
		<loc>https://securelist.com/apt-trends-report-q2-2021/103517/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ddos-attacks-in-q2-2021/103424/</loc>
	</url>
	<url>
		<loc>https://securelist.com/managed-detection-and-response-in-q4-2020/103387/</loc>
	</url>
	<url>
		<loc>https://securelist.com/arrests-of-members-of-tetrade-seed-groups-grandoreiro-and-melcoz/103366/</loc>
	</url>
	<url>
		<loc>https://securelist.com/apt-luminousmoth/103332/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/windows-zero-days-how-we-find-and-protect-from-them/</loc>
	</url>
	<url>
		<loc>https://securelist.com/quick-look-at-cve-2021-1675-cve-2021-34527-aka-printnightmare/103123/</loc>
	</url>
	<url>
		<loc>https://securelist.com/wildpressure-targets-macos/103072/</loc>
	</url>
	<url>
		<loc>https://securelist.com/revil-ransomware-attack-on-msp-companies/103075/</loc>
	</url>
	<url>
		<loc>https://securelist.com/do-cybercriminals-play-cyber-games-in-quarantine-a-look-one-year-later/103031/</loc>
	</url>
	<url>
		<loc>https://securelist.com/dating-apps-report-2021/103000/</loc>
	</url>
	<url>
		<loc>https://securelist.com/detecting-unknown-threats-a-honeypot-how-to/102990/</loc>
	</url>
	<url>
		<loc>https://securelist.com/malicious-spam-campaigns-delivering-banking-trojans/102917/</loc>
	</url>
	<url>
		<loc>https://securelist.com/how-to-confuse-antimalware-neural-networks-adversarial-attacks-and-protection/102949/</loc>
	</url>
	<url>
		<loc>https://securelist.com/behind-the-scenes-with-the-head-of-kasperskys-great/102933/</loc>
	</url>
	<url>
		<loc>https://securelist.com/black-kingdom-ransomware/102873/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ferocious-kitten-6-years-of-covert-surveillance-in-iran/102806/</loc>
	</url>
	<url>
		<loc>https://securelist.com/andariel-evolves-to-target-south-korea-with-ransomware/102811/</loc>
	</url>
	<url>
		<loc>https://securelist.com/puzzlemaker-chrome-zero-day-exploit-chain/102771/</loc>
	</url>
	<url>
		<loc>https://securelist.com/gootkit-the-cautious-trojan/102731/</loc>
	</url>
	<url>
		<loc>https://securelist.com/email-spoofing-types/102703/</loc>
	</url>
	<url>
		<loc>https://securelist.com/?related-webinars=ksb-related-webinars</loc>
	</url>
	<url>
		<loc>https://securelist.com/?related-webinars=great-ideas-related-webinars</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/great-ideas-powered-by-sas-threat-actors-advance-on-new-fronts/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/great-ideas-powered-by-sas-threat-hunting-and-new-techniques/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/great-ideas-powered-by-sas-malware-attribution-and-next-gen-iot-honeypots/</loc>
	</url>
	<url>
		<loc>https://securelist.com/children-report-2021/102527/</loc>
	</url>
	<url>
		<loc>https://securelist.com/it-threat-evolution-q1-2021/102382/</loc>
	</url>
	<url>
		<loc>https://securelist.com/it-threat-evolution-q1-2021-mobile-statistics/102547/</loc>
	</url>
	<url>
		<loc>https://securelist.com/it-threat-evolution-q1-2021-non-mobile-statistics/102425/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/how-adversaries-prepare-attacks-a-story-of-tailored-threat-intelligence/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/the-evolution-and-future-of-supply-chain-attacks/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/incident-response-service-numbers-challenges-and-tactics/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/no-two-attacks-are-identical-a-year-in-incident-response/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/how-edr-can-help-you-manage-specific-cybersecurity-cases/</loc>
	</url>
	<url>
		<loc>https://securelist.com/kaspersky-security-bulletin-2020-2021-eu-statistics/102335/</loc>
	</url>
	<url>
		<loc>https://securelist.com/evolution-of-jsworm-ransomware/102428/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/great-ideas-balalaika-edition/</loc>
	</url>
	<url>
		<loc>https://securelist.com/bizarro-banking-trojan-expands-its-attacks-to-europe/102258/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/online-payment-details-theft-via-web-analytics-service-how-to-stay-safe/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/best-practices-how-to-find-network-threats-effectively-using-nids/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ransomware-world-in-2021/102169/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ddos-attacks-in-q1-2021/102166/</loc>
	</url>
	<url>
		<loc>https://securelist.com/operation-tunnelsnake-and-moriya-rootkit/101831/</loc>
	</url>
	<url>
		<loc>https://securelist.com/spam-and-phishing-in-q1-2021/102018/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/remote-working-in-2020-lessons-learnt/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/kasperskys-advanced-targeted-threat-predictions-for-2021/</loc>
	</url>
	<url>
		<loc>https://securelist.com/apt-trends-report-q1-2021/101967/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/great-ideas-powered-by-croissant-baguette-edition/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ransomware-by-the-numbers-reassessing-the-threats-global-impact/101965/</loc>
	</url>
	<url>
		<loc>https://securelist.com/targeted-malware-reverse-engineering-workshop-follow-up-part-2/101945/</loc>
	</url>
	<url>
		<loc>https://securelist.com/targeted-malware-reverse-engineering-workshop-follow-up-part-1/101928/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/prioritizing-alerts-based-on-level-of-risk-a-step-by-step-guide/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/it-security-vulnerabilities-in-healthcare-how-to-avoid-losing-patient-records/</loc>
	</url>
	<url>
		<loc>https://securelist.com/zero-day-vulnerability-in-desktop-window-manager-cve-2021-28310-used-in-the-wild/101898/</loc>
	</url>
	<url>
		<loc>https://securelist.com/apkpure-android-app-store-infected/101845/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/2021-predictions-episode-2-healthcare-cyberthreats/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/2021-predictions-episode-1-financial-cyberthreats/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/2021-predictions-episode-3-ics-cyberthreats/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/great-ideas-green-tea-edition/</loc>
	</url>
	<url>
		<loc>https://securelist.com/webinars/workshop-fuzzing-automated-discovery-of-memory-corruption-vulnerabilities/</loc>
	</url>
	<url>
		<loc>https://securelist.com/the-leap-of-a-cycldek-related-threat-actor/101243/</loc>
	</url>
	<url>
		<loc>https://securelist.com/browser-lockers-extortion-disguised-as-a-fine/101735/</loc>
	</url>
	<url>
		<loc>https://securelist.com/financial-cyberthreats-in-2020/101638/</loc>
	</url>
	<url>
		<loc>https://securelist.com/apt10-sophisticated-multi-layered-loader-ecipekac-discovered-in-a41apt-campaign/101519/</loc>
	</url>
	<url>
		<loc>https://securelist.com/corporate-doxing/101513/</loc>
	</url>
	<url>
		<loc>https://securelist.com/threat-landscape-for-industrial-automation-systems-statistics-for-h2-2020/101299/</loc>
	</url>
	<url>
		<loc>https://securelist.com/convuster-macos-adware-in-rust/101258/</loc>
	</url>
	<url>
		<loc>https://securelist.com/covid-19-examining-the-threat-landscape-a-year-later/101154/</loc>
	</url>
	<url>
		<loc>https://securelist.com/malware-for-the-new-apple-silicon-platform/101137/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ad-blocker-with-miner-included/101105/</loc>
	</url>
	<url>
		<loc>https://securelist.com/zero-day-vulnerabilities-in-microsoft-exchange-server/101096/</loc>
	</url>
	<url>
		<loc>https://securelist.com/mobile-malware-evolution-2020/101029/</loc>
	</url>
	<url>
		<loc>https://securelist.com/the-state-of-stalkerware-in-2020/100875/</loc>
	</url>
	<url>
		<loc>https://securelist.com/lazarus-threatneedle/100803/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ddos-attacks-in-q4-2020/100650/</loc>
	</url>
	<url>
		<loc>https://securelist.com/spam-and-phishing-in-2020/100512/</loc>
	</url>
	<url>
		<loc>https://securelist.com/how-kids-coped-with-covid-hit-winter-holidays/100450/</loc>
	</url>
	<url>
		<loc>https://securelist.com/privacy-predictions-for-2021/100311/</loc>
	</url>
	<url>
		<loc>https://securelist.com/sunburst-backdoor-kazuar/99981/</loc>
	</url>
	<url>
		<loc>https://securelist.com/digital-footprint-intelligence-report/99452/</loc>
	</url>
	<url>
		<loc>https://securelist.com/how-we-protect-against-sunburst-backdoor/99959/</loc>
	</url>
	<url>
		<loc>https://securelist.com/lazarus-covets-covid-19-related-intelligence/99906/</loc>
	</url>
	<url>
		<loc>https://securelist.com/sunburst-connecting-the-dots-in-the-dns-requests/99862/</loc>
	</url>
	<url>
		<loc>https://securelist.com/the-future-of-cyberconflicts/99859/</loc>
	</url>
	<url>
		<loc>https://securelist.com/kaspersky-security-bulletin-2020-statistics/99804/</loc>
	</url>
	<url>
		<loc>https://securelist.com/adaptive-protection-against-invisible-threats/99772/</loc>
	</url>
	<url>
		<loc>https://securelist.com/the-story-of-the-year-remote-work/99720/</loc>
	</url>
	<url>
		<loc>https://securelist.com/researchers-call-for-a-determined-path-to-cybersecurity/99708/</loc>
	</url>
	<url>
		<loc>https://securelist.com/the-chronicles-of-emotet/99660/</loc>
	</url>
	<url>
		<loc>https://securelist.com/apt-annual-review-what-the-worlds-threat-actors-got-up-to-in-2020/99574/</loc>
	</url>
	<url>
		<loc>https://securelist.com/what-did-deathstalker-hide-between-two-ferns/99616/</loc>
	</url>
	<url>
		<loc>https://securelist.com/healthcare-security-in-2021/99571/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ics-threat-predictions-for-2021/99613/</loc>
	</url>
	<url>
		<loc>https://securelist.com/education-predictions-2021/99641/</loc>
	</url>
	<url>
		<loc>https://securelist.com/dox-steal-reveal/99577/</loc>
	</url>
	<url>
		<loc>https://securelist.com/cyberthreats-to-financial-organizations-in-2021/99591/</loc>
	</url>
	<url>
		<loc>https://securelist.com/lookalike-domains-and-how-to-outfox-them/99539/</loc>
	</url>
	<url>
		<loc>https://securelist.com/it-threat-evolution-q3-2020-non-mobile-statistics/99404/</loc>
	</url>
	<url>
		<loc>https://securelist.com/it-threat-evolution-q3-2020-mobile-statistics/99461/</loc>
	</url>
	<url>
		<loc>https://securelist.com/it-threat-evolution-q3-2020/99382/</loc>
	</url>
	<url>
		<loc>https://securelist.com/apt-predictions-for-2021/99387/</loc>
	</url>
	<url>
		<loc>https://securelist.com/spam-and-phishing-in-q3-2020/99325/</loc>
	</url>
	<url>
		<loc>https://securelist.com/targeted-ransomware-encrypting-data/99255/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ghimob-tetrade-threat-mobile-devices/99228/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ransomexx-trojan-attacks-linux-systems/99279/</loc>
	</url>
	<url>
		<loc>https://securelist.com/attacks-on-industrial-enterprises-using-rms-and-teamviewer-new-data/99206/</loc>
	</url>
	<url>
		<loc>https://securelist.com/apt-trends-report-q3-2020/99204/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ddos-attacks-in-q3-2020/99171/</loc>
	</url>
	<url>
		<loc>https://securelist.com/miner-xmrig/99151/</loc>
	</url>
	<url>
		<loc>https://securelist.com/maze-ransomware/99137/</loc>
	</url>
	<url>
		<loc>https://securelist.com/gravityrat-the-spy-returns/99097/</loc>
	</url>
	<url>
		<loc>https://securelist.com/iamtheking-and-the-slothfulmedia-malware-family/99000/</loc>
	</url>
	<url>
		<loc>https://securelist.com/montysthree-industrial-espionage/98972/</loc>
	</url>
	<url>
		<loc>https://securelist.com/mosaicregressor/98849/</loc>
	</url>
	<url>
		<loc>https://securelist.com/sas-at-home-is-back-this-fall/98833/</loc>
	</url>
	<url>
		<loc>https://securelist.com/why-master-yara/98600/</loc>
	</url>
	<url>
		<loc>https://securelist.com/threat-landscape-for-industrial-automation-systems-h1-2020-highlights/98427/</loc>
	</url>
	<url>
		<loc>https://securelist.com/looking-for-sophisticated-malware-in-iot-devices/98530/</loc>
	</url>
	<url>
		<loc>https://securelist.com/an-overview-of-targeted-attacks-and-apts-on-linux/98440/</loc>
	</url>
	<url>
		<loc>https://securelist.com/digital-education-the-cyberrisks-of-the-online-classroom/98380/</loc>
	</url>
	<url>
		<loc>https://securelist.com/it-threat-evolution-q2-2020-mobile-statistics/98337/</loc>
	</url>
	<url>
		<loc>https://securelist.com/it-threat-evolution-q2-2020-pc-statistics/98292/</loc>
	</url>
	<url>
		<loc>https://securelist.com/it-threat-evolution-q2-2020/98230/</loc>
	</url>
	<url>
		<loc>https://securelist.com/operation-powerfall-cve-2020-0986-and-variants/98329/</loc>
	</url>
	<url>
		<loc>https://securelist.com/transparent-tribe-part-2/98233/</loc>
	</url>
	<url>
		<loc>https://securelist.com/deathstalker-mercenary-triumvirate/98177/</loc>
	</url>
	<url>
		<loc>https://securelist.com/transparent-tribe-part-1/98127/</loc>
	</url>
	<url>
		<loc>https://securelist.com/cactuspete-apt-groups-updated-bisonal-backdoor/97962/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ie-and-windows-zero-day-operation-powerfall/97976/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ddos-attacks-in-q2-2020/98077/</loc>
	</url>
	<url>
		<loc>https://securelist.com/spam-and-phishing-in-q2-2020/97987/</loc>
	</url>
	<url>
		<loc>https://securelist.com/incident-response-analyst-report-2019/97974/</loc>
	</url>
	<url>
		<loc>https://securelist.com/wastedlocker-technical-analysis/97944/</loc>
	</url>
	<url>
		<loc>https://securelist.com/apt-trends-report-q2-2020/97937/</loc>
	</url>
	<url>
		<loc>https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/</loc>
	</url>
	<url>
		<loc>https://securelist.com/mata-multi-platform-targeted-malware-framework/97746/</loc>
	</url>
	<url>
		<loc>https://securelist.com/great-ida-pro-plugins/97898/</loc>
	</url>
	<url>
		<loc>https://securelist.com/the-streaming-wars-a-cybercriminals-perspective/97851/</loc>
	</url>
	<url>
		<loc>https://securelist.com/great-ideas-follow-up/97816/</loc>
	</url>
	<url>
		<loc>https://securelist.com/the-tetrade-brazilian-banking-malware/97779/</loc>
	</url>
	<url>
		<loc>https://securelist.com/redirect-auction/96944/</loc>
	</url>
	<url>
		<loc>https://securelist.com/pig-in-a-poke-smartphone-adware/97607/</loc>
	</url>
	<url>
		<loc>https://securelist.com/magnitude-exploit-kit-evolution/97436/</loc>
	</url>
	<url>
		<loc>https://securelist.com/oh-what-a-boot-iful-mornin/97365/</loc>
	</url>
	<url>
		<loc>https://securelist.com/web-skimming-with-google-analytics/97414/</loc>
	</url>
	<url>
		<loc>https://securelist.com/microcin-is-here/97353/</loc>
	</url>
	<url>
		<loc>https://securelist.com/do-cybercriminals-play-cyber-games-during-quarantine/97241/</loc>
	</url>
	<url>
		<loc>https://securelist.com/explicit-content-and-cyberthreats-2019-report/97310/</loc>
	</url>
	<url>
		<loc>https://securelist.com/big-threats-using-code-similarity-part-1/97239/</loc>
	</url>
	<url>
		<loc>https://securelist.com/cycldek-bridging-the-air-gap/97157/</loc>
	</url>
	<url>
		<loc>https://securelist.com/children-report-2020/97191/</loc>
	</url>
	<url>
		<loc>https://securelist.com/the-zero-day-exploits-of-operation-wizardopium/97086/</loc>
	</url>
	<url>
		<loc>https://securelist.com/spam-and-phishing-in-q1-2020/97091/</loc>
	</url>
	<url>
		<loc>https://securelist.com/in-app-advertising-in-android/97065/</loc>
	</url>
	<url>
		<loc>https://securelist.com/it-threat-evolution-q1-2020-statistics/96959/</loc>
	</url>
	<url>
		<loc>https://securelist.com/it-threat-evolution-q1-2020/96886/</loc>
	</url>
	<url>
		<loc>https://securelist.com/verizons-2020-dbir/97026/</loc>
	</url>
	<url>
		<loc>https://securelist.com/cyberthreats-on-lockdown/96988/</loc>
	</url>
	<url>
		<loc>https://securelist.com/compfun-http-status-based-trojan/96874/</loc>
	</url>
	<url>
		<loc>https://securelist.com/naikons-aria/96899/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ddos-attacks-in-q1-2020/96837/</loc>
	</url>
	<url>
		<loc>https://securelist.com/attck-evaluation-results/96849/</loc>
	</url>
	<url>
		<loc>https://securelist.com/apt-trends-report-q1-2020/96826/</loc>
	</url>
	<url>
		<loc>https://securelist.com/remote-spring-the-rise-of-rdp-bruteforce-attacks/96820/</loc>
	</url>
	<url>
		<loc>https://securelist.com/apt-phantomlance/96772/</loc>
	</url>
	<url>
		<loc>https://securelist.com/atm-pos-malware-landscape-2017-2019/96750/</loc>
	</url>
	<url>
		<loc>https://securelist.com/become-a-good-reverse-engineer/96743/</loc>
	</url>
	<url>
		<loc>https://securelist.com/sas-sweet-sas/96736/</loc>
	</url>
	<url>
		<loc>https://securelist.com/financial-cyberthreats-in-2019/96692/</loc>
	</url>
	<url>
		<loc>https://securelist.com/spam-report-2019/96527/</loc>
	</url>
	<url>
		<loc>https://securelist.com/unkillable-xhelper-and-a-trojan-matryoshka/96487/</loc>
	</url>
	<url>
		<loc>https://securelist.com/yara-webinar-follow-up/96505/</loc>
	</url>
	<url>
		<loc>https://securelist.com/loncom-packer-from-backdoors-to-cobalt-strike/96465/</loc>
	</url>
	<url>
		<loc>https://securelist.com/holy-water-ongoing-targeted-water-holing-attack-in-asia/96311/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ios-exploit-chain-deploys-lightspy-malware/96407/</loc>
	</url>
	<url>
		<loc>https://securelist.com/wildpressure-targets-industrial-in-the-middle-east/96360/</loc>
	</url>
	<url>
		<loc>https://securelist.com/hunting-apts-with-yara/96386/</loc>
	</url>
	<url>
		<loc>https://securelist.com/monitorminor-vicious-stalkerware/95575/</loc>
	</url>
	<url>
		<loc>https://securelist.com/cookiethief/96332/</loc>
	</url>
	<url>
		<loc>https://securelist.com/mokes-and-buerak-distributed-under-the-guise-of-security-certificates/96324/</loc>
	</url>
	<url>
		<loc>https://securelist.com/roaming-mantis-part-v/96250/</loc>
	</url>
	<url>
		<loc>https://securelist.com/mobile-malware-evolution-2019/96280/</loc>
	</url>
	<url>
		<loc>https://securelist.com/cybersecurity-research-during-the-coronavirus-outbreak-and-after/96275/</loc>
	</url>
	<url>
		<loc>https://securelist.com/azorult-spreads-as-a-fake-protonvpn-installer/96261/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ddos-report-q4-2019/96154/</loc>
	</url>
	<url>
		<loc>https://securelist.com/kbot-sometimes-they-come-back/96157/</loc>
	</url>
	<url>
		<loc>https://securelist.com/new-year-phishing-spam/96124/</loc>
	</url>
	<url>
		<loc>https://securelist.com/shlayer-for-macos/95724/</loc>
	</url>
	<url>
		<loc>https://securelist.com/smartphone-shopaholic/95544/</loc>
	</url>
	<url>
		<loc>https://securelist.com/operation-applejeus-sequel/95596/</loc>
	</url>
	<url>
		<loc>https://securelist.com/how-we-developed-our-simple-harbour-decompiler/95517/</loc>
	</url>
	<url>
		<loc>https://securelist.com/oilrigs-poison-frog/95490/</loc>
	</url>
	<url>
		<loc>https://securelist.com/kaspersky-security-bulletin-2019-statistics/95475/</loc>
	</url>
	<url>
		<loc>https://securelist.com/story-of-the-year-2019-cities-under-ransomware-siege/95456/</loc>
	</url>
	<url>
		<loc>https://securelist.com/windows-0-day-exploit-cve-2019-1458-used-in-operation-wizardopium/95432/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ksb-2019-review-of-the-year/95394/</loc>
	</url>
	<url>
		<loc>https://securelist.com/corporate-security-predictions-2020/95387/</loc>
	</url>
	<url>
		<loc>https://securelist.com/healthcare-predictions-2020/95385/</loc>
	</url>
	<url>
		<loc>https://securelist.com/financial-predictions-2020/95388/</loc>
	</url>
	<url>
		<loc>https://securelist.com/5g-predictions-2020/95386/</loc>
	</url>
	<url>
		<loc>https://securelist.com/biometric-data-processing-and-storage-system-threats/95364/</loc>
	</url>
	<url>
		<loc>https://securelist.com/it-threat-evolution-q3-2019-statistics/95269/</loc>
	</url>
	<url>
		<loc>https://securelist.com/it-threat-evolution-q3-2019/95268/</loc>
	</url>
	<url>
		<loc>https://securelist.com/revengehotels/95229/</loc>
	</url>
	<url>
		<loc>https://securelist.com/spam-report-q3-2019/95177/</loc>
	</url>
	<url>
		<loc>https://securelist.com/unwanted-notifications-in-browser/95060/</loc>
	</url>
	<url>
		<loc>https://securelist.com/5g-security-for-smart-cities/95057/</loc>
	</url>
	<url>
		<loc>https://securelist.com/black-friday-report-2019/95109/</loc>
	</url>
	<url>
		<loc>https://securelist.com/the-cybercrime-ecosystem/95085/</loc>
	</url>
	<url>
		<loc>https://securelist.com/advanced-threat-predictions-for-2020/95055/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ddos-report-q3-2019/94958/</loc>
	</url>
	<url>
		<loc>https://securelist.com/titanium-the-platinum-group-strikes-again/94961/</loc>
	</url>
	<url>
		<loc>https://securelist.com/darkuniverse-the-mysterious-apt-framework-27/94897/</loc>
	</url>
	<url>
		<loc>https://securelist.com/chrome-0-day-exploit-cve-2019-13720-used-in-operation-wizardopium/94866/</loc>
	</url>
	<url>
		<loc>https://securelist.com/malware-like-cheats-in-video-games/94853/</loc>
	</url>
	<url>
		<loc>https://securelist.com/steam-powered-scammers/94553/</loc>
	</url>
	<url>
		<loc>https://securelist.com/data-collectors/94339/</loc>
	</url>
	<url>
		<loc>https://securelist.com/apt-trends-report-q3-2019/94530/</loc>
	</url>
	<url>
		<loc>https://securelist.com/iot-a-malware-story/94451/</loc>
	</url>
	<url>
		<loc>https://securelist.com/robots-social-impact/94431/</loc>
	</url>
	<url>
		<loc>https://securelist.com/managed-detection-and-response-analytics-report/94076/</loc>
	</url>
	<url>
		<loc>https://securelist.com/compfun-successor-reductor/93633/</loc>
	</url>
	<url>
		<loc>https://securelist.com/hqwar-the-higher-it-flies-the-harder-it-drops/93689/</loc>
	</url>
	<url>
		<loc>https://securelist.com/the-state-of-stalkerware-in-2019/93634/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ransomware-two-pieces-of-good-news/93355/</loc>
	</url>
	<url>
		<loc>https://securelist.com/my-name-is-dtrack/93338/</loc>
	</url>
	<url>
		<loc>https://securelist.com/smart-buildings-threats/93322/</loc>
	</url>
	<url>
		<loc>https://securelist.com/electricity-and-mining/93292/</loc>
	</url>
	<url>
		<loc>https://securelist.com/threats-to-macos-users/93116/</loc>
	</url>
	<url>
		<loc>https://securelist.com/parental-control-report-summer-results/93063/</loc>
	</url>
	<url>
		<loc>https://securelist.com/spying-android-rat-from-brazil-brata/92775/</loc>
	</url>
	<url>
		<loc>https://securelist.com/incident-response-analytics-report-2018/92732/</loc>
	</url>
	<url>
		<loc>https://securelist.com/spam-and-phishing-in-q2-2019/92379/</loc>
	</url>
	<url>
		<loc>https://securelist.com/dropper-in-google-play/92496/</loc>
	</url>
	<url>
		<loc>https://securelist.com/malicious-tasks-in-ms-sql-server/92167/</loc>
	</url>
	<url>
		<loc>https://securelist.com/it-threat-evolution-q2-2019/91994/</loc>
	</url>
	<url>
		<loc>https://securelist.com/it-threat-evolution-q2-2019-statistics/92053/</loc>
	</url>
	<url>
		<loc>https://securelist.com/recent-cloud-atlas-activity/92016/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ddos-report-q2-2019/91934/</loc>
	</url>
	<url>
		<loc>https://securelist.com/apt-trends-report-q2-2019/91897/</loc>
	</url>
	<url>
		<loc>https://securelist.com/financial-threats-in-h1-2019/91899/</loc>
	</url>
	<url>
		<loc>https://securelist.com/how-to-steal-a-million-of-your-data/91855/</loc>
	</url>
	<url>
		<loc>https://securelist.com/on-the-iot-road/91833/</loc>
	</url>
	<url>
		<loc>https://securelist.com/turla-renews-its-arsenal-with-topinambour/91687/</loc>
	</url>
	<url>
		<loc>https://securelist.com/new-finspy-ios-and-android-implants-revealed-itw/91685/</loc>
	</url>
	<url>
		<loc>https://securelist.com/twas-the-night-before/91599/</loc>
	</url>
	<url>
		<loc>https://securelist.com/sodin-ransomware/91473/</loc>
	</url>
	<url>
		<loc>https://securelist.com/fibaro-smart-home/91416/</loc>
	</url>
	<url>
		<loc>https://securelist.com/criminals-atms-and-a-cup-of-coffee/91406/</loc>
	</url>
	<url>
		<loc>https://securelist.com/fanning-the-flames-viceleaker-operation/90877/</loc>
	</url>
	<url>
		<loc>https://securelist.com/mobile-banker-riltok/91374/</loc>
	</url>
	<url>
		<loc>https://securelist.com/mobile-subscriptions/91211/</loc>
	</url>
	<url>
		<loc>https://securelist.com/plurox-modular-backdoor/91213/</loc>
	</url>
	<url>
		<loc>https://securelist.com/kids-report-2018-2019/91080/</loc>
	</url>
	<url>
		<loc>https://securelist.com/platinum-is-back/91135/</loc>
	</url>
	<url>
		<loc>https://securelist.com/zebrocys-multilanguage-malware-salad/90680/</loc>
	</url>
	<url>
		<loc>https://securelist.com/it-threat-evolution-q1-2019-statistics/90916/</loc>
	</url>
	<url>
		<loc>https://securelist.com/it-threat-evolution-q1-2019/90978/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ddos-report-q1-2019/90792/</loc>
	</url>
	<url>
		<loc>https://securelist.com/spam-and-phishing-in-q1-2019/90795/</loc>
	</url>
	<url>
		<loc>https://securelist.com/scarcruft-continues-to-evolve-introduces-bluetooth-harvester/90729/</loc>
	</url>
	<url>
		<loc>https://securelist.com/the-2019-dbir-is-out/90732/</loc>
	</url>
	<url>
		<loc>https://securelist.com/fin7-5-the-infamous-cybercrime-rig-fin7-continues-its-activities/90703/</loc>
	</url>
	<url>
		<loc>https://securelist.com/apt-trends-report-q1-2019/90643/</loc>
	</url>
	<url>
		<loc>https://securelist.com/muddywaters-arsenal/90659/</loc>
	</url>
	<url>
		<loc>https://securelist.com/operation-shadowhammer-a-high-profile-supply-chain-attack/90380/</loc>
	</url>
	<url>
		<loc>https://securelist.com/new-win32k-zero-day-cve-2019-0859/90435/</loc>
	</url>
	<url>
		<loc>https://securelist.com/large-scale-sim-swap-fraud/90353/</loc>
	</url>
	<url>
		<loc>https://securelist.com/gaza-cybergang-group1-operation-sneakypastes/90068/</loc>
	</url>
	<url>
		<loc>https://securelist.com/project-tajmahal/90240/</loc>
	</url>
	<url>
		<loc>https://securelist.com/digital-doppelgangers/90378/</loc>
	</url>
	<url>
		<loc>https://securelist.com/basbanke-trend-setting-brazilian-banking-trojan/90365/</loc>
	</url>
	<url>
		<loc>https://securelist.com/roaming-mantis-part-iv/90332/</loc>
	</url>
	<url>
		<loc>https://securelist.com/beware-of-stalkerware/90264/</loc>
	</url>
	<url>
		<loc>https://securelist.com/game-of-threats/90116/</loc>
	</url>
	<url>
		<loc>https://securelist.com/bots-and-botnets-in-2018/90091/</loc>
	</url>
	<url>
		<loc>https://securelist.com/the-return-of-the-bom/90065/</loc>
	</url>
	<url>
		<loc>https://securelist.com/threat-landscape-for-industrial-automation-systems-in-h2-2018/90041/</loc>
	</url>
	<url>
		<loc>https://securelist.com/cryptocurrency-businesses-still-being-targeted-by-lazarus/90019/</loc>
	</url>
	<url>
		<loc>https://securelist.com/operation-shadowhammer/89992/</loc>
	</url>
	<url>
		<loc>https://securelist.com/azorult-analysis-history/89922/</loc>
	</url>
	<url>
		<loc>https://securelist.com/hacking-microcontroller-firmware-through-a-usb/89919/</loc>
	</url>
	<url>
		<loc>https://securelist.com/cve-2019-0797-zero-day-vulnerability/89885/</loc>
	</url>
	<url>
		<loc>https://securelist.com/spam-and-phishing-in-2018/89701/</loc>
	</url>
	<url>
		<loc>https://securelist.com/a-predatory-tale/89779/</loc>
	</url>
	<url>
		<loc>https://securelist.com/financial-cyberthreats-in-2018/89788/</loc>
	</url>
	<url>
		<loc>https://securelist.com/piratebay-malware/89740/</loc>
	</url>
	<url>
		<loc>https://securelist.com/mobile-malware-evolution-2018/89689/</loc>
	</url>
	<url>
		<loc>https://securelist.com/how-to-attack-and-defend-a-prosthetic-arm/89693/</loc>
	</url>
	<url>
		<loc>https://securelist.com/threats-to-users-of-adult-websites-in-2018/89634/</loc>
	</url>
	<url>
		<loc>https://securelist.com/atm-robber-winpot/89611/</loc>
	</url>
	<url>
		<loc>https://securelist.com/dns-manipulation-in-venezuela/89592/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ddos-attacks-in-q4-2018/89565/</loc>
	</url>
	<url>
		<loc>https://securelist.com/chafer-used-remexi-malware/89538/</loc>
	</url>
	<url>
		<loc>https://securelist.com/razy-in-search-of-cryptocurrency/89485/</loc>
	</url>
	<url>
		<loc>https://securelist.com/greyenergys-overlap-with-zebrocy/89506/</loc>
	</url>
	<url>
		<loc>https://securelist.com/a-zebrocy-go-downloader/89419/</loc>
	</url>
	<url>
		<loc>https://securelist.com/the-worlds-southernmost-security-conference/89436/</loc>
	</url>
	<url>
		<loc>https://securelist.com/remotely-controlled-ev-home-chargers-the-threats-and-vulnerabilities/89251/</loc>
	</url>
	<url>
		<loc>https://securelist.com/zero-day-in-windows-kernel-transaction-manager-cve-2018-8611/89253/</loc>
	</url>
	<url>
		<loc>https://securelist.com/darkvishnya/89169/</loc>
	</url>
	<url>
		<loc>https://securelist.com/apt-review-of-the-year/89117/</loc>
	</url>
	<url>
		<loc>https://securelist.com/koffeymaker-notebook-vs-atm/89161/</loc>
	</url>
	<url>
		<loc>https://securelist.com/kaspersky-security-bulletin-2018-statistics/89145/</loc>
	</url>
	<url>
		<loc>https://securelist.com/kaspersky-security-bulletin-2018-top-security-stories/89118/</loc>
	</url>
	<url>
		<loc>https://securelist.com/first-annual-cyberwarcon/89116/</loc>
	</url>
	<url>
		<loc>https://securelist.com/kaspersky-security-bulletin-2018-story-of-the-year-miners/89096/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ksb-threat-predictions-for-industrial-security-in-2019/88940/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ksb-threat-predictions-for-cryptocurrencies-in-2019/88942/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ksb-cyberthreats-to-financial-institutions-2019-overview-and-predictions/88944/</loc>
	</url>
	<url>
		<loc>https://securelist.com/the-rotexy-mobile-trojan-banker-and-ransomware/88893/</loc>
	</url>
	<url>
		<loc>https://securelist.com/kaspersky-security-bulletin-threat-predictions-for-2019/88878/</loc>
	</url>
	<url>
		<loc>https://securelist.com/black-friday-alert/88856/</loc>
	</url>
	<url>
		<loc>https://securelist.com/a-new-exploit-for-zero-day-vulnerability-cve-2018-8589/88845/</loc>
	</url>
	<url>
		<loc>https://securelist.com/it-threat-evolution-q3-2018-statistics/88689/</loc>
	</url>
	<url>
		<loc>https://securelist.com/it-threat-evolution-q3-2018/88635/</loc>
	</url>
	<url>
		<loc>https://securelist.com/spam-and-phishing-in-q3-2018/88686/</loc>
	</url>
	<url>
		<loc>https://securelist.com/hey-there-how-much-are-you-worth/88691/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ddos-report-in-q3-2018/88617/</loc>
	</url>
	<url>
		<loc>https://securelist.com/hackers-attacking-your-memories/88285/</loc>
	</url>
	<url>
		<loc>https://securelist.com/phishing-for-knowledge/88268/</loc>
	</url>
	<url>
		<loc>https://securelist.com/darkpulsar-faq/88233/</loc>
	</url>
	<url>
		<loc>https://securelist.com/darkpulsar/88199/</loc>
	</url>
	<url>
		<loc>https://securelist.com/octopus-infested-seas-of-central-asia/88200/</loc>
	</url>
	<url>
		<loc>https://securelist.com/threats-in-the-netherlands/88185/</loc>
	</url>
	<url>
		<loc>https://securelist.com/muddywater/88059/</loc>
	</url>
	<url>
		<loc>https://securelist.com/cve-2018-8453-used-in-targeted-attacks/88151/</loc>
	</url>
	<url>
		<loc>https://securelist.com/shedding-skin-turlas-fresh-faces/88069/</loc>
	</url>
	<url>
		<loc>https://securelist.com/roaming-mantis-part-3/88071/</loc>
	</url>
	<url>
		<loc>https://securelist.com/usb-threats-from-malware-to-miners/87989/</loc>
	</url>
	<url>
		<loc>https://securelist.com/threats-posed-by-using-rats-in-ics/88011/</loc>
	</url>
	<url>
		<loc>https://securelist.com/new-trends-in-the-world-of-iot-threats/87991/</loc>
	</url>
	<url>
		<loc>https://securelist.com/luckymouse-ndisproxy-driver/87914/</loc>
	</url>
	<url>
		<loc>https://securelist.com/threat-landscape-for-industrial-automation-systems-in-h1-2018/87913/</loc>
	</url>
	<url>
		<loc>https://securelist.com/kids-summer-threats/87678/</loc>
	</url>
	<url>
		<loc>https://securelist.com/what-are-botnets-downloading/87658/</loc>
	</url>
	<url>
		<loc>https://securelist.com/loki-bot-stealing-corporate-passwords/87595/</loc>
	</url>
	<url>
		<loc>https://securelist.com/busygasper-the-unfriendly-spy/87627/</loc>
	</url>
	<url>
		<loc>https://securelist.com/the-rise-of-mobile-banker-asacub/87591/</loc>
	</url>
	<url>
		<loc>https://securelist.com/operation-applejeus/87553/</loc>
	</url>
	<url>
		<loc>https://securelist.com/dark-tequila-anejo/87528/</loc>
	</url>
	<url>
		<loc>https://securelist.com/security-assessment-of-corporate-information-systems-in-2017/87370/</loc>
	</url>
	<url>
		<loc>https://securelist.com/spam-and-phishing-in-q2-2018/87368/</loc>
	</url>
	<url>
		<loc>https://securelist.com/keypass-ransomware/87412/</loc>
	</url>
	<url>
		<loc>https://securelist.com/it-threat-evolution-q2-2018/87172/</loc>
	</url>
	<url>
		<loc>https://securelist.com/it-threat-evolution-q2-2018-statistics/87170/</loc>
	</url>
	<url>
		<loc>https://securelist.com/file-partner-programs/87136/</loc>
	</url>
	<url>
		<loc>https://securelist.com/attacks-on-industrial-enterprises-using-rms-and-teamviewer/87104/</loc>
	</url>
	<url>
		<loc>https://securelist.com/a-mining-multitool/86950/</loc>
	</url>
	<url>
		<loc>https://securelist.com/a-study-of-car-sharing-apps/86948/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ddos-report-in-q2-2018/86537/</loc>
	</url>
	<url>
		<loc>https://securelist.com/calisto-trojan-for-macos/86543/</loc>
	</url>
	<url>
		<loc>https://securelist.com/giftcard-generators/86522/</loc>
	</url>
	<url>
		<loc>https://securelist.com/the-return-of-fantomas-or-how-we-deciphered-cryakl/86511/</loc>
	</url>
	<url>
		<loc>https://securelist.com/coinvault-the-court-case/86503/</loc>
	</url>
	<url>
		<loc>https://securelist.com/apt-trends-report-q2-2018/86487/</loc>
	</url>
	<url>
		<loc>https://securelist.com/in-cryptoland-trust-can-be-costly/86367/</loc>
	</url>
	<url>
		<loc>https://securelist.com/to-crypt-or-to-mine-that-is-the-question/86307/</loc>
	</url>
	<url>
		<loc>https://securelist.com/delving-deep-into-vbscript-analysis-of-cve-2018-8174-exploitation/86333/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ransomware-and-malicious-crypto-miners-in-2016-2018/86238/</loc>
	</url>
	<url>
		<loc>https://securelist.com/pbot-evolving-adware/86242/</loc>
	</url>
	<url>
		<loc>https://securelist.com/modern-oss-for-embedded-systems/86109/</loc>
	</url>
	<url>
		<loc>https://securelist.com/olympic-destroyer-is-still-alive/86169/</loc>
	</url>
	<url>
		<loc>https://securelist.com/luckymouse-hits-national-data-center/86083/</loc>
	</url>
	<url>
		<loc>https://securelist.com/a-mitm-extension-for-chrome/86057/</loc>
	</url>
	<url>
		<loc>https://securelist.com/fifa-public-wi-fi-guide/85919/</loc>
	</url>
	<url>
		<loc>https://securelist.com/kids-report-2018/85912/</loc>
	</url>
	<url>
		<loc>https://securelist.com/trojan-watch/85376/</loc>
	</url>
	<url>
		<loc>https://securelist.com/2018-fraud-world-cup/85878/</loc>
	</url>
	<url>
		<loc>https://securelist.com/vpnfilter-exif-to-c2-mechanism-analysed/85721/</loc>
	</url>
	<url>
		<loc>https://securelist.com/spam-and-phishing-in-q1-2018/85650/</loc>
	</url>
	<url>
		<loc>https://securelist.com/backdoors-in-d-links-backyard/85530/</loc>
	</url>
	<url>
		<loc>https://securelist.com/i-know-where-your-pet-is/85600/</loc>
	</url>
	<url>
		<loc>https://securelist.com/roaming-mantis-dabbles-in-mining-and-phishing-multilingually/85607/</loc>
	</url>
	<url>
		<loc>https://securelist.com/it-threat-evolution-q1-2018-statistics/85541/</loc>
	</url>
	<url>
		<loc>https://securelist.com/it-threat-evolution-q1-2018/85469/</loc>
	</url>
	<url>
		<loc>https://securelist.com/opc-ua-security-analysis/85424/</loc>
	</url>
	<url>
		<loc>https://securelist.com/root-cause-analysis-of-cve-2018-8174/85486/</loc>
	</url>
	<url>
		<loc>https://securelist.com/synack-targeted-ransomware-uses-the-doppelganging-technique/85431/</loc>
	</url>
	<url>
		<loc>https://securelist.com/whos-who-in-the-zoo/85394/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ddos-report-in-q1-2018/85373/</loc>
	</url>
	<url>
		<loc>https://securelist.com/energetic-bear-crouching-yeti/85345/</loc>
	</url>
	<url>
		<loc>https://securelist.com/tens-of-thousands-per-gram/85241/</loc>
	</url>
	<url>
		<loc>https://securelist.com/leaking-ads/85239/</loc>
	</url>
	<url>
		<loc>https://securelist.com/roaming-mantis-uses-dns-hijacking-to-infect-android-smartphones/85178/</loc>
	</url>
	<url>
		<loc>https://securelist.com/apt-trends-report-q1-2018/85280/</loc>
	</url>
	<url>
		<loc>https://securelist.com/operation-parliament-who-is-doing-what/85237/</loc>
	</url>
	<url>
		<loc>https://securelist.com/pocket-cryptofarms/85137/</loc>
	</url>
	<url>
		<loc>https://securelist.com/your-new-friend-klara/85046/</loc>
	</url>
	<url>
		<loc>https://securelist.com/threat-landscape-for-industrial-automation-systems-in-h2-2017/85053/</loc>
	</url>
	<url>
		<loc>https://securelist.com/goodfellas-the-brazilian-carding-scene-is-after-you/84263/</loc>
	</url>
	<url>
		<loc>https://securelist.com/time-of-death-connected-medicine/84315/</loc>
	</url>
	<url>
		<loc>https://securelist.com/somebodys-watching-when-cameras-are-more-than-just-smart/84309/</loc>
	</url>
	<url>
		<loc>https://securelist.com/masha-and-these-bears/84311/</loc>
	</url>
	<url>
		<loc>https://securelist.com/apt-slingshot/84312/</loc>
	</url>
	<url>
		<loc>https://securelist.com/the-devils-in-the-rich-header/84348/</loc>
	</url>
	<url>
		<loc>https://securelist.com/olympicdestroyer-is-here-to-trick-the-industry/84295/</loc>
	</url>
	<url>
		<loc>https://securelist.com/mobile-malware-review-2017/84139/</loc>
	</url>
	<url>
		<loc>https://securelist.com/mining-is-the-new-black/84232/</loc>
	</url>
	<url>
		<loc>https://securelist.com/financial-cyberthreats-in-2017/84107/</loc>
	</url>
	<url>
		<loc>https://securelist.com/iot-hack-how-to-break-a-smart-home-again/84092/</loc>
	</url>
	<url>
		<loc>https://securelist.com/tax-season-phishing/84030/</loc>
	</url>
	<url>
		<loc>https://securelist.com/disappearing-bytes/84017/</loc>
	</url>
	<url>
		<loc>https://securelist.com/a-slice-of-2017-sofacy-activity/83930/</loc>
	</url>
	<url>
		<loc>https://securelist.com/spam-and-phishing-in-2017/83833/</loc>
	</url>
	<url>
		<loc>https://securelist.com/atm-malware-from-latin-america-to-the-world/83836/</loc>
	</url>
	<url>
		<loc>https://securelist.com/zero-day-vulnerability-in-telegram/83800/</loc>
	</url>
	<url>
		<loc>https://securelist.com/elevation-of-privileges-in-namco-driver/83707/</loc>
	</url>
	<url>
		<loc>https://securelist.com/expensive-gas/83542/</loc>
	</url>
	<url>
		<loc>https://securelist.com/bsides-nyc-a-volunteer-organized-event-put-on-by-and-for-the-community/83765/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ddos-attacks-in-q4-2017/83729/</loc>
	</url>
	<url>
		<loc>https://securelist.com/cryptoransom-spam/83691/</loc>
	</url>
	<url>
		<loc>https://securelist.com/cybercriminals-target-early-irs-2018-refunds-now/83699/</loc>
	</url>
	<url>
		<loc>https://securelist.com/denis-and-company/83671/</loc>
	</url>
	<url>
		<loc>https://securelist.com/a-silver-bullet-for-the-attacker/83661/</loc>
	</url>
	<url>
		<loc>https://securelist.com/skygofree-following-in-the-footsteps-of-hackingteam/83603/</loc>
	</url>
	<url>
		<loc>https://securelist.com/happy-ir-in-the-new-year/83557/</loc>
	</url>
	<url>
		<loc>https://securelist.com/nhash-petty-pranks-with-big-finances/83506/</loc>
	</url>
	<url>
		<loc>https://securelist.com/travle-aka-pylot-backdoor-hits-russian-speaking-targets/83455/</loc>
	</url>
	<url>
		<loc>https://securelist.com/jack-of-all-trades/83470/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ksb-overall-statistics-2017/83453/</loc>
	</url>
	<url>
		<loc>https://securelist.com/still-stealing/83343/</loc>
	</url>
	<url>
		<loc>https://securelist.com/cybercriminals-vs-financial-institutions/83370/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ksb-review-of-the-year-2017/83338/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ksb-story-of-the-year-2017/83290/</loc>
	</url>
	<url>
		<loc>https://securelist.com/iot-lottery/83300/</loc>
	</url>
	<url>
		<loc>https://securelist.com/android-commercial-spyware/83098/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ksb-threat-predictions-for-connected-life-in-2018/83265/</loc>
	</url>
	<url>
		<loc>https://securelist.com/beyond-black-friday-threat-report/83238/</loc>
	</url>
	<url>
		<loc>https://securelist.com/investigation-report-for-the-september-2014-equation-malware-detection-incident-in-the-us/83210/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ksb-threat-predictions-for-cryptocurrencies-in-2018/83188/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ksb-threat-predictions-for-financial-services-and-fraud-in-2018/83184/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ksb-threat-predictions-for-connected-health-in-2018/83182/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ksb-threat-predictions-for-automotive-in-2018/83179/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ksb-threat-predictions-for-2018/83169/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ksb-threat-predictions-for-industrial-security-in-2018/83186/</loc>
	</url>
	<url>
		<loc>https://securelist.com/apt-trends-report-q3-2017/83162/</loc>
	</url>
	<url>
		<loc>https://securelist.com/it-threat-evolution-q3-2017-statistics/83131/</loc>
	</url>
	<url>
		<loc>https://securelist.com/it-threat-evolution-q3-2017/83076/</loc>
	</url>
	<url>
		<loc>https://securelist.com/using-legitimate-tools-to-hide-malicious-code/83074/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ddos-attacks-in-q3-2017/83041/</loc>
	</url>
	<url>
		<loc>https://securelist.com/spam-and-phishing-in-q3-2017/82901/</loc>
	</url>
	<url>
		<loc>https://securelist.com/the-silence/83009/</loc>
	</url>
	<url>
		<loc>https://securelist.com/tales-from-the-blockchain/82971/</loc>
	</url>
	<url>
		<loc>https://securelist.com/gaza-cybergang-updated-2017-activity/82765/</loc>
	</url>
	<url>
		<loc>https://securelist.com/analyzing-an-exploit-for-%d1%81ve-2017-11826/82869/</loc>
	</url>
	<url>
		<loc>https://securelist.com/bad-rabbit-ransomware/82851/</loc>
	</url>
	<url>
		<loc>https://securelist.com/dangerous-liaisons/82803/</loc>
	</url>
	<url>
		<loc>https://securelist.com/atm-malware-is-being-sold-on-darknet-market/81871/</loc>
	</url>
	<url>
		<loc>https://securelist.com/blackoasis-apt-and-new-targeted-attacks-leveraging-zero-day-exploit/82732/</loc>
	</url>
	<url>
		<loc>https://securelist.com/atmii-a-small-but-effective-atm-robber/82707/</loc>
	</url>
	<url>
		<loc>https://securelist.com/the-festive-complexities-of-sigint-capable-threat-actors/82683/</loc>
	</url>
	<url>
		<loc>https://securelist.com/threat-landscape-for-industrial-automation-systems-in-h1-2017/82660/</loc>
	</url>
	<url>
		<loc>https://securelist.com/a-simple-example-of-a-complex-cyberattack/82636/</loc>
	</url>
	<url>
		<loc>https://securelist.com/a-modern-hypervisor-as-a-basis-for-a-sandbox/81902/</loc>
	</url>
	<url>
		<loc>https://securelist.com/an-undocumented-word-feature-abused-by-attackers/81899/</loc>
	</url>
	<url>
		<loc>https://securelist.com/connected-medicine-and-its-diagnosis/81857/</loc>
	</url>
	<url>
		<loc>https://securelist.com/miners-on-the-rise/81706/</loc>
	</url>
	<url>
		<loc>https://securelist.com/satoshi-bomb/81820/</loc>
	</url>
	<url>
		<loc>https://securelist.com/dissecting-the-chrome-extension-facebook-malware/81716/</loc>
	</url>
	<url>
		<loc>https://securelist.com/introducing-whitebear/81638/</loc>
	</url>
	<url>
		<loc>https://securelist.com/jimmy-nukebot-from-neutrino-with-love/81667/</loc>
	</url>
	<url>
		<loc>https://securelist.com/neutralization-reaction/81620/</loc>
	</url>
	<url>
		<loc>https://securelist.com/wap-billing-trojan-clickers-on-rise/81576/</loc>
	</url>
	<url>
		<loc>https://securelist.com/new-multi-platform-malwareadware-spreading-via-facebook-messenger/81590/</loc>
	</url>
	<url>
		<loc>https://securelist.com/spam-and-phishing-in-q2-2017/81537/</loc>
	</url>
	<url>
		<loc>https://securelist.com/booking-a-taxi-for-faketoken/81457/</loc>
	</url>
	<url>
		<loc>https://securelist.com/shadowpad-in-corporate-networks/81432/</loc>
	</url>
	<url>
		<loc>https://securelist.com/it-threat-evolution-q2-2017/79354/</loc>
	</url>
	<url>
		<loc>https://securelist.com/it-threat-evolution-q2-2017-statistics/79432/</loc>
	</url>
	<url>
		<loc>https://securelist.com/the-return-of-mamba-ransomware/79403/</loc>
	</url>
	<url>
		<loc>https://securelist.com/apt-trends-report-q2-2017/79332/</loc>
	</url>
	<url>
		<loc>https://securelist.com/steganography-in-contemporary-cyberattacks/79276/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ddos-attacks-in-q2-2017/79241/</loc>
	</url>
	<url>
		<loc>https://securelist.com/a-new-era-in-mobile-banking-trojans/79198/</loc>
	</url>
	<url>
		<loc>https://securelist.com/cowersnail-from-the-creators-of-sambacry/79087/</loc>
	</url>
	<url>
		<loc>https://securelist.com/spring-dragon-updated-activity/79067/</loc>
	</url>
	<url>
		<loc>https://securelist.com/a-kings-ransom-it-is-not/79057/</loc>
	</url>
	<url>
		<loc>https://securelist.com/the-nukebot-banking-trojan-from-rough-drafts-to-real-threats/78957/</loc>
	</url>
	<url>
		<loc>https://securelist.com/no-free-pass-for-expetr/79008/</loc>
	</url>
	<url>
		<loc>https://securelist.com/the-magala-trojan-clicker-a-hidden-advertising-threat/78920/</loc>
	</url>
	<url>
		<loc>https://securelist.com/bitscout-the-free-remote-digital-forensics-tool-builder/78991/</loc>
	</url>
	<url>
		<loc>https://securelist.com/in-expetrpetyas-shadow-fakecry-ransomware-wave-hits-ukraine/78973/</loc>
	</url>
	<url>
		<loc>https://securelist.com/from-blackenergy-to-expetr/78937/</loc>
	</url>
	<url>
		<loc>https://securelist.com/expetrpetyanotpetya-is-a-wiper-not-ransomware/78902/</loc>
	</url>
	<url>
		<loc>https://securelist.com/schroedingers-petya/78870/</loc>
	</url>
	<url>
		<loc>https://securelist.com/neutrino-modification-for-pos-terminals/78839/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ksn-report-ransomware-in-2016-2017/78824/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ztorg-from-rooting-to-sms/78775/</loc>
	</url>
	<url>
		<loc>https://securelist.com/honeypots-and-the-internet-of-things/78751/</loc>
	</url>
	<url>
		<loc>https://securelist.com/nigerian-phishing-industrial-companies-under-attack/78565/</loc>
	</url>
	<url>
		<loc>https://securelist.com/two-tickets-as-bait/78686/</loc>
	</url>
	<url>
		<loc>https://securelist.com/sambacry-is-coming/78674/</loc>
	</url>
	<url>
		<loc>https://securelist.com/dvmap-the-first-android-malware-with-code-injection/78648/</loc>
	</url>
	<url>
		<loc>https://securelist.com/50-hashes-per-hour/78588/</loc>
	</url>
	<url>
		<loc>https://securelist.com/what-interests-children-online/78622/</loc>
	</url>
	<url>
		<loc>https://securelist.com/wannacry-mistakes-that-can-help-you-restore-files-after-infection/78609/</loc>
	</url>
	<url>
		<loc>https://securelist.com/dridex-a-history-of-evolution/78531/</loc>
	</url>
	<url>
		<loc>https://securelist.com/it-threat-evolution-q1-2017-statistics/78475/</loc>
	</url>
	<url>
		<loc>https://securelist.com/it-threat-evolution-q1-2017/78452/</loc>
	</url>
	<url>
		<loc>https://securelist.com/wannacry-and-lazarus-group-the-missing-link/78431/</loc>
	</url>
	<url>
		<loc>https://securelist.com/wannacry-faq-what-you-need-to-know-today/78411/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ztorg-money-for-infecting-your-smartphone/78325/</loc>
	</url>
	<url>
		<loc>https://securelist.com/bsides-denver-2017/78375/</loc>
	</url>
	<url>
		<loc>https://securelist.com/wannacry-ransomware-used-in-widespread-attacks-all-over-the-world/78351/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ddos-attacks-in-q1-2017/78285/</loc>
	</url>
	<url>
		<loc>https://securelist.com/false-positives-why-vendors-should-lower-their-rates-and-how-we-achieved-the-best-results/78288/</loc>
	</url>
	<url>
		<loc>https://securelist.com/clash-of-greed/78271/</loc>
	</url>
	<url>
		<loc>https://securelist.com/spam-and-phishing-in-q1-2017/78221/</loc>
	</url>
	<url>
		<loc>https://securelist.com/use-of-dns-tunneling-for-cc-communications/78203/</loc>
	</url>
	<url>
		<loc>https://securelist.com/apt-trends-report-q1-2017/78169/</loc>
	</url>
	<url>
		<loc>https://securelist.com/hajime-the-mysterious-evolving-botnet/78160/</loc>
	</url>
	<url>
		<loc>https://securelist.com/xpan-i-am-your-father/78110/</loc>
	</url>
	<url>
		<loc>https://securelist.com/exploits-how-great-is-the-threat/78125/</loc>
	</url>
	<url>
		<loc>https://securelist.com/personalized-spam-and-phishing/78101/</loc>
	</url>
	<url>
		<loc>https://securelist.com/the-security-is-still-secure/78082/</loc>
	</url>
	<url>
		<loc>https://securelist.com/old-malware-tricks-to-bypass-detection-in-the-age-of-big-data/78010/</loc>
	</url>
	<url>
		<loc>https://securelist.com/unraveling-the-lamberts-toolkit/77990/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ransomware-in-targeted-attacks/77877/</loc>
	</url>
	<url>
		<loc>https://securelist.com/atmitch-remote-administration-of-atms/77918/</loc>
	</url>
	<url>
		<loc>https://securelist.com/lazarus-under-the-hood/77908/</loc>
	</url>
	<url>
		<loc>https://securelist.com/penquins-moonlit-maze/77883/</loc>
	</url>
	<url>
		<loc>https://securelist.com/the-mistakes-of-smart-medicine/77855/</loc>
	</url>
	<url>
		<loc>https://securelist.com/threat-landscape-for-industrial-automation-systems-h2-2016/77842/</loc>
	</url>
	<url>
		<loc>https://securelist.com/the-cost-of-launching-a-ddos-attack/77784/</loc>
	</url>
	<url>
		<loc>https://securelist.com/top-8-reasons-you-dont-want-to-miss-sas-2017/77813/</loc>
	</url>
	<url>
		<loc>https://securelist.com/petrwrap-the-new-petya-based-ransomware-used-in-targeted-attacks/77762/</loc>
	</url>
	<url>
		<loc>https://securelist.com/from-shamoon-to-stonedrill/77725/</loc>
	</url>
	<url>
		<loc>https://securelist.com/mobile-malware-evolution-2016/77681/</loc>
	</url>
	<url>
		<loc>https://securelist.com/how-security-products-are-tested-part-1/77698/</loc>
	</url>
	<url>
		<loc>https://securelist.com/financial-cyberthreats-in-2016/77623/</loc>
	</url>
	<url>
		<loc>https://securelist.com/newish-mirai-spreader-poses-new-risks/77621/</loc>
	</url>
	<url>
		<loc>https://securelist.com/kaspersky-security-bulletin-spam-and-phishing-in-2016/77483/</loc>
	</url>
	<url>
		<loc>https://securelist.com/dissecting-malware/77604/</loc>
	</url>
	<url>
		<loc>https://securelist.com/mobile-apps-and-stealing-a-connected-car/77576/</loc>
	</url>
	<url>
		<loc>https://securelist.com/breaking-the-weakest-link-of-the-strongest-chain/77562/</loc>
	</url>
	<url>
		<loc>https://securelist.com/a-look-into-the-russian-speaking-ransomware-ecosystem/77544/</loc>
	</url>
	<url>
		<loc>https://securelist.com/features-of-secure-os-realization/77469/</loc>
	</url>
	<url>
		<loc>https://securelist.com/fileless-attacks-against-enterprise-networks/77403/</loc>
	</url>
	<url>
		<loc>https://securelist.com/rocket-ai-and-the-next-generation-of-av-software/77454/</loc>
	</url>
	<url>
		<loc>https://securelist.com/kopiluwak-a-new-javascript-payload-from-turla/77429/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ddos-attacks-in-q4-2016/77412/</loc>
	</url>
	<url>
		<loc>https://securelist.com/how-to-succeed-in-online-investigations-and-digital-forensics/77394/</loc>
	</url>
	<url>
		<loc>https://securelist.com/expensive-free-apps/77083/</loc>
	</url>
	<url>
		<loc>https://securelist.com/machine-learning-versus-spam/77133/</loc>
	</url>
	<url>
		<loc>https://securelist.com/deceive-in-order-to-detect/76367/</loc>
	</url>
	<url>
		<loc>https://securelist.com/do-web-injections-exist-for-android/77118/</loc>
	</url>
	<url>
		<loc>https://securelist.com/the-eyepyramid-attacks/77098/</loc>
	</url>
	<url>
		<loc>https://securelist.com/holiday-2016-financial-cyberthreats-overview/77045/</loc>
	</url>
	<url>
		<loc>https://securelist.com/how-to-hunt-for-rare-malware/77040/</loc>
	</url>
	<url>
		<loc>https://securelist.com/update-from-the-chaos-33c3-in-hamburg/77014/</loc>
	</url>
	<url>
		<loc>https://securelist.com/one-stop-shop-server-steals-data-then-offers-it-for-sale/76986/</loc>
	</url>
	<url>
		<loc>https://securelist.com/switcher-android-joins-the-attack-the-router-club/76969/</loc>
	</url>
	<url>
		<loc>https://securelist.com/is-mirai-really-as-black-as-its-being-painted/76954/</loc>
	</url>
	<url>
		<loc>https://securelist.com/notes-from-hitcon-pacific-2016/76942/</loc>
	</url>
	<url>
		<loc>https://securelist.com/the-banker-that-encrypted-files/76913/</loc>
	</url>
	<url>
		<loc>https://securelist.com/kaspersky-security-bulletin-2016-executive-summary/76858/</loc>
	</url>
	<url>
		<loc>https://securelist.com/zcash-or-the-return-of-malicious-miners/76862/</loc>
	</url>
	<url>
		<loc>https://securelist.com/kaspersky-security-bulletin-2016-story-of-the-year/76757/</loc>
	</url>
	<url>
		<loc>https://securelist.com/new-wave-of-mirai-attacking-home-routers/76791/</loc>
	</url>
	<url>
		<loc>https://securelist.com/malicious-code-and-the-windows-integrity-mechanism/76751/</loc>
	</url>
	<url>
		<loc>https://securelist.com/caribbean-scuba-diving-with-it-security-in-mind/76742/</loc>
	</url>
	<url>
		<loc>https://securelist.com/research-on-unsecured-wi-fi-networks-across-the-world/76733/</loc>
	</url>
	<url>
		<loc>https://securelist.com/ddos-attack-on-the-russian-banks-what-the-traffic-data-showed/76728/</loc>
	</url>
	<url>
		<loc>https://securelist.com/inpage-zero-day-exploit-used-to-attack-financial-institutions-in-asia/76717/</loc>
	</url>
	<url>
		<loc>https://securelist.com/lost-in-translation-or-the-peculiarities-of-cybersecurity-tests/76696/</loc>
	</url>
	<url>
		<loc>https://securelist.com/kaspersky-security-bulletin-predictions-for-2017/76660/</loc>
	</url>
	<url>
		<loc>https://securelist.com/kaspersky-lab-black-friday-threat-overview-2016/76615/</loc>
	</url>
	<url>
		<loc>https://securelist.com/loop-of-confidence/76600/</loc>
	</url>
	<url>
		<loc>https://securelist.com/spam-and-phishing-in-q3-2016/76570/</loc>
	</url>
	<url>
		<loc>https://securelist.com/the-first-cryptor-to-exploit-telegram/76558/</loc>
	</url>
	<url>
		<loc>https://securelist.com/disassembling-a-mobile-trojan-attack/76286/</loc>
	</url>
	<url>
		<loc>https://securelist.com/it-threat-evolution-q3-2016-statistics/76513/</loc>
	</url>
	<url>
		<loc>https://securelist.com/it-threat-evolution-q3-2016/76482/</loc>
	</url>
	<url>
		<loc>https://securelist.com/kaspersky-ddos-intelligence-report-for-q3-2016/76464/</loc>
	</url>
	<url>
		<loc>https://securelist.com/inside-the-gootkit-cc-server/76433/</loc>
	</url>
	<url>
		<loc>https://securelist.com/the-notification-ransomware-lands-in-brazil/76416/</loc>
	</url>
	<url>
		<loc>https://securelist.com/windows-zero-day-exploit-used-in-targeted-attacks-by-fruityarmor-apt/76396/</loc>
	</url>
	<url>
		<loc>https://securelist.com/adult-video-for-facebook-users/76387/</loc>
	</url>
	<url>
		<loc>https://securelist.com/crypy-ransomware-behind-israeli-lines/76318/</loc>
	</url>
	<url>
		<loc>https://securelist.com/five-myths-about-machine-learning-in-cybersecurity/76351/</loc>
	</url>
	<url>
		<loc>https://securelist.com/trust-me-i-have-a-pen/76357/</loc>
	</url>
	<url>
		<loc>https://securelist.com/wave-your-false-flags/76273/</loc>
	</url>
	<url>
		<loc>https://securelist.com/on-the-strongpity-waterhole-attacks-targeting-italian-and-belgian-encryption-users/76147/</loc>
	</url>
	<url>
		<loc>https://securelist.com/polyglot-the-fake-ctb-locker/76182/</loc>
	</url>
	<url>
		<loc>https://securelist.com/teamxrat-brazilian-cybercrime-meets-ransomware/76153/</loc>
	</url>
	<url>
		<loc>https://securelist.com/future-attack-scenarios-against-atm-authentication-systems/76099/</loc>
	</url>
	<url>
		<loc>https://securelist.com/the-banker-that-can-steal-anything/76101/</loc>
	</url>
	<url>
		<loc>https://securelist.com/fooling-the-smart-city/76060/</loc>
	</url>
	<url>
		<loc>https://securelist.com/rooting-pokemons-in-google-play-store/76081/</loc>
	</url>
	<url>
		<loc>https://securelist.com/gugi-from-an-sms-trojan-to-a-mobile-banking-trojan/76023/</loc>
	</url>
	<url>
		<loc>https://securelist.com/a-malicious-pairing-of-cryptor-and-stealer/76039/</loc>
	</url>
	<url>
		<loc>https://securelist.com/the-missing-piece-sophisticated-os-x-backdoor-discovered/75990/</loc>
	</url>
	<url>
		<loc>https://securelist.com/banking-trojan-gugi-evolves-to-bypass-android-6-protection/75971/</loc>
	</url>
	<url>
		<loc>https://securelist.com/how-trojans-manipulate-google-play/75894/</loc>
	</url>
	<url>
		<loc>https://securelist.com/the-hunt-for-lurk/75944/</loc>
	</url>
	<url>
		<loc>https://securelist.com/wildfire-the-ransomware-threat-that-takes-holland-hostage/75842/</loc>
	</url>
	<url>
		<loc>https://securelist.com/threat-intelligence-report-for-the-telecommunications-industry/75846/</loc>
	</url>
	<url>
		<loc>https://securelist.com/brazilian-banking-trojans-meet-powershell/75831/</loc>
	</url>
	<url>
		<loc>https://securelist.com/spam-and-phishing-in-q2-2016/75764/</loc>
	</url>
</urlset>
<!-- Sitemap is served from cache -->
