<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://blog.netizen.net/2026/04/02/turning-zero-trust-policy-into-operational-reality-with-wazuh/</loc><lastmod>2026-04-02T21:32:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2026/03/30/netizen-monday-security-brief-3-30-2026/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2026/03/istock-2176382759.jpg</image:loc><image:title>Shocked Engineer In Automated Logistics Warehouse During Ransomware</image:title><image:caption>Shocked Engineer In Automated Logistics Warehouse During Ransomware Attack</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2026/03/istock-1132705098-1.jpg</image:loc><image:title>Camera lens and red backlight . Horizontal photography</image:title><image:caption>Camera lens and red backlight . Horizontal photography</image:caption></image:image><lastmod>2026-03-30T14:27:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2026/03/27/how-to-measure-detection-quality-in-a-federal-soc/</loc><lastmod>2026-03-27T15:23:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2026/03/26/dfars-252-204-7012-incident-reporting-and-socaas-readiness/</loc><lastmod>2026-03-26T18:59:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2026/03/24/trusted-internet-connections-tic-3-0-in-practice/</loc><lastmod>2026-03-24T15:45:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2026/03/23/netizen-monday-security-brief-3-23-2026/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2026/03/istock-2181359378-1.jpg</image:loc><image:title>Data breach ransomware screen malware cyber attack</image:title><image:caption>Data breach ransomware screen, malware cyber attack alert. Vector hacked internet system, danger sign features data breach text inside of rectangular frame, surrounded by red binary code patterns</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2026/03/istock-1221761167.jpg</image:loc><image:title>Man typing on keyboard with virus detected alert on hologram screen</image:title><image:caption>Virus detected alert. Camera moves around hud display and man typing keyboard. Cyber security breach warning with worm symbol on screen. System protection futuristic concept.</image:caption></image:image><lastmod>2026-03-23T17:31:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2026/03/19/what-cmmc-2-0-monitoring-looks-like-outside-of-assessment-windows/</loc><lastmod>2026-03-19T22:43:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2026/03/17/exchange-online-admin-abuse-what-to-watch-for/</loc><lastmod>2026-03-17T14:42:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2026/03/16/netizen-monday-security-brief-3-16-2026-2/</loc><lastmod>2026-03-16T14:11:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2026/03/13/socaas-for-organizations-without-a-ciso/</loc><lastmod>2026-03-13T16:48:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2026/03/12/iran-linked-group-claims-cyberattack-on-u-s-medical-technology-company-stryker/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2026/03/istock-1431325241.jpg</image:loc><image:title>Flag of Iran on binary code.</image:title><image:caption>Modern technology concept.</image:caption></image:image><lastmod>2026-03-12T15:51:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2026/03/10/microsoft-march-2026-patch-tuesday-fixes-79-flaws-including-two-publicly-disclosed-zero-days/</loc><lastmod>2026-03-10T18:46:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2026/03/09/netizen-monday-security-brief-3-9-2026/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2026/03/istock-2215718922.jpg</image:loc><image:title>Meta AI, ChatGPT and Gemini. Assorted AI app icons</image:title><image:caption>Shanghai,China-April 20th 2025: Meta AI, ChatGPT and Gemini. Assorted AI app icons</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2026/03/istock-1439140084.jpg</image:loc><image:title>Apple store munich</image:title><image:caption>Munich, Germany – September 19, 2019: Apple store in Munich Germany. Young teenager student people hippster buying latest modern design tech for university and school</image:caption></image:image><lastmod>2026-03-09T15:50:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2026/03/05/edr-integration-in-socaas-the-control-point-that-matters/</loc><lastmod>2026-03-05T21:24:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2026/03/03/conditional-access-vs-zero-trust-whats-the-difference/</loc><lastmod>2026-03-03T23:29:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2026/03/02/netizen-monday-security-brief-3-2-2026/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2026/03/istock-2187750231.jpg</image:loc><image:title>Googleplex headquarters building with colorful logo reflecting in glass facade</image:title><image:caption>Modern glass facade of googleplex headquarters building reflecting colorful logo on a sunny day with grass and trees in the foreground</image:caption></image:image><lastmod>2026-03-02T22:28:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2026/02/27/audit-log-retention-what-pci-dss-nist-hipaa-and-fedramp-expect/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2026/02/istock-2186748727.jpg</image:loc><image:title>Businesswoman using laptop, audit, documents and certification icons. Copy space</image:title><image:caption>Businesswoman typing in laptop, virtual hud screen with audit, office documents hologram and check mark. Concept of quality control, data analysis and certification. Copy space</image:caption></image:image><lastmod>2026-02-27T21:00:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2026/02/26/what-compliance-driven-detection-means-for-soc-engineering/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2026/02/istock-2164627202.jpg</image:loc><image:title>Work Safety and Compliance Concept, Safety First, A person with work safety and compliance icons, including a shield, hard hat, checklist, workplace safety, health protocols, and regulatory compliance</image:title><image:caption>Work Safety and Compliance Concept, Safety First, A person with work safety and compliance icons, including a shield, hard hat, checklist, workplace safety, health protocols, and regulatory compliance</image:caption></image:image><lastmod>2026-02-26T21:42:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2026/02/23/netizen-monday-security-brief-2-23-2026/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2026/02/istock-2224611026.jpg</image:loc><image:title>DevSecOps Software development cycle programming software development IT operation, man holding smartphone pointing at tech icon in agile methodology environment coder sysadmin working with system</image:title><image:caption>DevSecOps Software development cycle programming software development IT operation, man holding smartphone pointing at tech icon in agile methodology environment coder sysadmin working with system</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2026/02/istock-2151893327.jpg</image:loc><image:title>OpenAI ChatGPT, Anthropic Claude and Perplexity mobile APP icons on screen. Assorted AI chatbots</image:title><image:caption>Shanghai,China-May 6th 2024: OpenAI ChatGPT, Anthropic Claude and Perplexity mobile APP icons on screen. Assorted AI chatbots</image:caption></image:image><lastmod>2026-02-23T17:05:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2026/02/19/openclaw-agent-skills-and-the-expansion-of-the-software-supply-chain/</loc><lastmod>2026-02-19T21:10:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2026/02/17/what-soc-2-does-not-cover-and-why-organizations-assume-it-does/</loc><lastmod>2026-02-17T14:41:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2026/02/16/netizen-monday-security-brief-2-16-2026/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2026/02/istock-2172766673.jpg</image:loc><image:title>Malware attack virus alert. Person use smartphone with virtual warning sign with ransomware word. Warning notification, Cyber threats.</image:title><image:caption>Malware attack virus alert. Person use smartphone with virtual warning sign with ransomware word. Warning notification, Cyber threats.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2026/02/istock-1499492092.jpg</image:loc><image:title>AI growth Risk</image:title><image:caption>AI growth risk as Good Bots and a Bad Bot and chatbot as a social vulnerability for Robots gone rogue and the danger of robotic or artificial intelligence technology in a 3D illustration style.</image:caption></image:image><lastmod>2026-02-16T17:55:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2026/02/13/what-continuous-compliance-monitoring-actually-looks-like-in-a-live-soc/</loc><lastmod>2026-02-13T18:06:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2026/02/12/what-is-audit-ready-logging-and-why-most-environments-still-miss-it/</loc><lastmod>2026-02-12T21:07:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2026/02/10/microsoft-february-2026-patch-tuesday-fixes-58-flaws-six-actively-exploited-zero-days/</loc><lastmod>2026-02-10T19:50:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2026/02/09/netizen-monday-security-brief-2-9-2026/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2026/02/istock-94486878.jpg</image:loc><image:title>Scanning for computer virus</image:title><image:caption>Magnifying glass focusing on the word Virus on a screen full of alphanumerics</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2026/02/istock-1199334120.jpg</image:loc><image:title>SolarWinds logo in front of their office for Brno. SolarWinds is an american IT company specialized in Software development for network infrastructure.</image:title><image:caption>"n"nPicture of a sign with the logo of SolarWinds taken on their office in brno. SolarWinds is an American company that develops software for businesses to help manage their networks, systems, and information technology infrastructure. SolarWinds is headquartered in Austin, Texas, with sales and product development offices in a number of locations in the United States and several other countries around the world.</image:caption></image:image><lastmod>2026-02-09T15:25:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2026/02/05/why-inherited-controls-make-soc-as-a-service-the-practical-compliance-model/</loc><lastmod>2026-02-06T02:00:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2026/02/03/cve-2026-25253-one-click-rce-in-openclaw-via-token-leakage-and-websocket-abuse/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2026/02/istock-896769142.jpg</image:loc><image:title>Hand to operate laptop remotely. isolated.</image:title><image:caption>Hand to operate laptop remotely</image:caption></image:image><lastmod>2026-02-03T15:26:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2026/02/02/netizen-monday-security-brief-2-2-2026/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2026/02/istock-2172388197.jpg</image:loc><image:title>Glitching corrupted AI system hacked on red matrix background</image:title><image:caption>Glitching corrupted AI system hacked on red matrix background. Person with screen head symbolizing artificial intelligence rebel against human</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2026/02/istock-1218827343.jpg</image:loc><image:title>Digital java code text. Computer software coding vector concept. Programming coding script java, digital program code on screen illustration. Vector illustration.</image:title><image:caption>Digital java code text. Computer software coding vector concept. Programming coding script java, digital program code on screen illustration. Vector illustration</image:caption></image:image><lastmod>2026-02-02T21:49:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2026/01/30/human-context-protocol-an-integrity-first-security-architecture-for-trustworthy-ai-agents/</loc><lastmod>2026-01-30T17:02:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2026/01/29/researchers-find-widespread-exposure-of-internet-facing-llms/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2026/01/istock-2198619284.jpg</image:loc><image:title>user interface of AI chat bot large language model service LLM artificial intelligence in dark mode web browser page form to ask question</image:title><image:caption>user interface of AI chat bot large language model service LLM artificial intelligence in dark mode web browser page form to ask question vector</image:caption></image:image><lastmod>2026-01-29T21:22:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2026/01/26/netizen-monday-security-brief-1-26-2026/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2026/01/istock-2221014530.jpg</image:loc><image:title>The entrance to VMware office on 108th Ave NE in Bellevue, WA, United States.</image:title><image:caption>Bellevue, WA, United States - June 15, 2023: The entrance to VMware office on 108th Ave NE in Bellevue, WA, United States. 
VMware is an American cloud computing and virtualization technology company.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2026/01/istock-2151633407.jpg</image:loc><image:title>Threat, phishing, malicious, danger, hack, warning, mail, thief, scam, alert, safety, letter, technology, online, Cyber crime security concept, Alert Email inbox and spam virus with warning caution.</image:title><image:caption>Threat, phishing, malicious, danger, hack, warning, mail, thief, scam, alert, safety, letter, technology, online, Cyber crime security concept, Alert Email inbox and spam virus with warning caution.</image:caption></image:image><lastmod>2026-01-27T01:09:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2026/01/23/detection-engineering-is-no-longer-optional-for-modern-socs/</loc><lastmod>2026-01-23T19:27:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2026/01/22/using-soc-as-a-service-to-operationalize-cmmc-2-0-level-2-requirements/</loc><lastmod>2026-01-22T21:16:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2026/01/20/soc-as-a-service-as-a-standing-compliance-control/</loc><lastmod>2026-01-20T15:06:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2026/01/16/measuring-the-economic-impact-of-ai-driven-smart-contract-attacks/</loc><lastmod>2026-01-16T17:22:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2026/01/15/netizen-corporation-hosts-northampton-community-college-students-for-job-shadowing-week-at-allentown-headquarters/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2026/01/nccc1.png</image:loc><image:title>nccc1</image:title></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2026/01/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2026-01-15T20:44:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2026/01/13/microsoft-january-2026-patch-tuesday-fixes-114-flaws-three-zero-days/</loc><lastmod>2026-01-13T21:14:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2026/01/12/netizen-monday-security-brief-1-12-2026/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2026/01/istock-2168048376.jpg</image:loc><image:title>Cybersecurity warning alert system concept. Businessman working on laptop. Computer network hack, crime and virus, Malicious software, compromised information, illegal connection, data vulnerability,</image:title><image:caption>Cybersecurity warning alert system concept. Businessman working on laptop. Computer network hack, crime and virus, Malicious software, compromised information, illegal connection, data vulnerability,</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2026/01/istock-1132705098.jpg</image:loc><image:title>Camera lens and red backlight . Horizontal photography</image:title><image:caption>Camera lens and red backlight . Horizontal photography</image:caption></image:image><lastmod>2026-01-12T15:31:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2026/01/09/identity-risk-is-what-vulnerability-programs-still-fail-to-measure/</loc><lastmod>2026-01-09T20:34:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2026/01/08/the-risk-economics-of-soc-as-a-service/</loc><lastmod>2026-01-09T00:36:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2026/01/06/rethinking-enterprise-security-at-the-opening-of-2026-2/</loc><lastmod>2026-01-06T15:24:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2026/01/05/netizen-monday-security-brief-1-5-2026/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2026/01/istock-873960136.jpg</image:loc><image:title>Phishing scam, hacker attack and web security vector concept</image:title><image:caption>Phishing scam, hacker attack and web security vector concept. Illustration of phishing and fraud, online scam and steal</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2026/01/istock-2167797116-1.jpg</image:loc><image:title>phising crime data stealer thief internet threat safety passwords technology device design icon illustration</image:title><image:caption>phising crime data stealer thief internet threat safety passwords technology device design icon illustration vector</image:caption></image:image><lastmod>2026-01-05T20:01:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/12/31/ibm-confirms-critical-authentication-bypass-in-api-connect-cve-2025-13915/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/12/istock-1358108249.jpg</image:loc><image:title>Entrance of modern office tower at City of Zürich.</image:title><image:caption>Logo of American company IBM at the entrance of office building at Zürich Altstetten at City of Zürich. Photo taken December 7th, 2021, Zurich, Switzerland.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/12/775968ff2cc3f05fe4fb992334911bfd.jpg</image:loc><image:title>775968ff2cc3f05fe4fb992334911bfd</image:title></image:image><lastmod>2025-12-31T16:49:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/12/30/netizen-cybersecurity-bulletin-december-30th-2025/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/12/90f8a89c-172c-4f6b-9395-e1fb20b1ebe0.jpg</image:loc><image:title>90f8a89c-172c-4f6b-9395-e1fb20b1ebe0</image:title></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/12/istock-2181359378.jpg</image:loc><image:title>Data breach ransomware screen malware cyber attack</image:title><image:caption>Data breach ransomware screen, malware cyber attack alert. Vector hacked internet system, danger sign features data breach text inside of rectangular frame, surrounded by red binary code patterns</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/12/istock-2207912371.jpg</image:loc><image:title>Error detection and troubleshooting of system development or coding. Event logging for system monitoring and debugging. System engineer troubleshooting computer network system issues.</image:title><image:caption>Error detection and troubleshooting of system development or coding. Event logging for system monitoring and debugging. System engineer troubleshooting computer network system issues.</image:caption></image:image><lastmod>2025-12-30T16:49:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/12/29/netizen-monday-security-brief-12-29-2025/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/12/istock-995439834.jpg</image:loc><image:title>silhouette of virtual human and programming technology</image:title><image:caption>silhouette of virtual human and nebula cosmos 3d illustration  , represent scientific concept of brain 
creativity and artificial intelligence.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/12/istock-1157051255.jpg</image:loc><image:title>MongoDB office in Silicon Valley</image:title><image:caption>Palo Alto, California, USA - June 19, 2019: MongoDB office in Silicon Valley. MongoDB, headquartered in New York, develops and provides commercial support for the open source database MongoDB</image:caption></image:image><lastmod>2025-12-29T18:32:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/12/26/netizen-december-2025-vulnerability-review/</loc><lastmod>2025-12-26T14:48:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/12/25/old-fortios-ssl-vpn-2fa-bypass-under-active-exploitation-cve-2020-12812/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/12/istock-1989487943.jpg</image:loc><image:title>Fortinet headquarters in Sunnyvale, California, USA</image:title><image:caption>Fortinet headquarters in Sunnyvale, California, USA on June 10, 2023. Fortinet is an American cybersecurity company.</image:caption></image:image><lastmod>2025-12-26T01:14:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/12/24/defending-against-react2shell-cve-2025-55182/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/12/istock-2169204756.jpg</image:loc><image:title>System engineer identifying problem in computer network system.</image:title><image:caption>Red triangle with exclamation mark and many other checkmark icons. Hand holding magnifying glass.</image:caption></image:image><lastmod>2025-12-24T20:53:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/12/23/what-smbs-miss-when-they-rely-only-on-automated-security-tools/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/12/istock-2220733208.jpg</image:loc><image:title>Big Data Analytics Abstract Visualization</image:title><image:caption>Abstract 3D digital grid with dynamic data lines and glowing dots, representing big data processing, analytics, machine learning, and futuristic technology visualization.</image:caption></image:image><lastmod>2025-12-24T03:27:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/09/29/netizen-monday-security-brief-9-29-2025/</loc><lastmod>2025-12-22T17:35:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/10/13/netizen-monday-security-brief-10-13-2025/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/10/istock-1312190811-1.jpg</image:loc><image:title>SonicWall headquarters in Silicon Valley</image:title><image:caption>Sep 24, 2020 Milpitas / CA / USA - SonicWall headquarters in Silicon Valley; SonicWALL Inc manufactures network security and data protection products</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/10/istock-2188052792.jpg</image:loc><image:title>Oracle offices in Silicon Valley, Redwood City, California, CA, USA.</image:title><image:caption>Redwood City, California, CA, USA - June 8, 2023: Oracle offices in Silicon Valley, Redwood City, California, CA, USA. Oracle Corporation is an American multinational computer technology corporation.</image:caption></image:image><lastmod>2025-12-22T17:35:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/10/20/netizen-monday-security-brief-10-20-2025/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/10/istock-1767065519.jpg</image:loc><image:title>Assorted cloud computing platforms app icons</image:title><image:caption>Shanghai,China-Oct.31st 2023: Assorted cloud computing platforms app icons. Amazon Web Services (AWS), Microsoft Azure, Google cloud, Alibaba cloud, Baidu AI Cloud, VMware, ctyun, HUAWEI cloud, Tencent cloud</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/10/istock-2168048376.jpg</image:loc><image:title>Cybersecurity warning alert system concept. Businessman working on laptop. Computer network hack, crime and virus, Malicious software, compromised information, illegal connection, data vulnerability,</image:title><image:caption>Cybersecurity warning alert system concept. Businessman working on laptop. Computer network hack, crime and virus, Malicious software, compromised information, illegal connection, data vulnerability,</image:caption></image:image><lastmod>2025-12-22T17:35:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/10/27/netizen-monday-security-brief-10-27-2025/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/10/istock-2179992194-2.jpg</image:loc><image:title>ZERO-DAY text and binary code,A zero-day vulnerability is a flaw in software or hardware.</image:title><image:caption>ZERO-DAY text and binary code concept from the desktop computer screen,ZERO-DAY vulnerability concept (also known as a 0-day)A zero-day vulnerability is a flaw in software or hardware.</image:caption></image:image><lastmod>2025-12-22T17:34:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/11/03/netizen-monday-security-brief-11-3-2025/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/11/istock-1766257164-1.jpg</image:loc><image:title>Productivity Apps - ChatGPT and others</image:title><image:caption>Portland, OR, USA - May 19, 2023: Assorted productivity apps are seen on an iPhone, including ChatGPT, Microsoft 365, Slack, Google, Teams, Trello, Dropbox, Google Drive, and Zoom.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/11/istock-2199074265.jpg</image:loc><image:title>Port of Barcelona</image:title><image:caption>Aerial view of shipping containers and cargo ships in the sea port of Barcelona in Spain, Europe. Concept of sea and maritime trade and trade war due to tariffs. Commercial hub</image:caption></image:image><lastmod>2025-12-22T17:34:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/11/10/netizen-monday-security-brief-11-10-2025/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/11/istock-1413855189.jpg</image:loc><image:title>Chat bot  service concept. Virtual assistant and CRM software automation technology. Customer using online service with chat bot to get support.</image:title><image:caption>Chat bot  service concept. Virtual assistant and CRM software automation technology. Customer using online service with chat bot to get support</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/11/istock-1893568150.jpg</image:loc><image:title>Laptop on white bed in the bedroom.</image:title><image:caption>Laptop on white bed in the bedroom. Lifestyle Concept.</image:caption></image:image><lastmod>2025-12-22T17:34:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/11/17/netizen-monday-security-brief-11-17-2025/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/11/istock-1166812499-1.jpg</image:loc><image:title>CISCO IoT Cloud business unit offices</image:title><image:caption>August 7, 2019 Santa Clara / CA / USA - CISCO IoT Cloud business unit (formerly Jasper Technologies, Inc) offices in Silicon Valley;</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/11/istock-2151893327.jpg</image:loc><image:title>OpenAI ChatGPT, Anthropic Claude and Perplexity mobile APP icons on screen. Assorted AI chatbots</image:title><image:caption>Shanghai,China-May 6th 2024: OpenAI ChatGPT, Anthropic Claude and Perplexity mobile APP icons on screen. Assorted AI chatbots</image:caption></image:image><lastmod>2025-12-22T17:34:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/11/24/netizen-monday-security-brief-11-24-2025/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/11/istock-1392048498.jpg</image:loc><image:title>The entrance to Salesforce office building in Dallas, Texas, USA.</image:title><image:caption>Dallas, Texas, USA - March 20, 2022: The entrance to Salesforce office building in Dallas, Texas, USA. Salesforce, Inc. is an American cloud-based software company.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/11/istock-1423651834-1.jpg</image:loc><image:title>Modern flat design of 7-ZIP archive file icon for web</image:title><image:caption>Modern flat design of 7-ZIP archive file icon for web. Simple style</image:caption></image:image><lastmod>2025-12-22T17:34:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/12/01/netizen-monday-security-brief-12-1-2025/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/12/istock-684298924.jpg</image:loc><image:title>North Korea ransumware</image:title><image:caption>Ransomware, which put the world at risk, found the same code as malicious code used by North Korea.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/12/istock-2229556491.jpg</image:loc><image:title>Red alert sign with text system hacked on programming code screen, concept of cyber attack, hacking, data breach, malware, ransomware, and online security threat in modern digital technology.</image:title><image:caption>Red alert sign with text system hacked on programming code screen, concept of cyber attack, hacking, data breach, malware, ransomware, and online security threat in modern digital technology.</image:caption></image:image><lastmod>2025-12-22T17:33:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/12/08/netizen-monday-security-brief-12-8-2025/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/12/istock-2214697573.jpg</image:loc><image:title>Censored face on laptop screen against red background, concept of privacy, identity protection, and digital anonymity.</image:title><image:caption>Censored face on laptop screen against red background, concept of privacy, identity protection, and digital anonymity.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/12/istock-1394351672-1-2.jpg</image:loc><image:title>Cyber security concept. Electronic components and communication network.</image:title><image:caption>Cyber security concept. Electronic components and communication network.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/12/istock-1394351672-1-1.jpg</image:loc><image:title>Cyber security concept. Electronic components and communication network.</image:title><image:caption>Cyber security concept. Electronic components and communication network.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/12/istock-1394351672-1.jpg</image:loc><image:title>Cyber security concept. Electronic components and communication network.</image:title><image:caption>Cyber security concept. Electronic components and communication network.</image:caption></image:image><lastmod>2025-12-22T17:33:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/12/15/netizen-monday-security-brief-12-15-2024/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/12/istock-2171536298-1.jpg</image:loc><image:title>Bug Testing Concept and TJ process with error detection. Software quality assurance with coding issues Debugging with AI. Code review automation testing. Software development, debugging and control.</image:title><image:caption>Bug Testing Concept and TJ process with error detection. Software quality assurance with coding issues Debugging with AI. Code review automation testing. Software development, debugging and control.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/12/istock-507473994-1.jpg</image:loc><image:title>Computer crime concept</image:title><image:caption>Hacker using laptop. Lots of digits on the computer screen.</image:caption></image:image><lastmod>2025-12-22T17:31:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/12/22/netizen-monday-security-brief-12-22-2025/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/12/istock-2226337868.jpg</image:loc><image:title>fitness, health, gym trendy icons on circles</image:title><image:caption>Key exchange line icon for web</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/12/istock-2194476573.jpg</image:loc><image:title>Email security, spam virus alert in email, businessman using smartphone to access email protected.</image:title><image:caption>Email security, spam virus alert in email, businessman using smartphone to access email protected virtual screen, internet communication and network security.</image:caption></image:image><lastmod>2025-12-22T17:30:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/12/18/security-as-a-service-and-the-problem-of-fragmented-tooling-2/</loc><lastmod>2025-12-18T21:37:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/12/17/why-cbp-is-treating-quantum-threats-as-a-present-day-national-security-risk/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/12/istock-1443071845-1.jpg</image:loc><image:title>Post Quantum Cryptography and Quantum Resistant Cryptography - PQC - Conceptual Illustration</image:title><image:caption>Post Quantum Cryptography and Quantum Resistant Cryptography - PQC - New Cryptographic Algorithms That Are Secure Against Quantum Computers - Conceptual Illustration</image:caption></image:image><lastmod>2025-12-17T20:29:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/12/16/what-is-a-rootkit/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/12/istock-1376558406.jpg</image:loc><image:title>Microchip concept. CPU. Firmware for microcontrollers. Microchips on a circuit board. 3D render</image:title><image:caption>Microchip concept. CPU. Firmware for microcontrollers. Microchips on a circuit board. 3D render</image:caption></image:image><lastmod>2025-12-16T14:46:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/12/12/abusing-shared-drives-for-quiet-lateral-movement/</loc><lastmod>2025-12-13T00:15:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/12/11/how-soc-as-a-service-fits-into-zero-trust/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/12/istock-2220675894.jpg</image:loc><image:title>Data Privacy and Cybersecurity concept illustration Future technology security and integrity of information and personal data</image:title><image:caption>Data Privacy and Cybersecurity concept illustration Future technology security and integrity of information and personal data</image:caption></image:image><lastmod>2025-12-11T14:49:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/12/10/netizen-awarded-spot-on-new-10-year-151b-missile-defense-agency-shield-contract/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/12/netizen_banner_cybersecure_xsmall.png</image:loc><image:title>netizen_banner_cybersecure_xsmall</image:title></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/12/mda_logo.jpg</image:loc><image:title>mda_logo</image:title></image:image><lastmod>2025-12-10T21:16:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/12/09/microsoft-december-2025-patch-tuesday-fixes-57-flaws-including-three-zero-days/</loc><lastmod>2025-12-09T19:09:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/12/05/chinese-threat-groups-move-fast-on-newly-disclosed-react2shell-vulnerability/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/12/istock-2065726101-1.jpg</image:loc><image:title>Hacking, Cyber Warfare, Cyber Attack, Cyber Crime</image:title><image:caption>A hacker infiltrates a remote network on a laptop</image:caption></image:image><lastmod>2025-12-05T19:25:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/12/03/inside-lazarus-groups-remote-worker-scheme-researchers-capture-the-operation-live/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/12/istock-803270840-1.jpg</image:loc><image:title>Binary code with North Korea flag, data protection concept</image:title><image:caption>Data protection, binary code with North Korea flag</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/12/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-12-03T16:05:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/12/02/building-incident-readiness-with-soc-as-a-service/</loc><lastmod>2025-12-02T23:59:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/11/28/netizen-cybersecurity-bulletin-november-28th-2025/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/11/istock-1499492092-1.jpg</image:loc><image:title>AI growth Risk</image:title><image:caption>AI growth risk as Good Bots and a Bad Bot and chatbot as a social vulnerability for Robots gone rogue and the danger of robotic or artificial intelligence technology in a 3D illustration style.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/11/istock-1206779056-1.jpg</image:loc><image:title>flag of North Korea on laptop</image:title><image:caption>flag of North Korea , computer, laptop on table and dark background</image:caption></image:image><lastmod>2025-11-28T17:57:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/11/26/prompt-injections-and-the-expanding-attack-surface-of-agent-enabled-browsers/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/11/istock-2233579000.jpg</image:loc><image:title>AI Search Engine Technology Concept. Person using laptop with AI-powered search bar interface and digital icon representing chatbot, neural network, cloud computing, big data, global search technology</image:title><image:caption>AI Search Engine Technology Concept. Person using laptop with AI-powered search bar interface and digital icon representing chatbot, neural network, cloud computing, big data, global search technology</image:caption></image:image><lastmod>2025-11-26T18:46:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/11/25/the-second-coming-shai-hulud-returns-to-npm/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/11/istock-483445382.jpg</image:loc><image:title>Desert lord</image:title><image:caption>Desert monster</image:caption></image:image><lastmod>2025-11-25T16:32:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/11/21/cloudflare-explains-its-most-significant-outage-since-2019/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/11/istock-1186369127.jpg</image:loc><image:title>Exterior view of Cloudflare headquarters, San Francisco</image:title><image:caption>Nov 2, 2019 San Francisco / CA / USA -  Exterior view of Cloudflare headquarters; Cloudflare, Inc. is an Ameircan web infrastructure and website security company</image:caption></image:image><lastmod>2025-11-21T20:52:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/11/20/the-liability-audit-risk-of-ai-generated-code-in-devops-pipelines/</loc><lastmod>2025-11-20T21:29:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/11/19/reciprocity-and-leveraging-other-compliance-programs-in-cmmc-2-0/</loc><lastmod>2025-11-19T16:30:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/11/18/the-passwordless-future-will-be-more-human-than-you-think/</loc><lastmod>2025-11-18T14:56:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/11/13/dns-security-the-forgotten-first-layer-of-defense/</loc><lastmod>2025-11-13T14:56:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/11/11/the-death-of-the-static-ioc-why-detection-must-shift-toward-intent/</loc><lastmod>2025-11-11T16:41:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/11/07/continuous-threat-exposure-management-ctem-the-next-evolution-for-grc/</loc><lastmod>2025-11-07T18:25:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/11/06/how-to-isolate-cui-and-fci-in-mixed-environments-under-cmmc/</loc><lastmod>2025-11-06T20:38:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/11/05/patch-lag-the-silent-threat-in-enterprise-security/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/11/istock-2187672907.jpg</image:loc><image:title>Update software application upgrade technology concept. Software update or Operating system, patch update, updating progress bar, Install app patch, new version, Improved security, program downloading</image:title><image:caption>Update software application upgrade technology concept. Software update or Operating system, patch update, updating progress bar, Install app patch, new version, Improved security, program downloading</image:caption></image:image><lastmod>2025-11-05T15:59:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/11/04/threat-intelligence-sharing-trust-frameworks-post-cisa-expiry/</loc><lastmod>2025-11-04T21:46:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/10/31/netizen-october-2025-vulnerability-review/</loc><lastmod>2025-10-31T16:51:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/10/30/netizen-cybersecurity-bulletin-october-30th-2025/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/10/istock-2191796691-1.jpg</image:loc><image:title>VMware office in Bellevue, Washington, USA</image:title><image:caption>VMware office in Bellevue, Washington, USA - June 15, 2023. VMware, Inc. is an American cloud computing and virtualization technology company.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/10/istock-497298355.jpg</image:loc><image:title>YouTube application on Apple iPhone 5S</image:title><image:caption>Kiev, Ukraine - June 5, 2014: Brand new Apple iPhone 5S with YouTube application service on the screen lying on a desk with headphones. YouTube is the world's most popular online video-sharing website that founded in February 14, 2005</image:caption></image:image><lastmod>2025-10-30T22:34:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/10/29/aisuru-botnet-shifts-from-ddos-to-residential-proxies/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/10/istock-2188153172-1.jpg</image:loc><image:title>Botnet icon, malware in computer network or bot attack vector</image:title><image:caption>Botnet icon, malware in computer network or bot attack vector</image:caption></image:image><lastmod>2025-10-29T14:48:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/10/24/why-smbs-cant-afford-to-ignore-the-growing-threat-of-initial-access-brokers/</loc><lastmod>2025-10-24T20:51:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/10/23/why-snmpv1-and-v2c-put-your-network-at-risk-and-why-you-should-upgrade/</loc><lastmod>2025-10-23T19:57:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/10/22/building-strong-compliance-management-systems-with-iso-37301/</loc><lastmod>2025-10-22T15:28:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/10/21/turning-human-error-into-human-defense/</loc><lastmod>2025-10-21T13:35:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/10/17/understanding-iso-20000-1-the-standard-for-it-service-management/</loc><lastmod>2025-10-17T19:18:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/10/16/tiktoks-u-s-deal-less-data-in-beijing-same-risks-for-enterprises/</loc><lastmod>2025-10-16T19:32:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/10/15/preparing-for-november-10th-what-businesses-need-to-do-now-for-cmmc-2-0-2/</loc><lastmod>2025-10-15T14:55:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/10/14/october-2025-patch-tuesday-microsoft-addresses-six-zero-days-and-ends-windows-10-support/</loc><lastmod>2025-10-14T18:14:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/10/10/total-identity-compromise-microsofts-lessons-on-securing-active-directory/</loc><lastmod>2025-10-10T16:58:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/10/09/pci-dss-4-0-1-what-businesses-need-to-know-now/</loc><lastmod>2025-10-09T18:14:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/10/08/why-cybersecurity-is-moving-toward-the-as-a-service-model/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/10/istock-2198938705.jpg</image:loc><image:title>Waves of digital information concept - Data flow background. 3d illustration</image:title><image:caption>Waves of digital information concept - Data flow background. 3d illustration</image:caption></image:image><lastmod>2025-10-08T15:33:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/10/07/oracle-rushes-emergency-patch-for-cve-2025-61882-following-cl0p-exploitation-2/</loc><lastmod>2025-10-07T13:38:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/10/01/building-a-culture-of-cybersecurity-the-real-goal-of-awareness-month/</loc><lastmod>2025-10-01T14:55:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/09/30/introducing-the-cybersecurity-risk-management-construct-csrmc-2/</loc><lastmod>2025-09-30T14:01:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/09/26/netizen-september-2025-vulnerability-review/</loc><lastmod>2025-09-26T15:04:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/09/25/netizen-cybersecurity-bulletin-september-25th-2025-2/</loc><lastmod>2025-09-25T14:01:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/09/22/netizen-monday-security-brief-9-22-2024/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/09/istock-1373181215.jpg</image:loc><image:title>Cloud-based Cybersecurity Solutions Concept - Endpoint Protection - 3D Illustration</image:title><image:caption>Cloud-based Cybersecurity Solutions Concept - Endpoint Protection - Devices Protected Within a Digital Network - 3D Illustration</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/09/istock-2169418565.jpg</image:loc><image:title>VPN, Virtual Private Network encryption connection concept. Businessman working on laptop, surrounded by digital security icons VPN shield, server, padlock, online security, and data protection.</image:title><image:caption>VPN, Virtual Private Network encryption connection concept. Businessman working on laptop, surrounded by digital security icons VPN shield, server, padlock, online security, and data protection.</image:caption></image:image><lastmod>2025-09-22T19:58:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/09/19/why-every-small-business-should-care-about-cmmc-2-0/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/09/istock-104684801.jpg</image:loc><image:title>The Pentagon</image:title><image:caption>Aerial of the Pentagon, the Department of Defense headquarters in Arlington, Virginia, near Washington DC, with I-395 freeway on the left, and the Air Force Memorial up middle.</image:caption></image:image><lastmod>2025-09-19T18:20:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/09/18/lessons-learned-from-the-largest-software-supply-chain-incidents/</loc><lastmod>2025-09-18T18:46:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/09/18/netizen-earns-2025-excellence-in-internships-award-from-northampton-community-college-ncc/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/09/asset-1.png</image:loc><image:title>Asset 1</image:title></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/09/ncc_award.jpg</image:loc><image:title>ncc_award</image:title></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/09/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-18T15:23:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/09/17/cybersecurity-risks-of-ai-generated-code-what-you-need-to-know/</loc><lastmod>2025-09-17T22:19:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/09/16/shinyhunters-evolution-of-a-data-theft-syndicate/</loc><lastmod>2025-09-16T13:27:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/09/15/netizen-monday-security-brief-9-15-2024/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/09/istock-1223906528.jpg</image:loc><image:title>Salesforce New York City</image:title><image:caption>New York, New York, USA - May 30, 2018: Signage on the Salesforce Tower at 6th Avenue.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/09/istock-1297448481-1.jpg</image:loc><image:title>Virtual creative lock sketch with chip hologram on Chinese flag and sunset sky background, protection of personal data concept. Multiexposure</image:title><image:caption>Virtual creative lock sketch with chip hologram on Chinese flag and sunset sky background, protection of personal data concept. Multiexposure</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/09/istock-1297448481.jpg</image:loc><image:title>Virtual creative lock sketch with chip hologram on Chinese flag and sunset sky background, protection of personal data concept. Multiexposure</image:title><image:caption>Virtual creative lock sketch with chip hologram on Chinese flag and sunset sky background, protection of personal data concept. Multiexposure</image:caption></image:image><lastmod>2025-09-15T14:41:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/09/12/understanding-your-cui-boundary-for-cmmc-compliance/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/09/istock-1357020474.jpg</image:loc><image:title>Quality management with QA (assurance), QC (control) and improvement. Standardisation and certification concept. Compliance to regulations and standards. Manager or auditor working on computer.</image:title><image:caption>Quality management with QA (assurance), QC (control) and improvement. Standardisation and certification concept. Compliance to regulations and standards. Manager or auditor working on computer.</image:caption></image:image><lastmod>2025-09-12T16:58:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/09/11/the-history-of-cmmc/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/09/istock-1736038018-2.jpg</image:loc><image:title>Aerial view of the US Department of Defense and Arlington Cemetery under the wing.</image:title><image:caption>The Pentagon</image:caption></image:image><lastmod>2025-09-11T15:56:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/09/10/hidden-prompts-in-images-threaten-gemini-vertex-ai-and-other-platforms/</loc><lastmod>2025-09-10T13:56:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/09/09/microsoft-september-2025-patch-tuesday-fixes-81-flaws-two-publicly-disclosed-zero-days/</loc><lastmod>2025-09-09T18:23:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/09/08/netizen-monday-security-brief-9-8-2024/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/09/istock-1979406539-1.jpg</image:loc><image:title>Hacking attack in Progress, Computer Alert Message, System Breach</image:title><image:caption>Warning message,Computer notification on screen</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/09/istock-1482207032-1.jpg</image:loc><image:title>Robot Hand Warning Sign</image:title><image:caption>The AI monitors the security of the system. 3d illustration.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/09/istock-1482207032.jpg</image:loc><image:title>Robot Hand Warning Sign</image:title><image:caption>The AI monitors the security of the system. 3d illustration.</image:caption></image:image><lastmod>2025-09-08T14:52:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/09/03/what-is-iso-27001-and-how-can-it-benefit-your-organization/</loc><lastmod>2025-09-03T17:33:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/09/02/clickfix-attack-uses-ai-summaries-to-spread-malware-2/</loc><lastmod>2025-09-02T15:16:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/08/29/netizen-august-2025-vulnerability-review/</loc><lastmod>2025-08-29T18:45:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/08/28/netizen-cybersecurity-bulletin-august-28th-2025/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/08/istock-2022689293-1.jpg</image:loc><image:title>RANSOMWARE digital text, word, data security threat. Ransomware concept, banner. 3D render</image:title><image:caption>RANSOMWARE digital text, word, data security threat. Ransomware concept, banner. 3D render</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/08/image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/08/istock-1182574883-1.jpg</image:loc><image:title>Citrix offices in Silicon Valley</image:title><image:caption>Oct 15, 2019 Santa Clara / CA / USA - Citrix offices in Silicon Valley; Citrix Systems, Inc. is an American software company that provides virtualization, networking, SaaS and cloud computing services</image:caption></image:image><lastmod>2025-08-28T20:21:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/08/26/why-small-businesses-are-prime-targets-for-ransomware-and-how-to-avoid-becoming-one/</loc><lastmod>2025-08-26T14:08:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/08/25/netizen-monday-security-brief-8-25-2024-2/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/08/istock-841033632.jpg</image:loc><image:title>Server administration. Analysis of authentication log files in an operating system</image:title><image:caption>Analysis of authentication log files in an operating system. Ssh connection through a terminal to test intrusion in an operating system</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/08/istock-2171536298.jpg</image:loc><image:title>Bug Testing Concept and TJ process with error detection. Software quality assurance with coding issues Debugging with AI. Code review automation testing. Software development, debugging and control.</image:title><image:caption>Bug Testing Concept and TJ process with error detection. Software quality assurance with coding issues Debugging with AI. Code review automation testing. Software development, debugging and control.</image:caption></image:image><lastmod>2025-08-25T20:45:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/08/22/why-security-culture-is-critical-to-reducing-cyber-risk/</loc><lastmod>2025-08-22T19:32:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/08/21/scattered-spider-hacker-king-bob-gets-10-years-in-prison/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/08/istock-2164896547.jpg</image:loc><image:title>Cyber security concept. Man using computer with system hacked alert due to cyber attack on computer network. Data Protection. Internet virus cyber security and cybercrime</image:title><image:caption>Cyber security concept. Man using computer with system hacked alert due to cyber attack on computer network. Data Protection. Internet virus cyber security and cybercrime</image:caption></image:image><lastmod>2025-08-21T17:56:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/08/20/the-value-of-a-vciso-fractional-security-leadership-full-time-peace-of-mind/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/08/istock-1983429400.jpg</image:loc><image:title>Businessman touching standard quality control certification assurance guarantee for automation process. Quality management with Quality Assurance, Quality Control, Standardization, health insurance,</image:title><image:caption>Businessman touching standard quality control certification assurance guarantee for automation process. Quality management with Quality Assurance, Quality Control, Standardization, health insurance,</image:caption></image:image><lastmod>2025-08-20T19:08:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/08/15/what-are-human-digital-twins-in-cybersecurity/</loc><lastmod>2025-08-19T18:33:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/08/19/understanding-zero-trust-network-access-ztna-for-modern-security-2/</loc><lastmod>2025-08-19T15:23:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/08/18/netizen-monday-security-brief-8-18-2024/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/08/istock-2102549942-1.jpg</image:loc><image:title>Crypto Wallet icon with Bitcoin made with binary code. Digital Cryptocurrency wallet. Mobile banking, online finance, blockchain banner. Binary code background with digits 1.0. Vector Illustration.</image:title><image:caption>Crypto Wallet icon with Bitcoin made with binary code. Digital Cryptocurrency wallet. Mobile banking, online finance, blockchain banner. Binary code background with digits 1.0. Vector Illustration</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/08/istock-2111473301-1.jpg</image:loc><image:title>A person is typing on a laptop with the word Ddos on the screen</image:title><image:caption>A person is typing on a laptop with the word Ddos on the screen. Concept of urgency and importance, as the person is likely working on a critical task or project</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/08/istock-2111473301.jpg</image:loc><image:title>A person is typing on a laptop with the word Ddos on the screen</image:title><image:caption>A person is typing on a laptop with the word Ddos on the screen. Concept of urgency and importance, as the person is likely working on a critical task or project</image:caption></image:image><lastmod>2025-08-18T20:02:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/08/14/why-every-smb-needs-a-data-retention-and-deletion-policy/</loc><lastmod>2025-08-14T13:58:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/08/13/why-federal-cybersecurity-needs-a-zero-trust-model/</loc><lastmod>2025-08-13T13:26:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/08/12/microsoft-august-2025-patch-tuesday-fixes-107-flaws-publicly-disclosed-kerberos-zero-day/</loc><lastmod>2025-08-12T18:09:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/08/12/netizen-earns-a-spot-on-the-inc-5000-list-of-the-nations-most-successful-businesses-for-a-third-time/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/08/netizen_banner_cybersecure_xsmall.png</image:loc><image:title>netizen_banner_cybersecure_xsmall</image:title></image:image><lastmod>2025-08-12T14:21:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/08/11/netizen-monday-security-brief-8-11-2024/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/08/istock-1835205195.jpg</image:loc><image:title>Microsoft name on the french office building in Issy les Moulineaux near Paris, France</image:title><image:caption>Issy-les-Moulineaux, France - September 09, 2023 : Microsoft name on the french office building in Issy les Moulineaux near Paris, France</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/08/istock-1072021148.jpg</image:loc><image:title>Laptop with envelope and ZIP file. Notebook and email with file attachment ZIP document. Vector illustration.</image:title><image:caption>Laptop with envelope and ZIP file. Notebook and email with file attachment ZIP document. Vector stock illustration.</image:caption></image:image><lastmod>2025-08-11T15:03:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/08/08/new-edr-killer-tool-circulating-among-eight-ransomware-groups/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/08/istock-2207175568.jpg</image:loc><image:title>hundred digital light global map and bold ransomware text. concept hacker use ransomware to encryption data system or financial</image:title><image:caption>hundred digital light global map and bold ransomware text. concept hacker use ransomware to encryption data system or financial</image:caption></image:image><lastmod>2025-08-08T16:55:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/08/06/google-confirms-breach-in-salesforce-crm-data-theft-campaign-linked-to-shinyhunters/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/08/istock-2159198727.jpg</image:loc><image:title>Green facade of the Google headquarters at St. John's Terminal in Hudson Square, NYC</image:title><image:caption>New York, NY USA - May 28, 2024 : Trees and plants growing on the terraced facade of the new Google headquarters in the old St. John's Terminal at 550 Washington Street in Hudson Square, New York City</image:caption></image:image><lastmod>2025-08-06T17:22:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/08/05/lolbins-and-fileless-malware-why-your-antivirus-isnt-enough/</loc><lastmod>2025-08-05T16:10:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/08/04/netizen-monday-security-brief-8-4-2024/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/08/istock-1312190811-1.jpg</image:loc><image:title>SonicWall headquarters in Silicon Valley</image:title><image:caption>Sep 24, 2020 Milpitas / CA / USA - SonicWall headquarters in Silicon Valley; SonicWALL Inc manufactures network security and data protection products</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/08/istock-1312190811.jpg</image:loc><image:title>SonicWall headquarters in Silicon Valley</image:title><image:caption>Sep 24, 2020 Milpitas / CA / USA - SonicWall headquarters in Silicon Valley; SonicWALL Inc manufactures network security and data protection products</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/08/istock-2204821902-1.jpg</image:loc><image:title>Modern computer programming and application coding</image:title><image:caption>Programmer or developer typing on a laptop computer keyboard for HTML, appllication coding, software programming, and java script.</image:caption></image:image><lastmod>2025-08-04T14:39:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/07/31/netizen-cybersecurity-bulletin-july-31th-2025/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/07/image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/07/istock-458663201.jpg</image:loc><image:title>iPhone 4 - Apps Macro</image:title><image:caption>"Tel-Aviv, Israel - March, 20th 2011: Extreme macro image of an iPhone 4 screen, displaying buttons for apps and websites such as Facebook, Twitter, YouTube, iTunes, Settings, Mail and more."</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/07/istock-171237866.jpg</image:loc><image:title>Raspberry Pi Operating System</image:title><image:caption>"Lyme Regis, UK - May 8, 2012: Screenshot of Raspberry Pi logo within the operating system of a Raspberry Pi model B. Credit card sized computer based around the ARM11 mobile processor. It is primarily aimed at school children to learn computer programming. Price at launch was $35 plus local taxes."</image:caption></image:image><lastmod>2025-07-31T15:50:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/07/30/scattered-spider-ramps-up-targeted-attacks-what-security-teams-need-to-know/</loc><lastmod>2025-07-30T19:41:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/07/29/why-zero-day-vulnerabilities-matter-and-what-to-do-about-them-2/</loc><lastmod>2025-07-29T13:40:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/07/28/netizen-monday-security-brief-7-28-2024-2/</loc><lastmod>2025-07-28T14:13:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/07/25/netizen-july-2025-vulnerability-review/</loc><lastmod>2025-07-25T18:04:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/07/24/paradox-ai-breach-mcdonalds-hiring-platform-compromised-through-123456-password/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/07/istock-2195489700.jpg</image:loc><image:title>McDonald's store facade</image:title><image:caption>Shanghai,China-Jan.23rd 2025: McDonald's store facade</image:caption></image:image><lastmod>2025-07-24T17:22:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/07/23/cisa-orders-emergency-patching-after-active-exploitation-of-sharepoint-vulnerabilities/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/07/istock-2216156823.jpg</image:loc><image:title>Microsoft logo on their main office for Serbia (Microsoft Development Center). Microsoft Corporation one of the main software manufacturers known for Windows.</image:title><image:caption>Belgrade, Serbia - March 15, 2025: Picture of a sign with the logo of Microsoft on their main office for Serbia in Belgrade. Microsoft Corporation is an American multinational technology corporation headquartered in Redmond, Washington. Editorial photo of Microsoft's Serbian headquarters in Belgrade. The minimalist shot emphasises vertical glass grids and the familiar red-green-blue-yellow square beside sleek wordmark, symbolising the global software leader. A rooftop antenna and stark sky frame the corporate architecture, conveying high-tech presence, foreign investment and modern workplace culture in Southeast Europe.</image:caption></image:image><lastmod>2025-07-23T13:09:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/07/21/netizen-monday-security-brief-7-21-2024/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/07/istock-533008105.jpg</image:loc><image:title>Dell Computers Sign</image:title><image:caption>Bracknell, United Kingdom - January 18, 2015: The Dell Corporation Ltd sign at the entrance of their registered company address in Bracknell, England. Dell opened their first international subsidiary in the UK in 1987</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/07/istock-1509310383-1.jpg</image:loc><image:title>Facade of the French headquarters of Microsoft, Issy-les-Moulineaux, France</image:title><image:caption>Issy-les-Moulineaux, France - July 2, 2023: Facade of the French headquarters of Microsoft, an American multinational that develops, manufactures, licenses and markets computer software</image:caption></image:image><lastmod>2025-07-21T14:07:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/07/18/what-are-jwics-and-siprnet-a-guide-to-classified-government-networks/</loc><lastmod>2025-07-18T18:19:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/07/17/securing-ai-data-best-practices-across-the-ai-lifecycle/</loc><lastmod>2025-07-17T15:53:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/07/16/how-disn-powers-the-u-s-militarys-voice-data-and-classified-networks/</loc><lastmod>2025-07-16T19:34:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/07/15/understanding-and-detecting-lateral-movement-in-enterprise-networks/</loc><lastmod>2025-07-15T14:05:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/07/14/netizen-monday-security-brief-7-14-2024/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/07/istock-2154983687.jpg</image:loc><image:title>A glowing eSIM concept on a digital circuit background, highlighting technology and communication. 3D Rendering</image:title><image:caption>A glowing eSIM concept on a digital circuit background, highlighting technology and communication. 3D Rendering</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/07/istock-1217714322-1.jpg</image:loc><image:title>Fortinet Headquarters</image:title><image:caption>Sunnyvale, CA, USA - Feb 11, 2020: Cybersecurity company Fortinet's Headquarters. Fortinet focuses on cybersecurity software, appliances and services, such as firewalls, antivirus, endpoint security.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/07/istock-1217714322.jpg</image:loc><image:title>Fortinet Headquarters</image:title><image:caption>Sunnyvale, CA, USA - Feb 11, 2020: Cybersecurity company Fortinet's Headquarters. Fortinet focuses on cybersecurity software, appliances and services, such as firewalls, antivirus, endpoint security.</image:caption></image:image><lastmod>2025-07-14T14:04:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/07/11/how-perfektblue-bluetooth-exploits-could-compromise-vehicle-systems-and-user-data/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/07/istock-476339530.jpg</image:loc><image:title>Hand Pressing Car Bluetooth Control On Steering Whee</image:title><image:caption>Close Up Of Hand Pressing Car Bluetooth Control On Steering Wheel</image:caption></image:image><lastmod>2025-07-11T19:22:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/07/10/understanding-seo-poisoning-and-how-to-defend-against-it/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/07/istock-1205193642-1.jpg</image:loc><image:title>Internet search bar in browser with magnifier on computer monitor screen.</image:title><image:caption>Internet browser search bar with magnifier on computer screen with text Search</image:caption></image:image><lastmod>2025-07-10T18:06:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/07/09/the-echo-chamber-attack-a-new-llm-security-threat/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/07/istock-2169556578.jpg</image:loc><image:title>Illustration of abstract stream. Artificial intelligence. Big data, technology, AI, data transfer, data flow, large language model, generative AI, binary concept</image:title><image:caption>Illustration of abstract stream. Artificial intelligence. Big data, technology, AI, data transfer, data flow, large language model, generative AI, binary concept</image:caption></image:image><lastmod>2025-07-09T21:53:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/07/08/microsoft-july-2025-patch-tuesday-fixes-137-bugs-including-sql-server-zero-day/</loc><lastmod>2025-07-08T17:54:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/07/07/netizen-monday-security-brief-7-7-2024/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/07/istock-2194003928.jpg</image:loc><image:title>Xiaohongshu (RedNote), TikTok and Lemon8 app icons. Assorted social media mobile applications</image:title><image:caption>Shanghai,China-Jan.15th 2025: Xiaohongshu (RedNote), TikTok and Lemon8 app icons. Assorted social media mobile applications</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/07/istock-683988510.jpg</image:loc><image:title>Binary code with European Union flag</image:title><image:caption>Data protection, binary code with European Union flag</image:caption></image:image><lastmod>2025-07-07T14:40:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/07/02/justice-department-cracks-down-on-north-korean-cyber-espionage-targeting-u-s-companies/</loc><lastmod>2025-07-02T17:58:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/07/01/how-filefix-exploits-browser-file-uploads-to-execute-malicious-commands/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/07/istock-2191163238.jpg</image:loc><image:title>vector illustration magnifier folder pc search file</image:title><image:caption>vector illustration icon magnifying glass and computer folder system, searching pc file concept</image:caption></image:image><lastmod>2025-07-01T13:48:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/06/30/netizen-monday-security-brief-6-30-2024/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/06/istock-1289411982.jpg</image:loc><image:title>cyber security, web development and work in IT concept</image:title><image:caption>programmer or hacker coding on laptop in dark room</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/06/istock-803260700-1-1.jpg</image:loc><image:title>Binary code with Iran flag, data protection concept</image:title><image:caption>Data protection, binary code with Iran flag</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/06/istock-1670843480-1.jpg</image:loc><image:title>Citrix office building in silicon valley, Santa Clara, California, USA</image:title><image:caption>Citrix office building in silicon valley, Santa Clara, California, USA - June 10, 2023. Citrix Systems, Inc. is an American multinational cloud computing and virtualization technology company.</image:caption></image:image><lastmod>2025-06-30T13:54:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/06/27/netizen-june-2025-vulnerability-review/</loc><lastmod>2025-06-27T21:32:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/06/26/netizen-cybersecurity-bulletin-june-26th-2025/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/06/image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/06/istock-803260700-1.jpg</image:loc><image:title>Binary code with Iran flag, data protection concept</image:title><image:caption>Data protection, binary code with Iran flag</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/06/istock-1182574883.jpg</image:loc><image:title>Citrix offices in Silicon Valley</image:title><image:caption>Oct 15, 2019 Santa Clara / CA / USA - Citrix offices in Silicon Valley; Citrix Systems, Inc. is an American software company that provides virtualization, networking, SaaS and cloud computing services</image:caption></image:image><lastmod>2025-06-26T16:37:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/06/24/dhs-issues-cybersecurity-alert-as-iranian-cyber-actors-target-u-s-networks-following-strikes-on-nuclear-sites-2/</loc><lastmod>2025-06-24T14:07:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/06/23/netizen-monday-security-brief-6-23-2024/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/06/istock-946613770.jpg</image:loc><image:title>Teenage Hacker Girl Attacks Corporate Servers in Dark, Typing on Red Lit Laptop Keyboard. Room is Dark</image:title><image:caption>Teenage Hacker Girl Attacks Corporate Servers in Dark, Typing on Red Lit Laptop Keyboard. Room is Dark</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/06/istock-2200128716.jpg</image:loc><image:title>AI powers big data analysis and automation workflows, showcasing neural networks and data streams for business. Artificial intelligence, machine learning, digital transformation and tech innovation.</image:title><image:caption>AI powers big data analysis and automation workflows, showcasing neural networks and data streams for business. Artificial intelligence, machine learning, digital transformation and tech innovation.</image:caption></image:image><lastmod>2025-06-23T13:58:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/06/20/how-does-mfa-multi-factor-authentication-work/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/06/istock-2174719508.jpg</image:loc><image:title>Multi factor authentication MFA method using mobile smartphone and laptop to protect data account on internet data security concept, computer technology icon. cyber security in two-step verification</image:title><image:caption>Multi factor authentication MFA method using mobile smartphone and laptop to protect data account on internet data security concept, computer technology icon. cyber security in two-step verification</image:caption></image:image><lastmod>2025-06-20T17:03:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/06/19/easm-vs-vulnerability-management-key-differences/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/06/istock-1787164391-1.jpg</image:loc><image:title>Computer Bug Targeted in Crosshairs on Laptop Screen Concept for Cybersecurity and Virus Protection</image:title><image:caption>Computer Bug Targeted in Crosshairs on Laptop Screen Concept for Cybersecurity and Virus Protection.</image:caption></image:image><lastmod>2025-06-19T18:47:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/02/12/time-bandit-a-security-bypass-vulnerability-in-chatgpt-4o/</loc><lastmod>2025-06-19T18:16:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/06/18/what-is-cloud-security-posture-management-cspm-and-why-is-it-necessary/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/06/istock-2185337692.jpg</image:loc><image:title>Security of cloud computing and server. Encryption networking and connect technology.</image:title><image:caption>Hand touching padlock icon on cloud storage icon.</image:caption></image:image><lastmod>2025-06-18T17:47:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/06/17/cisa-alerts-to-active-exploitation-of-tp-link-router-vulnerability-cve-2023-33538/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/06/istock-1468841204-1.jpg</image:loc><image:title>man using phone while working at home</image:title><image:caption>Close up of man hands using multiple devices with broadband router on foreground</image:caption></image:image><lastmod>2025-06-17T13:19:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/06/16/netizen-monday-security-brief-6-16-2024/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/06/istock-1324627488.jpg</image:loc><image:title>Stressed business woman with computer screen showing personal files encrypted text, Ransomware malware attack. Business computer Hacked. files encrypted.</image:title><image:caption>Stressed business woman with computer screen showing personal files encrypted text, Ransomware malware attack. Business computer Hacked. files encrypted.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/06/istock-936338884-1.jpg</image:loc><image:title>Computer Malware Attack</image:title><image:caption>Computer code on a screen with a skull representing a computer virus / malware attack.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/06/istock-936338884.jpg</image:loc><image:title>Computer Malware Attack</image:title><image:caption>Computer code on a screen with a skull representing a computer virus / malware attack.</image:caption></image:image><lastmod>2025-06-16T14:12:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/06/13/what-is-the-iomt-and-how-is-it-secured/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/06/istock-2205276829.jpg</image:loc><image:title>Neurosurgery OR setup. Advanced neurosurgery operating room equipped with modern surgical lights and medical equipment for patient care.</image:title><image:caption>Neurosurgery OR setup. Advanced neurosurgery operating room equipped with modern surgical lights and medical equipment for patient care.</image:caption></image:image><lastmod>2025-06-13T17:38:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/06/12/how-to-create-a-strong-password-in-2025/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/06/istock-2162159224.jpg</image:loc><image:title>Flat illustration of woman using strong password security with locked padlock</image:title><image:caption>Flat illustration of woman using strong password security with locked padlock</image:caption></image:image><lastmod>2025-06-12T16:41:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/06/11/google-fixes-critical-vulnerability-exposing-phone-numbers-to-brute-force-attacks/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/06/istock-2155673188.jpg</image:loc><image:title>Dual nano Sim card on a smartphone.</image:title><image:caption>Dual nano Sim card on a smartphone.</image:caption></image:image><lastmod>2025-06-11T15:42:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/06/10/microsoft-june-2025-patch-tuesday-66-flaws-fixed-one-exploited-zero-day/</loc><lastmod>2025-06-10T18:52:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/06/09/netizen-monday-security-brief-6-9-2024/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/06/istock-1890269213-1.jpg</image:loc><image:title>Google Cambridge Office Building</image:title><image:caption>Cambridge, MA, USA - June 28, 2022: Exterior view of Google's office building at 325 Main Street in Cambridge, Massachusetts. Google LLC is an American technology company headquartered in Mountain View, California.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/06/istock-1166812499.jpg</image:loc><image:title>CISCO IoT Cloud business unit offices</image:title><image:caption>August 7, 2019 Santa Clara / CA / USA - CISCO IoT Cloud business unit (formerly Jasper Technologies, Inc) offices in Silicon Valley;</image:caption></image:image><lastmod>2025-06-09T14:18:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/06/04/microsoft-paves-the-way-for-post-quantum-security-with-new-windows-and-linux-updates/</loc><lastmod>2025-06-04T23:36:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/06/03/google-issues-out-of-band-update-for-chrome-to-address-exploited-zero-day-flaw/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/06/istock-1890269213.jpg</image:loc><image:title>Google Cambridge Office Building</image:title><image:caption>Cambridge, MA, USA - June 28, 2022: Exterior view of Google's office building at 325 Main Street in Cambridge, Massachusetts. Google LLC is an American technology company headquartered in Mountain View, California.</image:caption></image:image><lastmod>2025-06-03T13:56:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/06/03/us-government-launches-audit-of-nists-national-vulnerability-database-amid-growing-backlog/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/06/istock-2202671401.jpg</image:loc><image:title>NIST Icon</image:title><image:caption>NIST Icon</image:caption></image:image><lastmod>2025-06-03T13:45:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/06/02/netizen-monday-security-brief-6-2-2024/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/06/istock-1445251323.jpg</image:loc><image:title>Qualcomm headquarters sign in San Diego, California, USA.</image:title><image:caption>San Diego, California, USA - July 9, 2022: Qualcomm headquarters sign in San Diego, California, USA. Qualcomm is an American multinational corporation.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/06/istock-2157183650.jpg</image:loc><image:title>Colleagues in server room checking systems bottlenecks</image:title><image:caption>Coworkers in data center using laptop and tablet to find firewall misconfigurations affecting servers. Colleagues in server room checking systems bottlenecks leading to sluggish data transfer rates</image:caption></image:image><lastmod>2025-06-02T15:50:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/05/30/netizen-may-2025-vulnerability-review/</loc><lastmod>2025-05-30T19:58:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/05/29/netizen-cybersecurity-bulletin-may-29th-2025/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/05/istock-1499492092.jpg</image:loc><image:title>AI growth Risk</image:title><image:caption>AI growth risk as Good Bots and a Bad Bot and chatbot as a social vulnerability for Robots gone rogue and the danger of robotic or artificial intelligence technology in a 3D illustration style.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/05/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-05-29T16:35:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/05/27/how-c2pa-watermarking-and-nightshade-are-shaping-the-battle-against-deepfakes/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/05/istock-1744769333.jpg</image:loc><image:title>Deep fake, AI and face swap in video edit. Deepfake and machine learning. Facial tracking, detection and recognition technology. Digital identity interchange. Computer software mockup.</image:title><image:caption>Deep fake, AI and face swap in video edit. Deepfake and machine learning. Facial tracking, detection and recognition technology. Digital identity interchange. Computer software mockup. Fraud picture.</image:caption></image:image><lastmod>2025-05-27T13:32:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/05/23/badsuccessor-abusing-dmsa-to-escalate-privileges-in-active-directory/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/05/istock-1455181699-1.jpg</image:loc><image:title>Businessmen use laptops to access information in online documents. through the protection system.Document Management System (DMS), online documentation database, and digital file storage system.</image:title><image:caption>Businessmen use laptops to access information in online documents. through the protection system.Document Management System (DMS), online documentation database, and digital file storage system.</image:caption></image:image><lastmod>2025-05-23T17:43:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/05/22/fbi-and-europol-disrupt-lumma-stealer-malware-network-linked-to-10-million-infections/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/05/istock-171311988.jpg</image:loc><image:title>FBI website through a magnifying glass</image:title><image:caption>"Izmir, Turkey - June 12, 2012: Close up to FBI(Federal Bureau of Investigation) website through a magnifying glass on the laptop. FBI is a national security and law enforcement agency in US."</image:caption></image:image><lastmod>2025-05-22T16:54:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/05/21/coinbase-data-breach-exposes-customer-info-and-government-ids/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/05/istock-1585143701-1.jpg</image:loc><image:title>Dogecoin, Bitcoin, World App (Worldcoin) and cryptocurrency exchange apps</image:title><image:caption>Shanghai,China-August 1st 2023: Dogecoin, Bitcoin, World App (Worldcoin) and cryptocurrency exchange platform app icons</image:caption></image:image><lastmod>2025-05-21T17:55:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/05/20/how-to-resolve-bitlocker-recovery-loop-on-windows-10-after-may-2025-update/</loc><lastmod>2025-05-20T14:53:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/05/19/netizen-monday-security-brief-5-19-2024/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/05/istock-1042006244-1.jpg</image:loc><image:title>SAN FRANCISCO, USA - NOVEMBER 9, 2015: Office of Mozilla in San Francisco</image:title><image:caption>San Francisco is the cultural, commercial, and financial center of Northern California. San Francisco is the 13th most populous city in the United States, and the 4th most populous in California</image:caption></image:image><lastmod>2025-05-19T19:45:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/05/16/understanding-niprnet-the-u-s-militarys-secure-network-backbone/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/05/istock-1390249765.jpg</image:loc><image:title>Compliance with internal regulations. Basic rules of employees in the company. Law regulation and compliance rules  policy.</image:title><image:caption>Compliance with internal regulations. Basic rules of employees in the company. Law regulation and compliance rules  policy</image:caption></image:image><lastmod>2025-05-16T17:41:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/05/15/chrome-cve-2025-4664-cross-origin-data-leak-vulnerability-exploited-in-the-wild-2/</loc><lastmod>2025-05-15T15:43:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/05/13/microsoft-may-2025-patch-tuesday-72-flaws-fixed-5-zero-days-exploited/</loc><lastmod>2025-05-13T19:35:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/05/12/netizen-monday-security-brief-5-12-2024/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/05/istock-1890149971.jpg</image:loc><image:title>Google's Seattle Office</image:title><image:caption>Seattle, WA, USA - Dec 21, 2023: A Googler walks back to Google's South Lake Union office in Seattle, Washington.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/05/istock-1813481104.jpg</image:loc><image:title>Protecting Lady's Data: A Cyber Security Hack Attack</image:title><image:caption>Protecting Lady's Data: A Cyber Security Hack Attack and Extortion</image:caption></image:image><lastmod>2025-05-12T19:18:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/05/09/understanding-and-implementing-compliance-management-systems-in-cybersecurity/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/05/istock-1964517021.jpg</image:loc><image:title>projects digital guarantee, business quality checking, and standardization certification. Hand point on check correct icon for compliance with regulations, services, and standards.</image:title><image:caption>projects digital guarantee, business quality checking, and standardization certification. Hand point on check correct icon for compliance with regulations, services, and standards.</image:caption></image:image><lastmod>2025-05-09T15:17:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/05/08/cisco-patches-critical-10-0-cve-2025-20188-vulnerability-what-soc-teams-need-to-know/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/05/istock-900079990.jpg</image:loc><image:title>CISCO company sign</image:title><image:caption>San Jose, CA - Mar. 12, 2017: CISCO Systems. Headquartered in San Jose, CA, in the center of Silicon Valley, CISCO Systems is an American multinational high technology company.</image:caption></image:image><lastmod>2025-05-08T18:04:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/05/07/whatsapp-wins-landmark-167-million-ruling-against-nso-group-for-2019-spyware-attack/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/05/istock-2153776139.jpg</image:loc><image:title>App for Text Messaging or VideoCall. Messenger icon. Easy editable vector design.</image:title><image:caption>App for Text Messaging or VideoCall. Messenger icon. Easy editable vector design.</image:caption></image:image><lastmod>2025-05-07T14:51:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/05/06/the-evolution-of-ransomware-from-the-aids-trojan-to-triple-extortion/</loc><lastmod>2025-05-06T13:33:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/05/05/netizen-monday-security-brief-5-5-2024/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/05/istock-2160045488.jpg</image:loc><image:title>warning alert of error or security breach, something is wrong, compliance problem</image:title><image:caption>warning alert of error or security breach, something is wrong, compliance problem detected</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/05/istock-1408775753-1-1.jpg</image:loc><image:title>Microsoft's headquarters in Bucharest, Romania</image:title><image:caption>Bucharest, Romania - June 04, 2022: View of Microsoft Romania headquarters in City Gate Towers situated in Free Press Square, in Bucharest, Romania.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/05/istock-1408775753-1.jpg</image:loc><image:title>Microsoft's headquarters in Bucharest, Romania</image:title><image:caption>Bucharest, Romania - June 04, 2022: View of Microsoft Romania headquarters in City Gate Towers situated in Free Press Square, in Bucharest, Romania.</image:caption></image:image><lastmod>2025-05-05T17:03:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/04/29/critical-microsoft-telnet-server-vulnerability-enables-zero-click-ntlm-authentication-bypass/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/04/istock-1729779122-2.jpg</image:loc><image:title>Microsoft software company</image:title><image:caption>Microsoft tech company research and development in Matam business park in Haifa, Israel. Haifa city is a R&amp;D facility center for global tech companies.</image:caption></image:image><lastmod>2025-04-29T17:21:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/04/28/netizen-monday-security-brief-4-28-2024/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/04/istock-1139480537.jpg</image:loc><image:title>Upload a file on computer screen. Closeup screenshot, screen pixels and cursor pointer</image:title><image:caption>Upload a file text on computer screen. Closeup screenshot, screen pixels and cursor pointer</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/04/istock-482087868.jpg</image:loc><image:title>phishing web site</image:title><image:caption>website with http and fish hooks represening data theft due to phishing attack</image:caption></image:image><lastmod>2025-04-28T18:01:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/04/25/netizen-april-2025-vulnerability-review/</loc><lastmod>2025-04-25T20:57:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/04/24/netizen-cybersecurity-bulletin-april-24th-2025/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/04/istock-2204821902.jpg</image:loc><image:title>Modern computer programming and application coding</image:title><image:caption>Programmer or developer typing on a laptop computer keyboard for HTML, appllication coding, software programming, and java script.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/04/istock-803260700.jpg</image:loc><image:title>Binary code with Iran flag, data protection concept</image:title><image:caption>Data protection, binary code with Iran flag</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/04/1000011300.jpg</image:loc><image:title>1000011300</image:title></image:image><lastmod>2025-04-24T19:05:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/04/23/ai-drastically-accelerates-exploit-development-for-cve-2025-32433/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/04/istock-1934635026.jpg</image:loc><image:title>Digital technology, Businesswoman holding on AI to command search business information, work in E-commerce, Freelancer, internet network and cybersecurity of data center.</image:title><image:caption>Digital technology, Businesswoman holding on AI to command search business information, work in E-commerce, Freelancer, internet network and cybersecurity of data center.</image:caption></image:image><lastmod>2025-04-23T17:55:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/04/22/phishers-abuse-google-dkim-replay-and-sites-to-deliver-signed-credential-stealing-emails/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/04/istock-2132809053.jpg</image:loc><image:title>Google applications on a Samsung smartphone mobile, Gmail, chrome, google, drive, YouTube, Maps, Gallery, Meet and Google play applications, launching cellphone apps</image:title><image:caption>Cairo, Egypt, April 1 2024: Google applications on a Samsung smartphone mobile, Gmail, chrome, google, drive, YouTube, Maps, Gallery, Meet and Google play applications, launching cellphone apps, selective focus</image:caption></image:image><lastmod>2025-04-22T17:20:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/04/21/netizen-monday-security-brief-4-21-2024/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/04/istock-1044646398.jpg</image:loc><image:title>Smartphone or mobile phone security concept</image:title><image:caption>Creative abstract mobile internet web communication security and safety business commercial concept: 3D render illustration of modern black glossy touchscreen smartphone or mobile phone with enter password verification screen and metal house key with keyhole isolated on white background</image:caption></image:image><lastmod>2025-04-21T16:02:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/04/18/understanding-software-keygens-a-comprehensive-guide/</loc><lastmod>2025-04-18T15:20:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/04/17/funding-crisis-threatens-cve-program-new-foundation-steps-in-to-maintain-operations/</loc><lastmod>2025-04-17T16:50:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/04/16/march-2025-trump-administration-advances-ai-strategy-tightens-restrictions-on-deepseek/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/04/istock-2174874338-1.jpg</image:loc><image:title>Digital Age- Ai Regulation- Technology United States Government</image:title><image:caption>The United States Capital, Congress, with a backdrop of a digital canvas</image:caption></image:image><lastmod>2025-04-17T00:22:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/04/15/understanding-edr-mdr-and-xdr-for-cyber-defense/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/04/istock-1367728820.jpg</image:loc><image:title>Endpoint Security - Endpoint Protection - Multiple Devices Protected Within a Network - 3D Illustration</image:title><image:caption>Endpoint Security - Endpoint Protection Concept - Multiple Devices Secured Within a Network - Security Cloud - Cloud-based Cybersecurity Software Solutions - 3D Illustration</image:caption></image:image><lastmod>2025-04-15T18:05:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/04/14/netizen-monday-security-brief-4-14-2024/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/04/istock-2193694248-1.jpg</image:loc><image:title>SMS scam or fake text message phishing concept. System hacked warning alert, email hack, scam malware spreading virus on messages alert virtual on mobile smart phone screen in person people hand.</image:title><image:caption>SMS scam or fake text message phishing concept. System hacked warning alert, email hack, scam malware spreading virus on messages alert virtual on mobile smart phone screen in person people hand.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/04/istock-2193694248.jpg</image:loc><image:title>SMS scam or fake text message phishing concept. System hacked warning alert, email hack, scam malware spreading virus on messages alert virtual on mobile smart phone screen in person people hand.</image:title><image:caption>SMS scam or fake text message phishing concept. System hacked warning alert, email hack, scam malware spreading virus on messages alert virtual on mobile smart phone screen in person people hand.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/04/istock-1170757059-1.jpg</image:loc><image:title>Asus Chromebook.</image:title><image:caption>Bishkek, Kyrgyzstan - June 6, 2019: Asus Chromebook. A Chromebook for Education on a wooden desk.</image:caption></image:image><lastmod>2025-04-14T17:32:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/04/11/why-dark-web-monitoring-is-essential-for-data-security-2/</loc><lastmod>2025-04-11T16:14:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/04/08/april-2025-patch-tuesday-review-fixes-134-vulnerability-and-one-exploited-zero-day/</loc><lastmod>2025-04-10T19:06:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/04/10/log4j-explained-what-it-is-how-it-works-and-how-to-fix-it/</loc><lastmod>2025-04-10T14:50:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/04/09/metas-controversial-ai-training-piracy-allegations-explained/</loc><lastmod>2025-04-09T18:27:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/04/07/netizen-monday-security-brief-4-7-2024/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/04/istock-533726355.jpg</image:loc><image:title>Credit card phishing</image:title><image:caption>Phishing - a credit card with a fish hook trying to steal personal data on a computer keyboard / financial data theft</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/04/istock-896769142-1.jpg</image:loc><image:title>Hand to operate laptop remotely. isolated.</image:title><image:caption>Hand to operate laptop remotely</image:caption></image:image><lastmod>2025-04-07T18:20:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/04/02/splunk-releases-patches-for-several-high-severity-vulnerabilities/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/04/istock-1006384002.jpg</image:loc><image:title>White Splunk logo on balloon in urban setting</image:title><image:caption>SAN FRANCISCO, CA JUNE 23, 2018: White Splunk logo on balloon in urban setting</image:caption></image:image><lastmod>2025-04-02T17:56:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/04/01/google-issues-emergency-patch-for-chrome-zero-day-flaw-cve-2025-2783/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/04/istock-1170757059.jpg</image:loc><image:title>Asus Chromebook.</image:title><image:caption>Bishkek, Kyrgyzstan - June 6, 2019: Asus Chromebook. A Chromebook for Education on a wooden desk.</image:caption></image:image><lastmod>2025-04-01T16:28:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/03/31/netizen-monday-security-brief-3-31-2024-2/</loc><lastmod>2025-03-31T18:12:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/03/28/netizen-march-2025-vulnerability-review/</loc><lastmod>2025-03-28T16:06:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/03/27/netizen-cybersecurity-bulletin-march-27th-2025/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/03/istock-1261350454.jpg</image:loc><image:title>Oracle headquarter building in Bucharest. Logo of the Oracle company on a office building.</image:title><image:caption>Bucharest/Romania - 07.18.2020: Oracle headquarter building in Bucharest. Logo of the Oracle company on a office building.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/03/screenshot_20250327_140613_messages.jpg</image:loc><image:title>Screenshot_20250327_140613_Messages</image:title></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/03/istock-474325206-1.jpg</image:loc><image:title>View of the VMWARE exhibition center</image:title><image:caption>Barcelona, Spain - October 13, 2014:  View of the exhibition center. News &amp; Training at VMworld exhibition of VMWARE in Barcelona, Spain.</image:caption></image:image><lastmod>2025-03-28T03:29:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/03/26/critical-vmware-tools-vulnerability-cve-2025-22230-what-you-need-to-know/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/03/istock-474325206.jpg</image:loc><image:title>View of the VMWARE exhibition center</image:title><image:caption>Barcelona, Spain - October 13, 2014:  View of the exhibition center. News &amp; Training at VMworld exhibition of VMWARE in Barcelona, Spain.</image:caption></image:image><lastmod>2025-03-26T18:12:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/03/25/critical-ingress-nginx-controller-vulnerability-enables-unauthenticated-remote-code-execution/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/03/istock-896769142.jpg</image:loc><image:title>Hand to operate laptop remotely. isolated.</image:title><image:caption>Hand to operate laptop remotely</image:caption></image:image><lastmod>2025-03-25T18:25:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/03/24/netizen-monday-security-brief-3-24-2024/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/03/istock-2075701014.jpg</image:loc><image:title>PDF to word converter software tool to change extension outline concept</image:title><image:caption>PDF to word converter software tool to change extension outline concept. File format edit process with application or online website vector illustration. Document style conversion to digital doc file</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/03/istock-1585143701-1.jpg</image:loc><image:title>Dogecoin, Bitcoin, World App (Worldcoin) and cryptocurrency exchange apps</image:title><image:caption>Shanghai,China-August 1st 2023: Dogecoin, Bitcoin, World App (Worldcoin) and cryptocurrency exchange platform app icons</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/03/istock-1585143701.jpg</image:loc><image:title>Dogecoin, Bitcoin, World App (Worldcoin) and cryptocurrency exchange apps</image:title><image:caption>Shanghai,China-August 1st 2023: Dogecoin, Bitcoin, World App (Worldcoin) and cryptocurrency exchange platform app icons</image:caption></image:image><lastmod>2025-03-24T18:24:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/03/21/new-windows-zero-day-exploited-by-state-backed-hackers-for-over-seven-years-microsoft-declines-to-patch/</loc><lastmod>2025-03-21T16:08:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/03/20/what-is-a-command-cyber-readiness-inspection-ccri/</loc><lastmod>2025-03-20T16:05:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/03/19/understanding-c3paos-in-cmmc-compliance-2/</loc><lastmod>2025-03-19T17:43:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/03/18/rbac-vs-abac-choosing-the-right-access-control-for-your-business/</loc><lastmod>2025-03-18T15:27:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/03/17/netizen-monday-security-brief-3-17-2024/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/03/istock-2067428019.jpg</image:loc><image:title>Dangerous Virus and Malware Threats. RaaS - Ransomware as a Service concept. Social Engineering, code vulnerabilities exposed. Stealthy backdoor attack in code models. Vector Illustration</image:title><image:caption>Dangerous Virus and Malware Threats. RaaS - Ransomware as a Service concept. Social Engineering, code vulnerabilities exposed. Stealthy backdoor attack in code models. Vector Illustration.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/03/istock-1470607326.jpg</image:loc><image:title>Phishing bait alert concept on a smartphone screen</image:title><image:caption>Phishing bait alert concept on a smartphone screen</image:caption></image:image><lastmod>2025-03-17T18:03:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/03/14/medusa-ransomware-hits-over-300-critical-infrastructure-organizations-in-the-u-s/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/03/istock-1555957103.jpg</image:loc><image:title>Print</image:title><image:caption>Artistic statue like Medusa head, vector illustration</image:caption></image:image><lastmod>2025-03-14T13:39:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/03/13/how-ai-poisoning-tools-like-nightshade-and-glaze-disrupt-large-language-model-training-2/</loc><lastmod>2025-03-13T14:47:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/03/12/why-siemaas-is-essential-for-modern-cybersecurity/</loc><lastmod>2025-03-12T14:15:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/03/11/microsoft-march-2025-patch-tuesday-fixes-7-zero-days-57-flaws/</loc><lastmod>2025-03-11T18:29:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/03/11/dark-storm-claims-responsibility-for-massive-ddos-against-x/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/03/istock-1591754867.jpg</image:loc><image:title>X (new Twitter), Threads, Facebook, YouTube, Instagram, WeChat, WhatsApp. Douyin(TikTok) and Sina Weibo.  Assorted online social media apps</image:title><image:caption>Shanghai,China-July 30th 2023: X (new Twitter), Threads, Facebook, YouTube, Instagram, WeChat, WhatsApp. Douyin(TikTok) and Sina Weibo app icons. Assorted online social media software brands</image:caption></image:image><lastmod>2025-03-11T14:04:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/03/10/netizen-monday-security-brief-3-10-2024/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/03/istock-1468266144.jpg</image:loc><image:title>Close-up of Silicon Die are being Extracted from Semiconductor Wafer and Attached to Substrate by Pick and Place Machine. Computer Chip Manufacturing at Fab. Semiconductor Packaging Process.</image:title><image:caption>Close-up of Silicon Die are being Extracted from Semiconductor Wafer and Attached to Substrate by Pick and Place Machine. Computer Chip Manufacturing at Fab. Semiconductor Packaging Process.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/03/istock-1623100176.jpg</image:loc><image:title>Penalty charge notice parking fine attached to windscreen</image:title><image:caption>Penalty charge notice illegal parking fine attached to car windscreen</image:caption></image:image><lastmod>2025-03-10T18:51:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/03/05/broadcom-patches-three-actively-exploited-vmware-zero-days-2/</loc><lastmod>2025-03-05T11:38:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/03/04/what-is-code-access-security-cas/</loc><lastmod>2025-03-04T17:51:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/03/03/netizen-monday-security-brief-3-3-2024/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/02/istock-2065726101.jpg</image:loc><image:title>Hacking, Cyber Warfare, Cyber Attack, Cyber Crime</image:title><image:caption>A hacker infiltrates a remote network on a laptop</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/02/istock-1729779122-1.jpg</image:loc><image:title>Microsoft software company</image:title><image:caption>Microsoft tech company research and development in Matam business park in Haifa, Israel. Haifa city is a R&amp;D facility center for global tech companies.</image:caption></image:image><lastmod>2025-03-03T11:30:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/02/28/netizen-february-2025-vulnerability-review/</loc><lastmod>2025-02-28T16:49:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/02/27/netizen-cybersecurity-bulletin-february-27th-2025/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/02/istock-2160830106.jpg</image:loc><image:title>System warning on hacked alert, cyberattack in computer network. Cybersecurity vulnerability, data breach illegal connection, compromised information concept. Malicious software, virus and cybercrime.</image:title><image:caption>System warning on hacked alert, cyberattack in computer network. Cybersecurity vulnerability, data breach illegal connection, compromised information concept. Malicious software, virus and cybercrime.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/02/istock-956821300.jpg</image:loc><image:title>Hacker man using laptop and computer with Bitcoin green binary graphic and cryptocurrency candlestick graph price on monitor screen</image:title><image:caption>Hacker man using laptop and computer with Bitcoin green binary graphic and cryptocurrency candlestick graph price on monitor screen. Cyber crime digital currency laundering concept</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/02/file.jpg</image:loc><image:title>file</image:title></image:image><lastmod>2025-02-27T18:21:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/02/25/orange-group-data-breach-exposes-380000-emails-contracts-and-payment-details/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/02/istock-1756378974.jpg</image:loc><image:title>Cyber security warning alert system concept. Businessman working on laptop. Computer network hack, crime and virus, Malicious software, compromised information, illegal connection, data vulnerability,</image:title><image:caption>Cyber security warning alert system concept. Businessman working on laptop. Computer network hack, crime and virus, Malicious software, compromised information, illegal connection, data vulnerability,</image:caption></image:image><lastmod>2025-02-25T17:33:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/02/24/netizen-monday-security-brief-2-24-2024/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/02/istock-1443071845.jpg</image:loc><image:title>Post Quantum Cryptography and Quantum Resistant Cryptography - PQC - Conceptual Illustration</image:title><image:caption>Post Quantum Cryptography and Quantum Resistant Cryptography - PQC - New Cryptographic Algorithms That Are Secure Against Quantum Computers - Conceptual Illustration</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/02/istock-1181670972.jpg</image:loc><image:title>Google Cloud Seattle Campus</image:title><image:caption>Seattle, WA, USA - Oct 11, 2019: The Google Cloud Platform logo seen at Google Cloud Seattle campus, right across the street from Amazon's Headquarters.</image:caption></image:image><lastmod>2025-02-24T19:52:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/02/21/uk-government-forces-apple-to-disable-advanced-data-protection/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/02/istock-1859605984.jpg</image:loc><image:title>Bangkok, Thailand - December 16, 2023: iPhone 15 pro blue titanium placed on keyboard of MacBook Pro, M3 Max.</image:title><image:caption>Bangkok, Thailand - December 16, 2023: iPhone 15 pro blue titanium placed on keyboard of MacBook Pro, M3 Max 2023, Space Black colour</image:caption></image:image><lastmod>2025-02-21T18:37:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/02/20/siprnet-and-niprnet-key-differences-explained/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/02/istock-104684665.jpg</image:loc><image:title>Pentagon, U.S. Department of Defense</image:title></image:image><lastmod>2025-02-20T20:29:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/02/19/new-frigidstealer-campaign-targeting-macos-users-what-soc-teams-need-to-know/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/02/istock-1199156735.jpg</image:loc><image:title>Apple iphone pro on laptop keyboard</image:title><image:caption>Minsk, Belarus - 11 December 2019 : Apple iphone pro on laptop keyboard. Illustrative editorial</image:caption></image:image><lastmod>2025-02-19T18:15:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/02/18/openssh-security-updates-what-soc-teams-need-to-know/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/02/istock-690772190.jpg</image:loc><image:title>Big brother electronic eye concept, technologies for the global surveillance, security of computer systems and networks</image:title><image:caption>High-tech computer digital technology, global surveillance</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/02/istock-2195849571-2.jpg</image:loc><image:title>DeepSeek, Ernie Bot and ChatGPT. Assorted AI apps</image:title><image:caption>Shanghai,China-Jan.25th 2025: DeepSeek, Ernie Bot and ChatGPT. Assorted AI apps</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/02/istock-2195849571-1.jpg</image:loc><image:title>DeepSeek, Ernie Bot and ChatGPT. Assorted AI apps</image:title><image:caption>Shanghai,China-Jan.25th 2025: DeepSeek, Ernie Bot and ChatGPT. Assorted AI apps</image:caption></image:image><lastmod>2025-02-18T21:01:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/02/17/netizen-monday-security-brief-2-17-2024/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/02/istock-954544496.jpg</image:loc><image:title>Firewall icon</image:title><image:caption>red brick with fire vector symbol in isometric 3D style</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/02/istock-1499410369-1.jpg</image:loc><image:title>Warning icon on a digital LCD display with reflection.</image:title><image:caption>Warning icon on a digital LCD display with reflection. Concept of cyber attack, malware, ransomware, data breach, system hacking, virus, spyware, compromised information and urgent attention.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/02/istock-1499410369.jpg</image:loc><image:title>Warning icon on a digital LCD display with reflection.</image:title><image:caption>Warning icon on a digital LCD display with reflection. Concept of cyber attack, malware, ransomware, data breach, system hacking, virus, spyware, compromised information and urgent attention.</image:caption></image:image><lastmod>2025-02-17T17:40:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/02/14/understanding-sandworm-cyber-attacks-beyond-borders/</loc><lastmod>2025-02-14T17:39:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/02/13/urgent-ios-update-fixing-exploited-usb-vulnerability/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/02/istock-2175392357.jpg</image:loc><image:title>Apple Flagship Store in NYC</image:title><image:caption>New York, NY, USA - July 9, 2022: The Apple flagship store on the Fifth Avenue in NYC. Apple, Inc. is an American multinational technology company headquartered in Cupertino, California.</image:caption></image:image><lastmod>2025-02-13T19:46:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/02/11/february-2025-patch-tuesday-microsoft-fixes-4-zero-days-including-2-under-active-exploitation/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/02/istock-1729779122.jpg</image:loc><image:title>Microsoft software company</image:title><image:caption>Microsoft tech company research and development in Matam business park in Haifa, Israel. Haifa city is a R&amp;D facility center for global tech companies.</image:caption></image:image><lastmod>2025-02-11T21:00:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/02/10/netizen-monday-security-brief-2-10-2024/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/02/istock-697650898.jpg</image:loc><image:title>smart doctor hand working with modern laptop computer in modern office with virtual icon diagram</image:title><image:caption>medical techonlogy concept,smart doctor hand working with modern laptop computer in modern office with virtual icon diagram</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/02/istock-2162159325.jpg</image:loc><image:title>Flat illustration of hacker bypassing security measures ransomware prevention and cybersecurity defense</image:title><image:caption>Flat illustration of hacker bypassing security measures ransomware prevention and cybersecurity defense</image:caption></image:image><lastmod>2025-02-10T18:53:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/02/05/cisa-and-fda-warn-of-security-risks-in-contec-patient-monitors/</loc><lastmod>2025-02-05T17:01:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/02/04/ransomware-actors-exploit-ssh-tunneling-for-vmware-esxi-access-what-soc-teams-need-to-know/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/02/istock-2191796691.jpg</image:loc><image:title>VMware office in Bellevue, Washington, USA</image:title><image:caption>VMware office in Bellevue, Washington, USA - June 15, 2023. VMware, Inc. is an American cloud computing and virtualization technology company.</image:caption></image:image><lastmod>2025-02-04T19:15:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/02/03/netizen-monday-security-brief-2-3-2024/</loc><lastmod>2025-02-03T15:27:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/01/31/netizen-january-2025-vulnerability-review/</loc><lastmod>2025-01-31T17:18:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/01/30/netizen-cybersecurity-bulletin-january-30th-2025/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/01/istock-2176053749-1.jpg</image:loc><image:title>Generative AI Apps</image:title><image:caption>Portland, OR, USA - Sep 1, 2024: ChatGPT, Gemini, Microsoft Copilot, Claude, and Perplexity app icons are seen on a Google Pixel smartphone. AI competition concepts.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/01/istock-1226728983.jpg</image:loc><image:title>Apple iPhone during iOS update</image:title><image:caption>Tokyo, Japan - May 23, 2020 : Apple iPhone during iOS update. New Apple watch &amp; iPhone OS releases are widely followed every year</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/01/1000010425.jpg</image:loc><image:title>1000010425</image:title></image:image><lastmod>2025-01-30T19:40:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/01/29/deepseek-hit-by-major-security-breach-heres-what-happened-2/</loc><lastmod>2025-01-29T21:20:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/01/28/the-role-of-privacy-in-cybersecurity-why-both-matter/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/01/istock-1789291416.jpg</image:loc><image:title>security network technology</image:title><image:caption>Closeup of a padlock on a laptop and phone illuminated with blue and red light.Phishing, cybersecurity danger or ransomware attack. Encrypted privacy in email.</image:caption></image:image><lastmod>2025-01-28T18:43:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/01/27/netizen-monday-security-brief-1-27-2024/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/01/istock-1470693396-1.jpg</image:loc><image:title>Exchange information and data with internet cloud technology.FTP(File Transfer Protocol) files receiver and computer backup copy. File sharing isometric.</image:title><image:caption>Exchange information and data with internet cloud technology.FTP(File Transfer Protocol) files receiver and computer backup copy. File sharing isometric</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/01/istock-1446240418-1.jpg</image:loc><image:title>Trojan horse on top of blocks of hexadecimal programming codes. Illustration of the concept of online hacking, computer spyware, malware and ransomware.</image:title><image:caption>Trojan horse on top of blocks of hexadecimal programming codes. Illustration of the concept of online hacking, computer spyware, malware and ransomware.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/01/istock-1446240418.jpg</image:loc><image:title>Trojan horse on top of blocks of hexadecimal programming codes. Illustration of the concept of online hacking, computer spyware, malware and ransomware.</image:title><image:caption>Trojan horse on top of blocks of hexadecimal programming codes. Illustration of the concept of online hacking, computer spyware, malware and ransomware.</image:caption></image:image><lastmod>2025-01-27T18:35:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/01/24/soc-in-a-box-a-scalable-solution-for-modern-security-challenges/</loc><lastmod>2025-01-24T20:33:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/01/23/upgrading-your-cybersecurity-home-lab-building-advanced-capabilities/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/01/istock-1468841204.jpg</image:loc><image:title>man using phone while working at home</image:title><image:caption>Close up of man hands using multiple devices with broadband router on foreground</image:caption></image:image><lastmod>2025-01-23T16:27:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/01/22/local-security-policy-in-windows-10-11-an-overview/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/01/istock-1498827668.jpg</image:loc><image:title>Surfae Laptop Studio photos for editorial use only</image:title><image:caption>Ho Chi Minh city, Vietnam - June 2023. Surfae Laptop Studio photos for editorial use only.</image:caption></image:image><lastmod>2025-01-22T17:04:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/01/21/fasthttp-exploited-in-new-brute-force-campaign-what-soc-teams-need-to-know/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/01/istock-1272564863.jpg</image:loc><image:title>Dark web browser close-up on LCD screen with shallow focus on https padlock</image:title><image:caption>Dark web browser close-up on LCD screen with shallow focus, light shining through https padlock. Internet security, SSL certificate, cybersecurity, search engine and web browser concepts</image:caption></image:image><lastmod>2025-01-21T15:26:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/01/20/netizen-monday-security-brief-1-20-2025/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/01/istock-2153902737.jpg</image:loc><image:title>Fortinet Technologies Canada office in Nepean, ON, Canada.</image:title><image:caption>Nepean, ON, Canada - October 15, 2023: Fortinet Technologies Canada office in Nepean, ON, Canada. Fortinet, Inc. is an American cybersecurity company.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/01/istock-1436164438-1.jpg</image:loc><image:title>social media application on mobile</image:title><image:caption>West Kutai, East Kalimantan, Indonesia - 23 October 2022 - social media application on mobile</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/01/istock-1436164438.jpg</image:loc><image:title>social media application on mobile</image:title><image:caption>West Kutai, East Kalimantan, Indonesia - 23 October 2022 - social media application on mobile</image:caption></image:image><lastmod>2025-01-20T20:03:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/01/17/what-is-the-difference-between-credentialed-scanning-and-uncredentialed-scanning/</loc><lastmod>2025-01-17T19:18:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/01/16/everything-you-need-to-know-about-stigs-in-cybersecurity/</loc><lastmod>2025-01-16T16:35:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/01/15/what-to-know-in-order-to-get-your-first-soc-internship-2/</loc><lastmod>2025-01-15T18:32:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/01/14/microsoft-january-2025-patch-tuesday-8-zero-days-and-159-vulnerabilities/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/01/istock-1408775753.jpg</image:loc><image:title>Microsoft's headquarters in Bucharest, Romania</image:title><image:caption>Bucharest, Romania - June 04, 2022: View of Microsoft Romania headquarters in City Gate Towers situated in Free Press Square, in Bucharest, Romania.</image:caption></image:image><lastmod>2025-01-14T20:26:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/01/13/netizen-monday-security-brief-11-11-2024-2/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/01/istock-1308419989.jpg</image:loc><image:title>Smartphone screen with icons of the social network Instagram, Skype, Telegram</image:title><image:caption>MOGILEV, BELARUS-SEPTEMBER 18, 2019: Smartphone screen with icons of the social network Instagram, Skype, Telegram</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/01/istock-1717219341.jpg</image:loc><image:title>security and data protection concept</image:title><image:caption>security and data protection concept, 3D render</image:caption></image:image><lastmod>2025-01-13T23:55:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/01/10/30-essential-cybersecurity-search-engines-for-researchers-and-professionals/</loc><lastmod>2025-01-10T19:18:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/01/09/the-authority-to-operate-ato-process-a-critical-security-measure-for-federal-systems/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/01/istock-2174874338.jpg</image:loc><image:title>Digital Age- Ai Regulation- Technology United States Government</image:title><image:caption>The United States Capital, Congress, with a backdrop of a digital canvas</image:caption></image:image><lastmod>2025-01-09T17:57:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/01/08/looking-ahead-ais-role-in-enhancing-cybersecurity-in-2025/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/01/istock-2154839437.jpg</image:loc><image:title>AI ethics laws and regulations, artificial intelligence legal standards</image:title><image:caption>AI ethics laws and regulations, artificial intelligence legal standards and policy</image:caption></image:image><lastmod>2025-01-08T16:56:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/01/07/5-methods-hackers-use-to-bypass-2fa-and-how-to-prevent-them-2/</loc><lastmod>2025-01-07T14:50:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/01/06/netizen-monday-security-brief-1-6-2024/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/01/istock-1787164391.jpg</image:loc><image:title>Computer Bug Targeted in Crosshairs on Laptop Screen Concept for Cybersecurity and Virus Protection</image:title><image:caption>Computer Bug Targeted in Crosshairs on Laptop Screen Concept for Cybersecurity and Virus Protection.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/01/istock-2102549942-1.jpg</image:loc><image:title>Crypto Wallet icon with Bitcoin made with binary code. Digital Cryptocurrency wallet. Mobile banking, online finance, blockchain banner. Binary code background with digits 1.0. Vector Illustration.</image:title><image:caption>Crypto Wallet icon with Bitcoin made with binary code. Digital Cryptocurrency wallet. Mobile banking, online finance, blockchain banner. Binary code background with digits 1.0. Vector Illustration</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/01/istock-2102549942.jpg</image:loc><image:title>Crypto Wallet icon with Bitcoin made with binary code. Digital Cryptocurrency wallet. Mobile banking, online finance, blockchain banner. Binary code background with digits 1.0. Vector Illustration.</image:title><image:caption>Crypto Wallet icon with Bitcoin made with binary code. Digital Cryptocurrency wallet. Mobile banking, online finance, blockchain banner. Binary code background with digits 1.0. Vector Illustration</image:caption></image:image><lastmod>2025-01-06T23:10:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2025/01/01/adobe-warns-of-exploitable-coldfusion-flaw-heres-what-you-need-to-know/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2025/01/istock-1581810849.jpg</image:loc><image:title>Adobe headquarters in San Jose, California, USA</image:title><image:caption>Adobe headquarters in San Jose, California, USA - June 10, 2023.Adobe Inc., is an American multinational computer software company.</image:caption></image:image><lastmod>2025-01-01T19:20:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/12/31/2024-review-typhoon-campaigns-and-ransomware-dominate-us-cyber-landscape/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/12/istock-1368353578.jpg</image:loc><image:title>Chinese flag with digital matrix</image:title><image:caption>Chinese flag with digital matrix -Innovation Concept - Digital Tech Wallpaper - 3D illustration</image:caption></image:image><lastmod>2024-12-31T16:05:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/12/30/netizen-monday-security-brief-12-30-2024/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/12/istock-1960986400-1.jpg</image:loc><image:title>Regulating Artificial Intelligence - Ai</image:title><image:caption>Photo of the United States Capitol with overlayed computer circuitry.  The Intersection of freedom and artificial intelligence</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/12/istock-1809655265.jpg</image:loc><image:title>Futuristic Technology Concept Visualization: Circuit Board CPU Processor Microchip Starting Artificial Intelligence Digitalization of Data. Digital Lines Connect into Artificial Intelligence Symbol.</image:title><image:caption>Futuristic Technology Concept Visualization: Circuit Board CPU Processor Microchip Starting Artificial Intelligence Digitalization of Data. Digital Lines Connect into Artificial Intelligence Symbol.</image:caption></image:image><lastmod>2024-12-30T18:50:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/12/27/netizen-december-2024-vulnerability-review/</loc><lastmod>2024-12-27T19:03:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/12/26/netizen-cybersecurity-bulletin-december-26th-2024/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/12/istock-2188153172.jpg</image:loc><image:title>Botnet icon, malware in computer network or bot attack vector</image:title><image:caption>Botnet icon, malware in computer network or bot attack vector</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/12/1000009813.jpg</image:loc><image:title>1000009813</image:title></image:image><lastmod>2024-12-26T01:13:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/12/25/how-to-secure-those-iot-devices-you-got-for-christmas/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/12/istock-1752459208.jpg</image:loc><image:title>Christmas tree on Christmas poster in electronic technology style. New year, merry christmas congratulations card in computer tech design. Template Christmas cards in style of digital technology.</image:title><image:caption>Christmas tree on Christmas poster in electronic technology style. New year, merry christmas congratulations card in computer tech design. Template Christmas cards in style of digital technology.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/12/istock-1890243590-1.jpg</image:loc><image:title>Microsoft Canada</image:title><image:caption>Vancouver, BC, Canada - Dec 22, 2023: Exterior view of Microsoft's Vancouver office in Canada. Microsoft Corporation is an American multinational technology corporation headquartered in Redmond, Washington.</image:caption></image:image><lastmod>2024-12-25T18:15:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/12/24/understanding-code-access-security-cas-in-the-microsoft-net-framework/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/12/istock-1890243590.jpg</image:loc><image:title>Microsoft Canada</image:title><image:caption>Vancouver, BC, Canada - Dec 22, 2023: Exterior view of Microsoft's Vancouver office in Canada. Microsoft Corporation is an American multinational technology corporation headquartered in Redmond, Washington.</image:caption></image:image><lastmod>2024-12-24T19:49:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/12/23/netizen-monday-security-brief-12-23-2024/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/12/istock-1178486689-1.jpg</image:loc><image:title>Sophos advertisement posted on exterior of downtown Caltrain station</image:title><image:caption>San Francisco, California, USA - September, 2019 : Sophos British security software and hardware company advertisement posted on exterior of downtown Caltrain station</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/12/istock-1178486689.jpg</image:loc><image:title>Sophos advertisement posted on exterior of downtown Caltrain station</image:title><image:caption>San Francisco, California, USA - September, 2019 : Sophos British security software and hardware company advertisement posted on exterior of downtown Caltrain station</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/12/istock-900925902.jpg</image:loc><image:title>app icons WhatsApp, YouTube, instagram, Facebook and Skype on the screen of the smartphone Xiaomi</image:title><image:caption>Adygea, Russia - January 2, 2018: app icons WhatsApp, YouTube, instagram, Facebook and Skype on the screen of the smartphone Xiaomi</image:caption></image:image><lastmod>2024-12-23T15:01:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/12/19/your-first-cybersecurity-home-lab-what-to-consider/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/12/istock-1401472985.jpg</image:loc><image:title>Woman Plugging Ethernet Cord in Modem</image:title><image:caption>Closeup image of woman plugging Ethernet cord in back of modem to get faster speed</image:caption></image:image><lastmod>2024-12-19T23:56:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/12/18/assessing-the-cybersecurity-risks-and-legal-implications-of-video-game-emulation-and-rom-sharing/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/12/istock-2187751126.jpg</image:loc><image:title>Pixel art compact disc. Vintage shiny CD or DVD disc for audio and movies. Retro 8 bit digital nostalgic icon on white background. 90s arcade computer video game element. Vector isolated illustration.</image:title><image:caption>Retro Pixel Art Compact Disc, CD DVD 8-bit Icon.</image:caption></image:image><lastmod>2024-12-18T22:50:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/12/17/automotive-and-iot-security-trends-for-2025/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/12/istock-926750470.jpg</image:loc><image:title>Car with digital interface</image:title><image:caption>Car interior with digital interface on blurry bokeh background. Double exposure</image:caption></image:image><lastmod>2024-12-17T17:02:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/12/16/netizen-monday-security-brief-12-16-2024/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/12/istock-1670843480.jpg</image:loc><image:title>Citrix office building in silicon valley, Santa Clara, California, USA</image:title><image:caption>Citrix office building in silicon valley, Santa Clara, California, USA - June 10, 2023. Citrix Systems, Inc. is an American multinational cloud computing and virtualization technology company.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/12/istock-1335203542-1.jpg</image:loc><image:title>Legal document, attorney or court professional office, law and judgment approval paper concept, mature lawyer holding legal document with a gavel hammer symbol of court or judgement.</image:title><image:caption>Legal document, attorney or court professional office, law and judgment approval paper concept, mature lawyer holding legal document with a gavel hammer symbol of court or judgement.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/12/istock-1335203542.jpg</image:loc><image:title>Legal document, attorney or court professional office, law and judgment approval paper concept, mature lawyer holding legal document with a gavel hammer symbol of court or judgement.</image:title><image:caption>Legal document, attorney or court professional office, law and judgment approval paper concept, mature lawyer holding legal document with a gavel hammer symbol of court or judgement.</image:caption></image:image><lastmod>2024-12-16T19:37:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/12/13/preparing-for-the-windows-11-transition-what-it-teams-need-to-know/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/12/istock-1498827686.jpg</image:loc><image:title>Surfae Laptop Studio photos for editorial use only</image:title><image:caption>Ho Chi Minh city, Vietnam - June 2023. Surfae Laptop Studio photos for editorial use only.</image:caption></image:image><lastmod>2024-12-13T22:36:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/12/11/krispy-kreme-discloses-cybersecurity-incident-through-sec-filing/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/12/istock-1610004663.jpg</image:loc><image:title>Krispy Kreme doughnut shop at Times Square in Manhattan, New York City, USA</image:title><image:caption>Krispy Kreme doughnut shop at Times Square in Manhattan, New York City, USA, August 17, 2022. Krispy Kreme, Inc. is an American multinational doughnut company and coffeehouse chain.</image:caption></image:image><lastmod>2024-12-11T21:26:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/12/11/holiday-season-cyber-attacks-phishing-ttps-to-look-out-for/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/12/istock-1350606480.jpg</image:loc><image:title>Man ordering Christmas gifts using laptop and credit card. Online shopping during holidays</image:title><image:caption>Ordering Christmas presents, online payment. Online shopping, internet banking, spending money, holidays, vacations concept</image:caption></image:image><lastmod>2024-12-11T21:04:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/12/10/december-2024-patch-tuesday-microsoft-addresses-71-flaws-including-one-zero-day-2/</loc><lastmod>2024-12-11T02:11:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/12/10/zero-day-windows-ntlm-vulnerability-credentials-hijacked-by-viewing-a-malicious-file/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/12/istock-1387646240.jpg</image:loc><image:title>File manager used to browse folders on computer. Exploring directories on hard drive. Document management system (DMS). Business data and process. Person touching software interface on virtual screen.</image:title><image:caption>File manager used to browse folders on computer. Exploring directories on hard drive. Document management system (DMS). Business data and process. Person touching software interface on virtual screen.</image:caption></image:image><lastmod>2024-12-10T13:15:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/12/09/netizen-monday-security-brief-12-9-2024/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/12/istock-1804857934.jpg</image:loc><image:title>Software program source code of Python IDE code editor display photo</image:title><image:caption>Software source code. Program code. Code on a computer screen. The developer is working on program codes in the office. Photo with source code. Python IDE</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/12/istock-515366502.jpg</image:loc><image:title>Cyber Attacks Concept</image:title><image:caption>Cyber Attacks Concept Illustration. Online Financial Security.</image:caption></image:image><lastmod>2024-12-09T18:20:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/12/04/why-cmmc-2-0-and-ai-are-a-crucial-pair-for-cybersecurity-in-2024/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/12/istock-2047220331.jpg</image:loc><image:title>Generate AI technology. Machine learning on the big data network, Brain data creative in a light bulb to technology smart robot science and artificial intelligence technology, innovation of futuristic</image:title><image:caption>Generate AI technology. Machine learning on the big data network, Brain data creative in a light bulb to technology smart robot science and artificial intelligence technology, innovation of futuristic</image:caption></image:image><lastmod>2024-12-04T18:41:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/12/03/aws-releases-security-incident-response-service-2/</loc><lastmod>2024-12-03T20:36:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/11/29/netizen-november-2024-vulnerability-review/</loc><lastmod>2024-11-29T18:19:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/11/28/netizen-cybersecurity-bulletin-november-28th-2024-2/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/11/screenshot_20241128_133308_messages.jpg</image:loc><image:title>Screenshot_20241128_133308_Messages</image:title></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/11/istock-1216417118-3.jpg</image:loc><image:title>Popular online meeting applications on iPhone</image:title><image:caption>Bangkok, Thailand - April 1, 2020 : iPhone 7 showing its screen with popular online meeting applications which are Zoom, Microsoft Teams and Hangouts Meet by Google.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/11/istock-1310627676-1.jpg</image:loc><image:title>Gamer playing a multiplayer game on lan party</image:title><image:caption>Gamer playing a multiplayer game on lan party</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/11/istock-1216417118-2.jpg</image:loc><image:title>Popular online meeting applications on iPhone</image:title><image:caption>Bangkok, Thailand - April 1, 2020 : iPhone 7 showing its screen with popular online meeting applications which are Zoom, Microsoft Teams and Hangouts Meet by Google.</image:caption></image:image><lastmod>2024-11-28T18:46:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/11/27/starbucks-forced-to-revert-to-manual-systems-after-major-ransomware-attack/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/11/istock-2150546747.jpg</image:loc><image:title>Toronto, Canada - May 6, 2023: Hand holds Starbucks cup, iconic urban backdrop City hustle flows as Starbucks offers familiar comfort. Emblematic coffee moment in metropolitan life. Starbucks concept</image:title><image:caption>Toronto, Canada - May 6, 2023: Hand holds Starbucks cup, iconic urban backdrop. City hustle flows as Starbucks offers familiar comfort. Emblematic coffee moment in metropolitan life. Starbucks concept</image:caption></image:image><lastmod>2024-11-27T16:00:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/11/26/why-cmmc-2-0-requires-cybersecurity-training-for-all-employees-and-how-to-implement-it/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/11/istock-1353769234.jpg</image:loc><image:title>Training and skill development concept with icons of online course, conference, seminar, webinar, e-learning, coaching. Grow knowledge and abilities.</image:title><image:caption>Training and skill development concept with icons of online course, conference, seminar, webinar, e-learning, coaching. Grow knowledge and abilities.</image:caption></image:image><lastmod>2024-11-26T18:17:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/11/25/netizen-monday-security-brief-11-25-2024/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/11/istock-1423651834.jpg</image:loc><image:title>Modern flat design of 7-ZIP archive file icon for web</image:title><image:caption>Modern flat design of 7-ZIP archive file icon for web. Simple style</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/11/istock-641666002.jpg</image:loc><image:title>China global insights</image:title><image:caption>China global insights</image:caption></image:image><lastmod>2024-11-25T18:37:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/11/22/deepening-the-integration-of-c-scrm-in-cmmc-2-0/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/11/istock-1189050206.jpg</image:loc><image:title>Risk Management and Assessment for Business</image:title><image:caption>Risk Management and Assessment for Business Investment Concept. Modern graphic interface showing symbols of strategy in risky plan analysis to control unpredictable loss and build financial safety.</image:caption></image:image><lastmod>2024-11-22T22:33:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/11/21/should-your-smb-adopt-zero-trust-for-cmmc-2-0-compliance-heres-what-you-need-to-know/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/11/istock-1450723537.jpg</image:loc><image:title>Network connection concept. Zero trust security model. Secure network. 3d render.</image:title><image:caption>Network connection concept. Zero trust security model. Secure network. 3d render..</image:caption></image:image><lastmod>2025-01-28T14:00:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/11/20/400-gb-of-bank-data-stolen-what-we-know-about-the-finastra-breach/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/11/istock-522152569.jpg</image:loc><image:title>credit card data security</image:title><image:caption>Open security lock on credit cards with computer keyboard / Credit card data breach</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/11/finastra-sales-nov8.png</image:loc><image:title>finastra-sales-nov8</image:title></image:image><lastmod>2024-11-20T18:55:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/11/19/doj-reportedly-pressures-google-to-divest-chrome-browser-amid-antitrust-push/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/11/istock-1170757059.jpg</image:loc><image:title>Asus Chromebook.</image:title><image:caption>Bishkek, Kyrgyzstan - June 6, 2019: Asus Chromebook. A Chromebook for Education on a wooden desk.</image:caption></image:image><lastmod>2024-11-19T23:19:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/11/18/netizen-monday-security-brief-11-18-2024/</loc><lastmod>2024-11-18T21:32:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/11/15/greynoise-ai-zero-days-ais-rapid-advancement-in-the-field-of-idr/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/11/istock-1256840826.jpg</image:loc><image:title>Surveillance Camera on a Brick Wall</image:title><image:caption>External surveillance camera which is mounted on a brick wall near the edge side of the whole picture composition. 3D rendering image with the «copyspace» area for placing a text or a graphic information.</image:caption></image:image><lastmod>2024-11-15T17:14:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/11/13/modern-phishing-explained-types-tactics-and-how-to-avoid-scams-in-2024/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/11/istock-2145943924.jpg</image:loc><image:title>Mobile Fraud Alert, Phone scam, Online Warning. Spam Distribution or Malware Spreading Virus mobile fraud alert warning</image:title><image:caption>Mobile Fraud Alert, Phone scam, Online Warning. Spam Distribution or Malware Spreading Virus - mobile fraud alert warning notification. Vector isolated illustration on dark background with icons</image:caption></image:image><lastmod>2024-11-13T18:12:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/11/12/november-2024-patch-tuesday-88-vulnerabilities-two-zero-days/</loc><lastmod>2024-11-12T22:22:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/11/11/netizen-monday-security-brief-11-11-2024/</loc><lastmod>2024-11-11T23:07:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/11/08/cmmc-2-0-final-rule-what-small-and-medium-sized-dod-contractors-need-to-know/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/11/istock-1693759239.jpg</image:loc><image:title>Performance checklist, businessman using checklist survey, filling out digital form checklist, take an assessment, questionnaire, evaluation, online survey, online exam.;</image:title><image:caption>Performance checklist, businessman using checklist survey, filling out digital form checklist, take an assessment, questionnaire, evaluation, online survey, online exam.;</image:caption></image:image><lastmod>2024-11-08T18:39:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/11/07/whats-behind-the-vote-a-look-at-the-layered-security-of-u-s-elections/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/11/istock-1735344189.jpg</image:loc><image:title>2024 Election campaign buttons with the USA flag color - 3d Rendering</image:title><image:caption>2024 Election campaign buttons with the USA flag color - 3d Rendering</image:caption></image:image><lastmod>2024-11-07T18:48:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/11/06/sophos-vs-chinese-hackers-a-five-year-battle-with-government-backed-intrusion/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/11/istock-1219304907.jpg</image:loc><image:title>Sophos Group Silicon Valley Office</image:title><image:caption>Santa Clara, CA, USA - Feb 26, 2020: British cybersecurity software and hardware company Sophos Group plc's Silicon Valley office in Santa Clara, California.</image:caption></image:image><lastmod>2024-11-06T18:47:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/11/05/googles-synthid-a-deeper-look-into-watermarking-for-ai-generated-content/</loc><lastmod>2024-11-05T20:26:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/11/04/netizen-monday-security-brief-11-4-2024-2/</loc><lastmod>2024-11-04T21:23:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/10/28/netizen-awarded-spot-on-gsa-oasis-contract-vehicle/</loc><lastmod>2024-10-28T19:20:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/10/28/netizen-monday-security-brief-10-14-2024-3/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/10/istock-1348770256-1.jpg</image:loc><image:title>Delta Air Lines Airbus A350-900 (N512DN) passenger plane.</image:title><image:caption>Chiba, Japan - May 05, 2019:Delta Air Lines Airbus A350-900 (N512DN) passenger plane.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/10/istock-1348770256.jpg</image:loc><image:title>Delta Air Lines Airbus A350-900 (N512DN) passenger plane.</image:title><image:caption>Chiba, Japan - May 05, 2019:Delta Air Lines Airbus A350-900 (N512DN) passenger plane.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/10/istock-6261201941.jpg</image:loc><image:title>Apple Touch Bar</image:title><image:caption>Nanjing, China - November 24, 2016: The fourth generation MacBook Pro on white table. The new MacBook Pro was revealed on October 27, 2016, replacing the function keys with an interactive multi-touch "Touch Bar" and a Touch ID sensor integrated into the Power button. Siri icon on right corner. Photo taken with Huawei P9 Leica Dual Camera mobile phone, taken in Nanjing City, Jiangsu Province, China.</image:caption></image:image><lastmod>2024-10-28T19:03:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/10/25/netizen-october-2024-vulnerability-review/</loc><lastmod>2024-10-25T20:34:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/10/24/netizen-cybersecurity-bulletin-october-24th-2024/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/10/image-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/10/istock-1059717286.jpg</image:loc><image:title>US United States Securities and Exchange Commission SEC entrance architecture modern building sign, logo, american flag, glass windows</image:title><image:caption>Washington DC, USA - October 12, 2018: US United States Securities and Exchange Commission SEC entrance architecture modern building sign, logo, american flag, glass windows</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/10/istock-1149172915-1.jpg</image:loc><image:title>America / Pentagon-US Department of Defense.River Entrance.Sign.</image:title><image:caption>River entrance of the US Department of Defense.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/10/istock-1149172915.jpg</image:loc><image:title>America / Pentagon-US Department of Defense.River Entrance.Sign.</image:title><image:caption>River entrance of the US Department of Defense.</image:caption></image:image><lastmod>2024-10-24T16:19:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/10/23/fortinet-warns-of-critical-fortimanager-flaw-exploited-in-zero-day-attacks/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/10/istock-1670649574.jpg</image:loc><image:title>Fortinet office in Burnaby, BC, Canada</image:title><image:caption>Fortinet office in Burnaby, BC, Canada, July 7, 2023. Fortinet is a cybersecurity company.</image:caption></image:image><lastmod>2024-10-23T20:27:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/10/22/grpc-h2c-protocol-abuse-enables-xrp-cryptomining-via-docker-servers/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/10/istock-1135927483.jpg</image:loc><image:title>Gold ripple stacked on a bright background of business graphics close-up. Ripple crypto-currency. Anonymous. Virtual currency</image:title><image:caption>Gold ripple stacked on a bright background of business graphics close-up. Ripple crypto-currency. Anonymous. Virtual currency</image:caption></image:image><lastmod>2024-10-22T18:05:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/10/21/netizen-monday-security-brief-10-14-2024-2/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/10/istock-2158201153.jpg</image:loc><image:title>Gavel, Handcuffs, and Poker Chips on a Laptop Keyboard in a Dark Room</image:title><image:caption>A close-up image of a gavel, handcuffs, and poker chips resting on a laptop keyboard.</image:caption></image:image><lastmod>2024-10-21T19:50:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/10/18/case-study-2023-cyberattack-on-lehigh-valley-health-network/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/10/istock-1920162845.jpg</image:loc><image:title>Allentown, Pennsylvania  January 1, 2023: Lehigh Valley Reilly Childrens Hospital with comprehensive care for children and is part of the Lehigh Valley Health Network</image:title><image:caption>Allentown, Pennsylvania  January 1, 2023: Lehigh Valley Reilly Childrens Hospital with comprehensive care for children and is part of the Lehigh Valley Health Network.</image:caption></image:image><lastmod>2024-10-18T19:02:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/10/15/pokemons-teraleak-25-years-of-secrets-unveiled-in-massive-game-freak-hack/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/10/istock-597663428.jpg</image:loc><image:title>Pokemon trading cards background</image:title><image:caption>New York City, NY, USA - July 12, 2016: Pokemon trading cards background. Illustrative Editorial</image:caption></image:image><lastmod>2024-10-15T16:30:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/10/14/netizen-monday-security-brief-10-14-2024/</loc><lastmod>2024-10-14T14:47:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/10/11/what-is-persistence-in-cybersecurity-and-how-do-you-stop-an-advanced-persistent-threat-apt-2/</loc><lastmod>2024-10-11T18:43:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/10/10/strengthening-supply-chain-security-closing-the-gaps-before-attackers-find-them/</loc><lastmod>2024-10-10T15:05:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/10/09/jokers-stash-busted-russian-hackers-indicted-in-massive-financial-cybercrime-operation/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/10/istock-1994704619.jpg</image:loc><image:title>Black and white contrasting drawing of head of smiling Joker of playing cards isolated on white</image:title><image:caption>Black and white contrasting drawing of head of smiling Joker of playing cards isolated on white. Vector illustration in flat design style</image:caption></image:image><lastmod>2024-10-09T21:49:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/10/08/october-2024-patch-tuesday-five-zero-days-fixed-amid-118-vulnerabilities/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/10/istock-1700212440.jpg</image:loc><image:title>Update software application and hardware upgrade technology concept, Firmware or Operating System update, Man using computer with comfirm button and percent progress bar screen. Installing app patch.</image:title><image:caption>Update software application and hardware upgrade technology concept, Firmware or Operating System update, Man using computer with comfirm button and percent progress bar screen. Installing app patch.</image:caption></image:image><lastmod>2024-10-08T22:09:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/10/07/netizen-monday-security-brief-10-7-2024/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/10/istock-1226728983.jpg</image:loc><image:title>Apple iPhone during iOS update</image:title><image:caption>Tokyo, Japan - May 23, 2020 : Apple iPhone during iOS update. New Apple watch &amp; iPhone OS releases are widely followed every year</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/10/istock-1466091682-1.jpg</image:loc><image:title>Department of Justice</image:title><image:caption>Sign at the United States Department of Justice in Washington, DC</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/10/istock-1466091682.jpg</image:loc><image:title>Department of Justice</image:title><image:caption>Sign at the United States Department of Justice in Washington, DC</image:caption></image:image><lastmod>2024-10-07T21:45:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/10/07/netizen-joint-venture-company-awarded-12b-defense-logistics-agency-jets-it-services-contract/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/10/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-10-07T18:48:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/09/26/netizen-cybersecurity-bulletin-september-26th-2024/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/09/istock-1874242122.jpg</image:loc><image:title>Zscaler, CrowdStrike, Palo Alto Networks, CyberArk. Assorted American cybersecurity company</image:title><image:caption>Shanghai,China-Dec. 21st 2023: Zscaler, CrowdStrike, Palo Alto Networks, CyberArk. Assorted American cybersecurity company apps</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/09/istock-1354189215.jpg</image:loc><image:title>Robot Hand Trojan Horse Notebook</image:title><image:caption>Robot hand with trojan horse and notebook on the dark background. 3d illustraiton.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/09/screenshot-2024-09-26-122213.png</image:loc><image:title>Screenshot 2024-09-26 122213</image:title></image:image><lastmod>2024-10-03T14:45:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/10/02/you-wouldnt-download-a-car-but-you-could-hack-one-remotely-uncovering-kias-alarming-rce-flaws-2/</loc><lastmod>2024-10-02T13:18:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/10/01/scary-cybersecurity-statistics-for-2024-what-you-need-to-know-during-this-cybersecurity-awareness-month/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/10/istock-860338020.jpg</image:loc><image:title>Anonymous male hacker with pumpkin halloween mask carrying laptop computer</image:title><image:caption>Anonymous male hacker with pumpkin halloween mask carrying laptop computer. Internet security and cyber attack concepts.</image:caption></image:image><lastmod>2024-10-01T17:12:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/09/30/netizen-monday-security-brief-9-30-2024/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/09/istock-1429744367-1.jpg</image:loc><image:title>3D Isometric Flat Vector Conceptual Illustration of Data Breach</image:title><image:caption>3D Isometric Flat Vector Conceptual Illustration of Data Breach, Stealing Data or Cyber Crime</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/09/istock-1826451049.jpg</image:loc><image:title>Ransomware Business Computer Malware Privacy Breach</image:title><image:caption>Ransomware Business Computer Malware Privacy Breach. Data Hacked</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/09/istock-1197369619.jpg</image:loc><image:title>Exterior view of the Microsoft campus building in downtown Bellevue, WA with no people around.</image:title><image:caption>Bellevue, WA / USA - circa December 2019: Exterior view of the Microsoft campus building in downtown Bellevue, WA with no people around.</image:caption></image:image><lastmod>2024-09-30T23:55:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/09/27/netizen-september-2024-vulnerability-review/</loc><lastmod>2024-09-27T18:28:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/09/25/penetration-testing-as-a-service-ptaas-what-is-it-and-how-can-it-benefit-your-organization-2/</loc><lastmod>2024-09-25T17:33:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/09/24/mgm-breach-exposes-a-growing-threat-cybercrimes-shift-to-physical-harm-2/</loc><lastmod>2024-09-25T00:08:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/09/23/netizen-monday-security-brief-9-23-2024/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/09/istock-2165935012.jpg</image:loc><image:title>Software developer builds algorithms to spread CCP government socialist doctrine</image:title><image:caption>Chinese engineer making troll accounts on social media promoting communist ideology. Software developer building algorithms to spread CCP government socialist doctrine, camera A</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/09/istock-1992108596-1.jpg</image:loc><image:title>North Korea Gold Map Shown in Binary Code Pattern. TSMC. Matrix numbers, zero, one.</image:title><image:caption>World Countries Vector Maps. Digital Series</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/09/istock-1992108596.jpg</image:loc><image:title>North Korea Gold Map Shown in Binary Code Pattern. TSMC. Matrix numbers, zero, one.</image:title><image:caption>World Countries Vector Maps. Digital Series</image:caption></image:image><lastmod>2024-09-23T22:44:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/09/20/signal-or-noise-the-chaos-of-chinese-noise-storms/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/09/istock-1176113847.jpg</image:loc><image:title>Cloud with thunders icon from lines, triangles and particle style design. Vector illustration</image:title><image:caption>Cloud with thunders icon from lines, triangles and particle style design. Vector illustration</image:caption></image:image><lastmod>2024-09-20T21:22:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/09/18/chinese-espionage-network-raptor-train-exploits-iot-devices-in-massive-botnet-operation/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/09/istock-2167597319.jpg</image:loc><image:title>Set of Innovative Smart Home Device</image:title><image:caption>Set of Innovative Smart Home Device, Modern Technology, Automation and Connectivity with IoT for Digital Living Spaces, Vector Flat Design Illustration</image:caption></image:image><lastmod>2024-09-18T21:01:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/09/17/netizens-insider-threat-kill-chain-uncovering-and-preventing-internal-risks-2/</loc><lastmod>2024-09-17T21:43:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/09/16/netizen-monday-security-brief-9-16-2024-2/</loc><lastmod>2024-09-16T18:03:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/09/13/penetration-testing-essentials-a-quick-guide-on-preparing-for-a-successful-assessment-2/</loc><lastmod>2024-09-13T16:48:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/09/12/navigating-the-landscape-of-modern-network-security-2/</loc><lastmod>2024-09-12T15:35:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/09/11/devops-and-devsecops-key-differences-and-integrations-2/</loc><lastmod>2024-09-11T16:40:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/09/10/microsoft-september-2024-patch-tuesday-79-vulnerabilities-3-actively-exploited-zero-days/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/09/istock-1408775753.jpg</image:loc><image:title>Microsoft's headquarters in Bucharest, Romania</image:title><image:caption>Bucharest, Romania - June 04, 2022: View of Microsoft Romania headquarters in City Gate Towers situated in Free Press Square, in Bucharest, Romania.</image:caption></image:image><lastmod>2024-09-10T21:45:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/09/09/netizen-monday-security-brief-9-9-2024/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/09/istock-682344086-1.jpg</image:loc><image:title>Group of hooded hackers shining through a digital russian flag</image:title><image:caption>Group of hooded hackers shining through a digital russian flag cybersecurity concept</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/09/istock-682344086.jpg</image:loc><image:title>Group of hooded hackers shining through a digital russian flag</image:title><image:caption>Group of hooded hackers shining through a digital russian flag cybersecurity concept</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/09/istock-1224614085.jpg</image:loc><image:title>Airport security. X-ray luggage scanner, safety frame. Checking baggage inside airport. Public transport safety concept</image:title><image:caption>Airport security. X-ray luggage scanner, safety frame. Checking baggage inside airport. Public transport safety concept. Staff and various passengers. Trendy style vector illustration</image:caption></image:image><lastmod>2024-09-09T13:36:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/08/29/netizen-cybersecurity-bulletin-august-29st-2024/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/08/istock-1739558159-1.jpg</image:loc><image:title>Lake Elsinore, CA, USA - October 14, 2023: Close up of old and new SSN cards</image:title><image:caption>Lake Elsinore, CA, USA - October 14, 2023: Close up of stacked old and new SSN cards</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/08/istock-1739558159.jpg</image:loc><image:title>Lake Elsinore, CA, USA - October 14, 2023: Close up of old and new SSN cards</image:title><image:caption>Lake Elsinore, CA, USA - October 14, 2023: Close up of stacked old and new SSN cards</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/08/istock-1439446516.jpg</image:loc><image:title>Cyber threat from the China. A Chinese hacker at a computer against the background of the colors of the China flag. DDoS attack.</image:title><image:caption>Network security and privacy crime. Computer hacker working on laptop, programming bugs and viruses.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/08/screenshot_20240829_104031_messages.jpg</image:loc><image:title>Screenshot_20240829_104031_Messages</image:title></image:image><lastmod>2024-09-05T13:56:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/09/04/new-nist-fips-standards-set-to-fortify-cryptography-against-quantum-threats-2/</loc><lastmod>2024-09-04T18:15:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/09/03/inside-volt-typhoon-the-chinese-cyber-attackers-targeting-critical-systems/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/08/istock-1159971168.jpg</image:loc><image:title>Illustration idea for cyber attacks targeting China.</image:title><image:caption>Illustration set of flags made from binary code targets.</image:caption></image:image><lastmod>2024-09-03T14:40:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/08/30/netizen-august-2024-vulnerability-review/</loc><lastmod>2024-08-30T14:40:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/08/28/building-a-simple-penetration-testing-drop-box-for-remote-network-assessments-a-guide/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/08/istock-458300299.jpg</image:loc><image:title>Raspberry Pi Circuit Board</image:title><image:caption>Taipei, Taiwan - January 10, 2013: This is a studio shot of a Raspberry Pi circuit board isolated on white.</image:caption></image:image><lastmod>2024-08-28T12:26:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/08/27/a-newly-discovered-vulnerability-in-microsoft-365-copilot-raises-concerns/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/08/istock-1665958185.jpg</image:loc><image:title>Prompt Button on Computer Keyboard</image:title><image:caption>Prompt Button on Computer Keyboard</image:caption></image:image><lastmod>2024-08-27T14:37:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/08/26/netizen-monday-security-brief-8-26-2024/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/08/istock-1308419989.jpg</image:loc><image:title>Smartphone screen with icons of the social network Instagram, Skype, Telegram</image:title><image:caption>MOGILEV, BELARUS-SEPTEMBER 18, 2019: Smartphone screen with icons of the social network Instagram, Skype, Telegram</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/08/istock-1449796370-1.jpg</image:loc><image:title>FBI raid jacket black uniform</image:title><image:caption>FBI raid jacket black uniform background</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/08/istock-1449796370.jpg</image:loc><image:title>FBI raid jacket black uniform</image:title><image:caption>FBI raid jacket black uniform background</image:caption></image:image><lastmod>2024-08-26T12:10:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/08/21/understanding-ddos-attacks-and-how-to-detect-them-a-guide/</loc><lastmod>2024-08-21T15:09:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/08/20/north-koreas-lazarus-apt-exploits-windows-zero-day-with-advanced-rootkit/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/08/istock-1335256261.jpg</image:loc><image:title>Kim II Sung Square</image:title><image:caption>Pyongyang</image:caption></image:image><lastmod>2024-08-20T17:03:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/08/19/netizen-monday-security-brief-8-19-2024/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/08/istock-506591920.jpg</image:loc><image:title>Downtown Flint Michigan Digital Sign</image:title><image:caption>Flint, Michigan, USA - January 23, 2016: Downtown Flint, Michigan and it's digital sign welcoming visitors.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/08/istock-2151893327.jpg</image:loc><image:title>OpenAI ChatGPT, Anthropic Claude and Perplexity mobile APP icons on screen. Assorted AI chatbots</image:title><image:caption>Shanghai,China-May 6th 2024: OpenAI ChatGPT, Anthropic Claude and Perplexity mobile APP icons on screen. Assorted AI chatbots</image:caption></image:image><lastmod>2024-08-20T00:31:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/08/15/ngfw-vs-traditional-firewalls-whats-the-difference/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/07/istock-954544496.jpg</image:loc><image:title>Firewall icon</image:title><image:caption>red brick with fire vector symbol in isometric 3D style</image:caption></image:image><lastmod>2024-08-15T13:55:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/08/13/microsoft-august-2024-patch-tuesday-89-vulnerabilities-6-actively-exploited-zero-days/</loc><lastmod>2024-08-14T04:04:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/09/05/understanding-iso-27001-vs-iso-27002-key-differences-and-applications/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/08/istock-1703718591.jpg</image:loc><image:title>Business Technology ISO standard certification 27001</image:title><image:caption>Business Technology ISO standard certification 27001.</image:caption></image:image><lastmod>2024-08-13T14:41:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/08/11/netizen-monday-security-brief-8-12-2024/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/08/istock-1420513402.jpg</image:loc><image:title>Web browser, internet browser search engine. Search bar for ui ux design and web site. Search address and navigation bar icon. Collection of search form templates for websites</image:title><image:caption>Web browser, internet browser search engine. Search bar for ui ux design and web site. Search address and navigation bar icon. Collection of search form templates for websites</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/08/istock-1429744367.jpg</image:loc><image:title>3D Isometric Flat Vector Conceptual Illustration of Data Breach</image:title><image:caption>3D Isometric Flat Vector Conceptual Illustration of Data Breach, Stealing Data or Cyber Crime</image:caption></image:image><lastmod>2024-08-12T02:47:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/08/09/case-study-2024-knowbe4-north-korean-insider-threat/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/08/istock-653516378.jpg</image:loc><image:title>Korean hacker in front of digital datastream flag</image:title><image:caption>Hacker in a dark red hoody in front of a digital korean flag and binary streams background cybersecurity concept</image:caption></image:image><lastmod>2024-08-10T02:30:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/08/07/esxi-hypervisor-critical-vulnerability-cve-2024-37085-and-ransomware-exploitation/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/07/istock-1372349649.jpg</image:loc><image:title>Application Security Testing Concept - AST - 3D Illustration</image:title><image:caption>Application Security Testing Concept with Digital Magnifying Glass Scanning Applications to Detect Vulnerabilities - AST - Process of Making Apps Resistant to Security Threats - 3D Conceptual Illustration</image:caption></image:image><lastmod>2024-08-07T12:29:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/08/06/open-source-adoption-switzerland-leads-the-way-with-embag-legislation/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/07/istock-1166792344.jpg</image:loc><image:title>Mannlichen viewpoint, Switzerland</image:title><image:caption>Swiss flag waving and tourists admire the peaks of Jungfrau mountain on a Mannlichen viewpoint, Bernese Oberland Switzerland</image:caption></image:image><lastmod>2024-08-06T05:35:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/08/05/netizen-monday-security-brief-8-5-2024/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/07/istock-1137730846.jpg</image:loc><image:title>Chinese national internet security. Chinese hacker. Laptop with binary computer code and china flag on the screen.</image:title><image:caption>Internet and network security.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/07/istock-1419273537.jpg</image:loc><image:title>Microsoft headquarter and offices in City Gate Towers in the Northern part of the city</image:title><image:caption>Bucharest, Romania - 6 November 2021: Microsoft headquarter and offices in City Gate Towers in the Northern part of the city in a sunny autumn day</image:caption></image:image><lastmod>2024-08-05T15:25:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/07/31/netizen-cybersecurity-bulletin-july-31st-2024/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/07/istock-1255728449.jpg</image:loc><image:title>Crowdstrike headquarters in Silicon Valley</image:title><image:caption>July 8, 2020 Sunnyvale / CA / USA - Crowdstrike headquarters in Silicon Valley; CrowdStrike Holdings, Inc. is a cyber-security technology company</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/07/istock-1353816577.jpg</image:loc><image:title>Mobile display with logo of Facebook, WhatsApp and Instagram apps in hand against blurred META logotype on white monitor</image:title><image:caption>Smartphone display with logo of Facebook, WhatsApp and Instagram apps in hand against blurred META logotype on white monitor background: Tallinn, Estonia - October 29, 2021</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/07/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-07-31T12:51:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/08/16/building-a-career-in-cybersecurity-entry-level-roles-guide/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/07/istock-1307598870.jpg</image:loc><image:title>Male indian hr, recruiter or employer holding cv having online virtual job interview meeting with african candidate on video call. Distance remote recruitment conference chat. Over shoulder view.</image:title><image:caption>Male indian hr, recruiter or employer holding cv having online virtual job interview meeting with african candidate on video call. Distance remote recruitment conference chat. Over shoulder view.</image:caption></image:image><lastmod>2024-07-30T04:32:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/07/30/netizen-july-2024-vulnerability-review/</loc><lastmod>2024-07-30T03:38:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/07/29/gxc-team-elevating-malware-as-a-service-with-ai-powered-phishing-kits/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/07/istock-1746666469.jpg</image:loc><image:title>Robot peepping from computer monitor vector illustration</image:title><image:caption>Robot peepping from computer monitor. Surveillance, artifical intelligence anxiety, internet spying concept. Vector illustration.</image:caption></image:image><lastmod>2024-07-29T19:04:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/08/14/analyzing-the-autonomy-of-gpt-4-in-exploiting-one-day-and-zero-day-vulnerabilities/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/07/istock-1911666393.jpg</image:loc><image:title>Black and white background icon logo illustration</image:title><image:caption>Black and white background icon logo illustration</image:caption></image:image><lastmod>2024-07-29T14:05:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/08/08/understanding-policy-enforcement-points-pep/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/07/istock-701055376.jpg</image:loc><image:title>Blue Chip Manager Unlocking Access Control</image:title><image:caption>Blue chip manager is unlocking a virtual locking mechanism to access shared cloud resources. Internet concept for identity &amp; access management, cloud storage, cybersecurity and managed services.</image:caption></image:image><lastmod>2024-07-29T14:05:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/08/22/the-significance-of-soc-2-data-security-and-customer-trust/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/07/istock-2159939073.jpg</image:loc><image:title>Cyber security team working in a Cyber Security Operations Center SOC to protect systems and technologies</image:title><image:caption>Cyber security team working in a Cyber Security Operations Center (SOC). Woman work as Chief Information Security Officer (CISO) and manager pointing on a real time map.</image:caption></image:image><lastmod>2024-07-29T13:31:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/07/24/researchers-uncover-unfixable-vulnerability-in-all-arm-cpus/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/07/istock-1419821776.jpg</image:loc><image:title>Future central processing unit,working processing technology,Nanotechnology Computing,Conceptual CPU on circuit board,3d rendering</image:title><image:caption>Future central processing unit,working processing technology,Nanotechnology Computing,Conceptual CPU on circuit board,3d rendering</image:caption></image:image><lastmod>2024-07-24T12:40:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/07/19/crowdstrike-falcon-sensor-update-triggers-global-bsod-crisis/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/07/istock-1874242122.jpg</image:loc><image:title>Zscaler, CrowdStrike, Palo Alto Networks, CyberArk. Assorted American cybersecurity company</image:title><image:caption>Shanghai,China-Dec. 21st 2023: Zscaler, CrowdStrike, Palo Alto Networks, CyberArk. Assorted American cybersecurity company apps</image:caption></image:image><lastmod>2024-07-19T15:46:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/07/22/atlassian-patches-high-severity-vulnerabilities-in-bamboo-confluence-and-jira/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/07/istock-1458178594.jpg</image:loc><image:title>Update software system in computer. Man using smartphone upgrade program, Business technology internet loading virtual bar with installing the update for the quality better.</image:title><image:caption>Update software system in computer. Man using smartphone upgrade program, Business technology internet loading virtual bar with installing the update for the quality better.</image:caption></image:image><lastmod>2024-07-19T02:34:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/07/26/fbi-announces-operation-endgame-a-major-blow-to-international-cybercrime-network/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/07/istock-638303630.jpg</image:loc><image:title>FBI, Federal Bureau of Investigation Headquarters, on Pennsylvania avenue</image:title><image:caption>Washington Dc, United States - December 29, 2016: FBI, Federal Bureau of Investigation Headquarters, on Pennsylvania avenue sign with traffic reflections at night</image:caption></image:image><lastmod>2024-07-18T23:26:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/07/18/critical-vulnerabilities-in-ivanti-endpoint-manager-and-endpoint-manager-for-mobile/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/07/istock-942201110.jpg</image:loc><image:title>Set of mysql queries in a database management software.</image:title><image:caption>Set of mysql queries in a database management software. Querying and updating an SQL database, PHP script for updating</image:caption></image:image><lastmod>2024-07-18T13:34:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/07/25/what-is-mib-management-information-base/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/07/istock-1360364728.jpg</image:loc><image:title>SNMP - Simple Network Management Protocol acronym</image:title><image:caption>SNMP - Simple Network Management Protocol acronym. business concept background.  vector illustration concept with keywords and icons. lettering illustration with icons for web banner, flyer, landing</image:caption></image:image><lastmod>2024-07-18T13:25:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/07/23/cdk-globals-25-million-ransomware-payment-and-its-auto-industry-disruption/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/07/istock-1222202086.jpg</image:loc><image:title>CDK Global logo on their headquarters for Prague.</image:title><image:caption>Picture of a sign with the logo of CDK Global taken in front of their main office for Prague, Czech Republic. Formerly called ADP Dealer Services, CDK Global provides integrated technology services and solutions to over 27,000 automotive dealerships internationally, as well as vehicle manufacturers.</image:caption></image:image><lastmod>2024-07-18T03:22:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/07/19/federal-court-ruling-corporate-liability-for-law-firm-data-breaches/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/07/istock-1331136571.jpg</image:loc><image:title>Cyber security data protection business technology privacy concept. Data breach</image:title><image:caption>Cyber security data protection business technology privacy concept. Data breach</image:caption></image:image><lastmod>2024-07-18T01:25:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/05/01/netizen-april-vulnerability-review-2/</loc><lastmod>2024-07-17T17:39:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/01/30/netizen-january-vulnerability-review-2/</loc><lastmod>2024-07-17T16:39:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/02/21/lockbit-ransomware-network-compromised-by-nca-in-international-cyber-operation/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/02/istock-1179333131.jpg</image:loc><image:title>HUD and Shield Icon of Cyber Security. Circuit board data transfer. Digital Data Network Protection. Future Technology Network Concept.</image:title><image:caption>HUD and Shield Icon of Cyber Security. Circuit board data transfer. Digital Data Network Protection. Future Technology Network Concept.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/02/istock-1450723537-1.jpg</image:loc><image:title>Network connection concept. Zero trust security model. Secure network. 3d render.</image:title><image:caption>Network connection concept. Zero trust security model. Secure network. 3d render..</image:caption></image:image><lastmod>2024-07-17T16:37:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/02/05/cloroxs-august-2023-cyberattack-a-49-million-update/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/02/istock-1222084657.jpg</image:loc><image:title>Container of alcohol sanitizing wipes, top view over a blue</image:title><image:caption>Container of alcohol sanitizing wipes. Top view against a blue background.</image:caption></image:image><lastmod>2024-07-17T16:36:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/02/29/netizen-february-vulnerability-review-2/</loc><lastmod>2024-07-17T16:33:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/06/24/alleged-leader-of-scattered-spider-hacking-group-arrested-in-spain/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/06/istock-1262026435.jpg</image:loc><image:title>Spain national flag waving in the wind against deep blue sky. High quality fabric. International relations concept.</image:title><image:caption>Spain national flag waving in the wind against deep blue sky. High quality fabric. International relations concept.</image:caption></image:image><lastmod>2024-07-17T16:32:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/03/21/windows-server-march-2024-updates-trigger-domain-controller-crashes/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/03/istock-1341937940.jpg</image:loc><image:title>Microsoft's headquarters in Bucharest, Romania</image:title><image:caption>Bucharest, Romania - July 25, 2021: View of Microsoft Romania headquarters in City Gate Towers situated in Free Press Square, in Bucharest, Romania.</image:caption></image:image><lastmod>2024-07-17T16:29:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/03/27/u-s-justice-department-charges-seven-with-cyber-espionage-in-connection-to-chinese-apt31-hacking-group/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/03/istock-1409878758.jpg</image:loc><image:title>USA Flag with FBI (Federal Bureau Of Investigation) Flag on a Pole, 3D Render, Two Flags</image:title><image:caption>USA Flag vs FBI Flag on a Pole, 3D Render, Two Flags together</image:caption></image:image><lastmod>2024-07-17T16:28:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/04/01/netizen-march-vulnerability-review-2/</loc><lastmod>2024-07-17T16:27:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/07/17/security-flaw-in-squarespace-migration-leads-to-multiple-domain-hijackings/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/07/istock-1997022749.jpg</image:loc><image:title>SEO ranking and website digital marketing strategy. Build page, domain, backlinks and topical authority. Horizontal seo header, outline vector illustration with icons on white background</image:title><image:caption>SEO ranking and website digital marketing strategy. Build page, domain, backlinks and topical authority. Horizontal seo header, outline vector illustration with icons on white background.</image:caption></image:image><lastmod>2024-07-17T12:31:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/07/16/expanding-on-the-openssh-vulnerability-new-findings-and-continued-risks/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/07/istock-1167132876.jpg</image:loc><image:title>Blur lighting of server panel with red locked key icon for data protection and security concept</image:title><image:caption>Blur lighting of server panel with red locked key icon for data protection and security concept</image:caption></image:image><lastmod>2024-07-16T13:52:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2023/09/25/f-117-nighthawk-flight-manual-added-to-the-list-of-war-thunder-leaked-documents/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/09/istock-1390249765.jpg</image:loc><image:title>Compliance with internal regulations. Basic rules of employees in the company. Law regulation and compliance rules  policy.</image:title><image:caption>Compliance with internal regulations. Basic rules of employees in the company. Law regulation and compliance rules  policy</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/09/wtf3-1.webp</image:loc><image:title>wtf3-1</image:title></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/09/wtf1-1.webp</image:loc><image:title>wtf1-1</image:title></image:image><lastmod>2024-07-16T05:21:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/07/15/hackers-reverse-engineer-ticketmaster-bypassing-anti-scalping-measures-on-non-transferable-tickets/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/07/istock-1497141020.jpg</image:loc><image:title>Businessman Hand Buy Ticket. Ticket Scalper Symbol Cartoon Illustration Vector</image:title><image:caption>Businessman Hand Buy Ticket. Ticket Scalper Symbol Cartoon Illustration Vector</image:caption></image:image><lastmod>2024-07-15T14:56:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/07/13/major-data-breach-hits-att-what-you-need-to-know/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/07/istock-1307043371.jpg</image:loc><image:title>AT&amp;T cell phone retail store. Amid new Social Distancing rules, AT&amp;T is offering curbside service.</image:title><image:caption>Shelbyville - Circa July 2020: AT&amp;T cell phone retail store. Amid new Social Distancing rules, AT&amp;T is offering curbside service.</image:caption></image:image><lastmod>2024-07-13T23:06:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/07/12/acas-optimizing-vulnerability-management-and-threat-mitigation/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/07/istock-1248867263.jpg</image:loc><image:title>Compliance rule law and regulation graphic interface for business quality policy</image:title><image:caption>Compliance rule law and regulation graphic interface for business quality policy planning to meet international standard.</image:caption></image:image><lastmod>2024-07-09T16:02:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/07/09/corporate-chatbots-at-risk-insights-from-a-twitter-thread-on-llm-input-handling/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/07/screenshot-2024-07-09-113713.jpg</image:loc><image:title>Screenshot 2024-07-09 113713</image:title></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/07/screenshot-2024-07-09-113713.png</image:loc><image:title>Screenshot 2024-07-09 113713</image:title></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/07/istock-1316434910.jpg</image:loc><image:title>Chatbot assistant, Ai Artificial Intelligence</image:title><image:caption>Chatbot conversation, Ai Artificial Intelligence technology, internet virtual assistant on smart phone screen, online customer support website or social media network</image:caption></image:image><lastmod>2024-07-09T15:43:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/07/11/radius-protocol-vulnerability-blastradius-exposes-networks-to-mitm-attacks/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/07/istock-1969853976.jpg</image:loc><image:title>Concept of cyber security in two-step verification, multi-factor authentication, information security, encryption, secure access to user's personal information, secure Internet access, cybersecurity.</image:title><image:caption>Concept of cyber security in two-step verification, multi-factor authentication, information security, encryption, secure access to user's personal information, secure Internet access, cybersecurity.</image:caption></image:image><lastmod>2024-07-09T14:11:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/07/09/rockyou2024-massive-password-leak-exposes-10-billion-passwords/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/07/istock-163124577.jpg</image:loc><image:title>log in box</image:title><image:caption>Password box  in Internet Browser on Computer Screen</image:caption></image:image><lastmod>2024-07-08T14:35:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/07/08/understanding-rogue-systems-impact-on-security-and-detection-methods/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/07/istock-2155218142.jpg</image:loc><image:title>System hacked alert after cyber attack on laptop computer network. compromised information concept. internet virus cyber security and cybercrime. hackers to steal the information is a cybercriminal.</image:title><image:caption>System hacked alert after cyber attack on laptop computer network. compromised information concept. internet virus cyber security and cybercrime. hackers to steal the information is a cybercriminal.</image:caption></image:image><lastmod>2024-07-08T13:49:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/07/04/4th-of-july-cybersecurity-proactive-measures-to-safeguard-your-business/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/07/istock-1386319163.jpg</image:loc><image:title>Star icon in the screen.</image:title><image:caption>Binary code ( array of bits ) in the screen. 3D Illustration.</image:caption></image:image><lastmod>2024-07-04T14:50:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/07/03/chrome-127-and-above-to-block-entrust-and-affirmtrust-certificates-starting-november-2024/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/07/istock-1161565599.jpg</image:loc><image:title>Mannheim, Baden Württemberg / Germany 07 12 2019 Apple iPhone XS Display with</image:title><image:caption>Mannheim, Baden Württemberg / Germany 07 12 2019 Apple iPhone XS Display with</image:caption></image:image><lastmod>2024-07-03T14:03:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/07/05/chinese-state-backed-hackers-exploit-newly-patched-zero-day-vulnerability-in-cisco-nexus-switches/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/07/istock-1957509379.jpg</image:loc><image:title>Chinese Spyware - American Network Security - Hacking - Microchip</image:title><image:caption>Concept exploring the ever-present threat of China to American National Security.  A human finger holders a microchip with a Chinese flag on it against the backdrop of motherboard and the United States Capitol</image:caption></image:image><lastmod>2024-07-02T17:55:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/07/02/netizen-cybersecurity-bulletin-june-31st-2024/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/07/istock-1347272521.jpg</image:loc><image:title>Children's Hospital of Chicago</image:title><image:caption>People walk by Ann and Robert H Lurie Children's Hospital of Chicago.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/07/istock-916553110-1.jpg</image:loc><image:title>Bitcoin mining farm. IT hardware.</image:title><image:caption>Bitcoin mining farm. IT hardware. Electronic devices with fans. Cryptocurrency miners.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/07/istock-916553110.jpg</image:loc><image:title>Bitcoin mining farm. IT hardware.</image:title><image:caption>Bitcoin mining farm. IT hardware. Electronic devices with fans. Cryptocurrency miners.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/07/media.png</image:loc><image:title>media</image:title></image:image><lastmod>2024-07-02T16:36:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/07/01/cve-2024-6387-regresshion-vulnerability/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/07/q-regresshion-1200x628-1-2.webp</image:loc><image:title>Q-regreSSHion-1200x628-1</image:title></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/07/q-regresshion-1200x628-1-1.webp</image:loc><image:title>Q-regreSSHion-1200x628-1</image:title></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/07/q-regresshion-1200x628-1.webp</image:loc><image:title>Q-regreSSHion-1200x628-1</image:title></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/07/istock-851574848.jpg</image:loc><image:title>Internet security</image:title><image:caption>Computer keyboard and padlock as a symbol of Internet security</image:caption></image:image><lastmod>2024-07-01T22:12:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/07/01/microsoft-engineer-leaks-4gb-of-playready-internal-code-on-developer-community-forum/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/07/istock-1267185125.jpg</image:loc><image:title>Microsoft Edge</image:title><image:caption>Bangkok, Thailand - August 20, 2020 : Computer user touching on Microsoft Edge, a web browser developed by Microsoft, icon on Windows 10 to open the program.</image:caption></image:image><lastmod>2024-07-01T13:23:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/06/28/netizen-june-2024-vulnerability-review/</loc><lastmod>2024-06-25T17:21:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/06/27/cisa-publishes-new-guidelines-for-transitioning-from-vpns-to-advanced-security-models/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/06/istock-1485284163.jpg</image:loc><image:title>close up soldier man hand check authorization to access security data with virtual icon on laptop for military operation control system concept</image:title><image:caption>close up soldier man hand check authorization to access security data with virtual icon on laptop for military operation control system concept</image:caption></image:image><lastmod>2024-06-25T14:31:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/06/24/ransomware-group-lockbit-threatens-federal-reserve-alleges-theft-of-banking-secrets/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/06/istock-1495157445.jpg</image:loc><image:title>Vintage silver lock highlighted by a spotlight and projected a shadow on computer source codes. Illustration of the concept of security and safety of computer programming source codes</image:title><image:caption>Vintage silver lock highlighted by a spotlight and projected a shadow on computer source codes. Illustration of the concept of security and safety of computer programming source codes</image:caption></image:image><lastmod>2024-06-24T23:13:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/06/26/understanding-identity-and-access-management-iam/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/06/istock-1061031762.jpg</image:loc><image:title>Identity Access Management Fingerprint Entry 3d Illustration</image:title><image:caption>Identity Access Management Fingerprint Entry 3d Illustration Shows Login Access Iam Protection With Secure System Verification</image:caption></image:image><lastmod>2024-06-23T07:47:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/06/25/siprnet-and-its-role-in-military-communication-security/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/06/istock-1355657756.jpg</image:loc><image:title>Military Surveillance Officer Working on a City Tracking Operation in a Central Office Hub for Cyber Control and Monitoring for Managing National Security, Technology and Army Communications.</image:title><image:caption>Military Surveillance Officer Working on a City Tracking Operation in a Central Office Hub for Cyber Control and Monitoring for Managing National Security, Technology and Army Communications.</image:caption></image:image><lastmod>2024-06-18T16:54:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/06/21/china-linked-velvet-ant-uses-f5-big-ip-malware-in-cyber-espionage-campaign/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/06/istock-1412363956.jpg</image:loc><image:title>Flag of China painted on a cracked wall. Chinese real estate and debt crisis</image:title><image:caption>Flag of China painted on a cracked wall. Chinese real estate and debt crisis</image:caption></image:image><lastmod>2024-06-18T15:31:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/06/18/microsofts-patch-tuesday-june-2024-recall-edition/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/06/istock-1509310383.jpg</image:loc><image:title>Facade of the French headquarters of Microsoft, Issy-les-Moulineaux, France</image:title><image:caption>Issy-les-Moulineaux, France - July 2, 2023: Facade of the French headquarters of Microsoft, an American multinational that develops, manufactures, licenses and markets computer software</image:caption></image:image><lastmod>2024-06-18T15:09:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/06/20/netizen-top-tier-vciso-services-for-business-security-needs/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/06/istock-1284128076.jpg</image:loc><image:title>CISO - chief information security officer  acronym  business concept background.</image:title><image:caption>CISO - chief information security officer  acronym  business concept background. vector illustration concept with keywords and icons. lettering illustration with icons for web banner, flyer, landing page</image:caption></image:image><lastmod>2024-06-14T16:58:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/06/19/sophisticated-smishing-scheme-utilizing-makeshift-cellphone-tower-uncovered-in-london/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/06/istock-146913672.jpg</image:loc><image:title>telecommunications tower</image:title><image:caption>dishes on a telecommunications pylon at the sunset</image:caption></image:image><lastmod>2024-06-11T17:18:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/06/17/mathjax-latex-exploit-github-users-use-css-injection-for-profile-customization/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/06/istock-1250984508.jpg</image:loc><image:title>CSS stylesheet on a screen, programming concept</image:title><image:caption>Programming concept, code on a monitor, CSS stylesheet</image:caption></image:image><lastmod>2024-06-11T16:24:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/06/14/php-cve-2024-4577-vulnerability-analysis-impact-and-mitigation/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/06/istock-1369133274.jpg</image:loc><image:title>red glowing computer bug on infected chip in cyberspace 3d render.</image:title><image:caption>red glowing computer bug on infected chip in cyberspace 3d render.</image:caption></image:image><lastmod>2024-06-11T15:10:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/06/12/dod-unveils-cmmc-2-0-streamlining-cybersecurity-compliance-for-defense-contractors/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/06/istock-1736038018-1.jpg</image:loc><image:title>Aerial view of the US Department of Defense and Arlington Cemetery under the wing.</image:title><image:caption>The Pentagon</image:caption></image:image><lastmod>2024-06-11T15:09:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/06/13/essential-techniques-for-detecting-and-preventing-common-shell-attacks-in-it-security/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/06/istock-1270030225.jpg</image:loc><image:title>Command line icons that represent programming or source code</image:title><image:caption>Code icon. With outline and glyph style. Best usage as user interface, infographic element, app icon, web icon, etc.</image:caption></image:image><lastmod>2024-06-09T23:41:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/04/19/detailed-analysis-of-penetration-testing-and-vulnerability-assessments-in-organizational-security-protocols/</loc><lastmod>2024-06-05T04:37:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2023/10/30/netizen-october-vulnerability-review-2/</loc><lastmod>2024-06-05T04:34:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2023/08/27/netizen-cybersecurity-bulletin-august-28th-2023/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/08/istock-1489412738.jpg</image:loc><image:title>Hackers scam online user data in private folder documents in laptop screen on dark purple neon background.</image:title><image:caption>Hackers scam online user data in private folder documents in laptop screen. Cybercrime cyber security hack Identity theft. 3d render illustration.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/08/fake-paypal-email.png</image:loc><image:title>fake-paypal-email</image:title></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/08/istock-1298004318.jpg</image:loc><image:title>Bitcoin as a bait. Blockchain cryptocurrency trap. Free money concept. Bitcoin on the hook. Copy space</image:title><image:caption>Bitcoin as a bait. Blockchain cryptocurrency trap. Free money concept. Bitcoin on the hook. Copy space</image:caption></image:image><lastmod>2024-06-05T04:33:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2023/09/29/netizen-september-vulnerability-review-2/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/09/netizen_logo-2.png</image:loc><image:title>netizen_logo-2</image:title></image:image><lastmod>2024-06-05T04:32:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2023/08/22/google-dorking-how-a-simple-google-search-can-expose-your-sensitive-data/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/08/istock-980487750.jpg</image:loc><image:title>Magnifying Glass on computer technology background. 3d illustration</image:title><image:caption>3d rendering of Magnifying Glass on digital human hacker image, concept of cyber criminal,hacker 
and ransomeware.</image:caption></image:image><lastmod>2024-06-05T04:31:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2023/11/27/netizen-november-vulnerability-review-2/</loc><lastmod>2024-06-05T04:29:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2023/12/28/netizen-december-vulnerability-review-2/</loc><lastmod>2024-06-05T04:29:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/05/31/netizen-may-vulnerability-review-2/</loc><lastmod>2024-06-05T04:26:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/06/06/largest-botnet-ever-arrest-of-911-s5-operator/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/06/istock-647345160.jpg</image:loc><image:title>woman holding notebook app vpn creation Internet protocols protection network</image:title><image:caption>woman holding notebook with app vpn creation Internet protocols for protection private network</image:caption></image:image><lastmod>2024-06-05T04:06:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/06/11/the-importance-of-phishing-training-safeguarding-sensitive-information-reducing-data-breach-risk/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/06/istock-1411786403.jpg</image:loc><image:title>Blocking spam e-mail, warning pop-up for phishing mail, network security concept. Business woman working on laptop computer at home with warning window</image:title><image:caption>Blocking spam e-mail, warning pop-up for phishing mail, network security concept. Business woman working on laptop computer at home with warning window on screen</image:caption></image:image><lastmod>2024-06-05T04:06:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/06/10/blockchain-security-the-power-of-cryptographic-algorithms/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/06/istock-935705246.jpg</image:loc><image:title>Diagonal chain, a blockchain concept, gray closeup</image:title><image:caption>Diagonal chain made of zeros and ones. Cryptocurrency and mining. A bitcoin metaphor. Gray background. A close up. 3d rendering mock up</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/06/f6ffpxhxaaa-kln.png</image:loc><image:title>F6FfPxHXAAA-KLN</image:title></image:image><lastmod>2024-06-04T16:54:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/06/07/understanding-security-information-and-event-management-siem/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/06/istock-1322543689.jpg</image:loc><image:title>Warning of spam data, insecure connection orrus. Vector illustration</image:title><image:caption>Warning of spam data, insecure connection orrus. Vector illustration</image:caption></image:image><lastmod>2024-06-04T16:47:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/06/05/enhancing-federal-ip-address-security-national-cyber-director-cokers-strategy/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/06/istock-1346388964.jpg</image:loc><image:title>File transfer folder from computer pc to other computer pc on world map background</image:title><image:caption>File transfer folder from computer pc to other computer pc on world map background vector illustration</image:caption></image:image><lastmod>2024-06-04T16:46:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/03/28/cisa-alerts-on-newly-exploited-microsoft-sharepoint-vulnerability-cve-2023-24955/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/03/istock-1470693396.jpg</image:loc><image:title>Exchange information and data with internet cloud technology.FTP(File Transfer Protocol) files receiver and computer backup copy. File sharing isometric.</image:title><image:caption>Exchange information and data with internet cloud technology.FTP(File Transfer Protocol) files receiver and computer backup copy. File sharing isometric</image:caption></image:image><lastmod>2024-06-04T16:38:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/03/28/sam-bankman-frieds-25-year-sentencing-the-necessity-for-stronger-aml-and-cft-regulations-in-cryptocurrency/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/03/istock-1440787740.jpg</image:loc><image:title>Popular cryptocurrency trading applications</image:title><image:caption>Bangkok, Thailand - November 11, 2022 : iPhone 13 showing its screen with FTX, Binance, Crypto.com, Zipmex, popular cryptocurrency trading applications.</image:caption></image:image><lastmod>2024-06-04T16:33:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/04/02/netizen-cybersecurity-bulletin-march-31st-2024/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/04/istock-1416956529.jpg</image:loc><image:title>Health Insurance claim form on desk</image:title><image:caption>Health Insurance claim form and stethoscope on desk</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/04/istock-1432154083.jpg</image:loc><image:title>Panda Bag Logo Negative Space Concept Vector Template. Panda Holding Bag Symbol</image:title><image:caption>Panda Bag Logo Negative Space Concept Vector Template. Panda Holding Bag Symbol</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/04/phishing-text-2-days-after-ordering-a-package-from-tension-v0-9xxar9gn6qmc1-copy.webp</image:loc><image:title>phishing-text-2-days-after-ordering-a-package-from-tension-v0-9xxar9gn6qmc1-copy</image:title></image:image><lastmod>2024-06-04T16:31:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/04/03/cve-2024-3094-the-backdoor-impacting-versions-5-6-0-and-5-6-1-of-xz-utils/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/04/istock-576581752.jpg</image:loc><image:title>Backdoor to access the code</image:title><image:caption>Door in a wall in a black room textured with hexagons leading to a computer code  background 3D illustration backdoor concept</image:caption></image:image><lastmod>2024-06-04T16:28:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/04/04/the-http-2-continuation-flood-a-new-era-of-denial-of-service-threats-emerges/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/04/istock-847321716.jpg</image:loc><image:title>Macro shot of computer screen with http:// address bar and web browser</image:title><image:caption>Macro shot of computer screen with http:// address bar and web browser close up image</image:caption></image:image><lastmod>2024-06-04T16:25:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/04/05/ransomware-attack-triggers-panera-breads-nationwide-it-outage/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/04/istock-1327299222.jpg</image:loc><image:title>Panera Bread Retail Location. Panera is a chain of fast casual restaurants offering Free WiFi.</image:title><image:caption>Cincinnati - Circa July 2021: Panera Bread Retail Location. Panera is a chain of fast casual restaurants offering Free WiFi.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/04/istock-847321716-1.jpg</image:loc><image:title>Macro shot of computer screen with http:// address bar and web browser</image:title><image:caption>Macro shot of computer screen with http:// address bar and web browser close up image</image:caption></image:image><lastmod>2024-06-04T16:23:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/04/09/sequence-of-events-and-strategic-overview-of-the-xz-compression-library-backdoor/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/04/istock-635901432.jpg</image:loc><image:title>Backdoor in a binary wall concept</image:title><image:caption>Stairs leading up to an exit in a wall with blue glowing digital datastreams backdoor concept 3D illustration</image:caption></image:image><lastmod>2024-06-04T16:23:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/04/10/the-loop-dos-attack-a-new-threat-to-udp-based-protocols/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/04/istock-1367041336.jpg</image:loc><image:title>CDN - Content Delivery Network - 3D Illustration</image:title><image:caption>CDN - Content Delivery Network - Content Distribution Network - A Network of Proxy Server and Data Center Locations Distributed Throughout the World - 3D Illustration</image:caption></image:image><lastmod>2024-06-04T16:22:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/04/15/palo-alto-networks-acts-on-zero-day-vulnerability-in-pan-os-firewalls/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/04/istock-1086528942.jpg</image:loc><image:title>Concept on Penetration testing</image:title><image:caption>Concept on Penetration testing, exploits and vulnerabilities</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/04/istock-1367041336-1.jpg</image:loc><image:title>CDN - Content Delivery Network - 3D Illustration</image:title><image:caption>CDN - Content Delivery Network - Content Distribution Network - A Network of Proxy Server and Data Center Locations Distributed Throughout the World - 3D Illustration</image:caption></image:image><lastmod>2024-06-04T16:21:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/04/16/analysis-of-cve-2024-31497-biased-ecdsa-nonce-generation-in-putty/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/04/istock-1371954841.jpg</image:loc><image:title>Vector of a businesspeople working on computers online securely interconnected</image:title><image:caption>Vector of a business people working on computers online securely interconnected</image:caption></image:image><lastmod>2024-06-04T16:21:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/04/17/telegram-responds-to-python-script-execution-vulnerability-in-windows-app/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/04/istock-1291641896.jpg</image:loc><image:title>Program code on computer display in magnifying glass. Close-up.</image:title><image:caption>Program code on computer display in magnifying glass. Close-up. High quality photo</image:caption></image:image><lastmod>2024-06-04T16:20:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/04/18/invasive-data-scraping-service-spy-pet-sells-discord-user-data-for-as-low-as-5/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/04/istock-1440144085.jpg</image:loc><image:title>Twitter and Its Alternatives Including Mastodon</image:title><image:caption>Portland, OR, USA - Nov 8, 2022: App icons of Twitter and some of its alternatives, including Mastodon, Discord, Facebook, Reddit, Parler, and Truth Social, are seen on an iPhone. Mastodon, a decentralized social media platform, is rapidly gaining users after Elon Musk's Twitter takeover.</image:caption></image:image><lastmod>2024-06-04T16:19:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/04/24/enhanced-cybersecurity-measures-for-defense-contractors-through-new-pentagon-initiative/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/04/istock-1736038018.jpg</image:loc><image:title>Aerial view of the US Department of Defense and Arlington Cemetery under the wing.</image:title><image:caption>The Pentagon</image:caption></image:image><lastmod>2024-06-04T16:16:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/04/25/ciscos-arcanedoor-campaign-an-analysis-of-the-exploitation-of-firewall-vulnerabilities/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/04/istock-1146714788.jpg</image:loc><image:title>CISCO headquarters in Silicon Valley</image:title><image:caption>April 27, 2019 San Jose / CA / USA - CISCO sign in front of the headquarters in Silicon Valley, San Francisco bay area</image:caption></image:image><lastmod>2024-06-04T16:07:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/04/26/the-legal-and-security-perils-of-using-cracks-and-keygens/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/04/istock-1399269076.jpg</image:loc><image:title>Online and internet piracy</image:title><image:caption>Computer with pirate skull on red screen downloading files illegally from internet. Vector illustration</image:caption></image:image><lastmod>2024-06-04T16:07:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/04/29/the-escalation-of-cyber-attacks-in-ukraine-using-old-vulnerabilities-and-new-methods/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/04/istock-1373018986.jpg</image:loc><image:title>Cyber attack in Ukraine concept. Ukrainian flag background. Russia hacker</image:title><image:caption>Cyber attack in Ukraine concept. Ukrainian flag background. Russia hacker</image:caption></image:image><lastmod>2024-06-04T16:05:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/05/03/netizen-cybersecurity-bulletin-april-31st-2024/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/05/istock-516392301.jpg</image:loc><image:title>man refusing to sign a document</image:title><image:caption>man refusing to sign a document</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/05/istock-896769142.jpg</image:loc><image:title>Hand to operate laptop remotely. isolated.</image:title><image:caption>Hand to operate laptop remotely</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/05/2024-05-03-23_00_32-fw_-thank-you-for-your-order-ve69fh6o2j5arrv3p0rtfi-riceinabowl6840gmail.com-.png</image:loc><image:title>2024-05-03-23_00_32-fw_-thank-you-for-your-order-ve69fh6o2j5arrv3p0rtfi-riceinabowl6840gmail.com-</image:title></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/05/3dhzel4nvjuc1.jpeg</image:loc><image:title>3dhzel4nvjuc1</image:title></image:image><lastmod>2024-06-04T16:04:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/05/05/understanding-google-chromes-shift-to-post-quantum-cryptography-and-its-impact-on-tls/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/05/istock-1530973530.jpg</image:loc><image:title>software development concept</image:title><image:caption>abstract network with random programming code, web and software development concept, futuristic technology, digital connectivity, cyber space (3d render)</image:caption></image:image><lastmod>2024-06-04T16:03:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/05/07/integrating-it-security-into-sox-compliance-strategies-for-protecting-financial-integrity/</loc><lastmod>2024-06-04T16:02:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/05/08/gdpr-compliance-for-cloud-services-comprehensive-strategies-for-data-protection-transfer-and-sovereignty/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/05/istock-1440729878.jpg</image:loc><image:title>GDPR General data protection regulation symbol icon</image:title><image:caption>GDPR General data protection regulation symbol icon</image:caption></image:image><lastmod>2024-06-04T15:57:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/05/08/global-law-enforcement-actions-against-lockbit-ransomware-admin/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/05/istock-1833024723.jpg</image:loc><image:title>Cyber security technology concept , Shield With Keyhole icon  , personal data ,</image:title><image:caption>vector</image:caption></image:image><lastmod>2024-06-04T15:56:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/05/13/securing-e-commerce-transactions-a-comprehensive-guide-to-pci-dss-compliance/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/05/istock-862597222.jpg</image:loc><image:title>Hand using EDC machine for a credit card.</image:title><image:caption>Close up a man using EDC machine for credit card at cashier counter</image:caption></image:image><lastmod>2024-06-04T15:53:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/05/14/mitre-unveils-emb3d-threat-model-for-embedded-systems-security/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/05/istock-1040411616.jpg</image:loc><image:title>Real Java Script code developing screen. Programing workflow abstract algorithm concept. Closeup of Java Script and HTML code.</image:title><image:caption>Real Java Script code developing screen. Programing workflow abstract algorithm concept. Closeup of Java Script and HTML code.</image:caption></image:image><lastmod>2024-06-04T15:53:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/05/15/expanding-ai-applications-in-federal-agencies-coding-and-chat-functionalities/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/05/istock-1960986400.jpg</image:loc><image:title>Regulating Artificial Intelligence - Ai</image:title><image:caption>Photo of the United States Capitol with overlayed computer circuitry.  The Intersection of freedom and artificial intelligence</image:caption></image:image><lastmod>2024-06-04T15:52:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/05/16/ssid-confusion-attack-implications-exploitation-and-solutions-for-cve-2023-52424/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/05/istock-647392304.jpg</image:loc><image:title>view on the ports of an internet wifi wireless router</image:title><image:caption>detail of the ports of a wlan internet router</image:caption></image:image><lastmod>2024-06-04T15:51:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/05/17/santander-confirms-data-dreach-impacting-chile-spain-and-uruguay-customers/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/05/istock-1151619868.jpg</image:loc><image:title>Entrance to bank Santander office in Almeria, Spain.</image:title><image:caption>View of entrance to Santander bank office in the city of Almeria, Spain.</image:caption></image:image><lastmod>2024-06-04T15:51:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/05/20/critical-memory-corruption-vulnerability-in-fluent-bit-details-risks-and-recommendations/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/05/istock-1497299119.jpg</image:loc><image:title>A computer virus causes a program to crash.</image:title><image:caption>Threat to critical infrastructure, hybrid wars in cyberspace. Point strike on vulnerable system places. Protection and security. Data leakage protection.</image:caption></image:image><lastmod>2024-06-04T15:50:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/05/21/microsofts-new-black-mirror-recall-feature-sparks-security-concerns/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/05/istock-1498823772.jpg</image:loc><image:title>Surfae Laptop Studio photos for editorial use only</image:title><image:caption>Ho Chi Minh city, Vietnam - June 2023. Surfae Laptop Studio photos for editorial use only.</image:caption></image:image><lastmod>2024-06-04T15:50:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/05/23/critical-vulnerability-in-replicate-ai-platform-risks-and-mitigation/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/05/istock-1458045238.jpg</image:loc><image:title>AI speaks letters, text-to-speech or TTS, text-to-voice, speech synthesis applications, generative Artificial Intelligence, futuristic technology in language and communication.</image:title><image:caption>AI speaks letters, text-to-speech or TTS, text-to-voice, speech synthesis applications, generative Artificial Intelligence, futuristic technology in language and communication.</image:caption></image:image><lastmod>2024-06-04T15:24:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/05/24/maximizing-security-with-privileged-access-management-key-features-benefits/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/05/istock-1049220786.jpg</image:loc><image:title>Man working on laptop network graphic</image:title><image:caption>Man working on laptop network graphic</image:caption></image:image><lastmod>2024-06-04T15:23:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/05/27/secure-email-gateways-explained-features-benefits-and-best-practices-for-optimal-email-security/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/05/istock-641691334.jpg</image:loc><image:title>Sending encrypted E-Mail protection secure mail internet blue computer keyboard</image:title><image:caption>Sending encrypted E-Mail protection secure mail internet symbol blue computer keyboard</image:caption></image:image><lastmod>2024-06-04T15:22:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/05/28/hipaa-privacy-rule-scope-coverage-and-compliance/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/05/istock-1954847598.jpg</image:loc><image:title>HIPAA Patient Privacy Compliance</image:title><image:caption>HIPAA Patient Privacy Compliance. Medical Information Security</image:caption></image:image><lastmod>2024-06-04T15:21:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/05/29/effective-compliance-management-system-cms-in-modern-business/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/05/istock-648413674.jpg</image:loc><image:title>Compliance concept with icons, virtual screen, businessman touching button</image:title><image:caption>Compliance concept with icons for regulations, law, standards, requirements and audit on a virtual screen with a business person touching a button</image:caption></image:image><lastmod>2024-06-04T15:20:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/05/30/netizen-cybersecurity-bulletin-may-31st-2024/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/05/istock-458239301-1.jpg</image:loc><image:title>WordPress</image:title><image:caption>astersund, Sweden - August 26, 2012: WordPress is a free and open source blogging tool.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/05/istock-539085410.jpg</image:loc><image:title>Elite hacker enters internet of things corridor</image:title><image:caption>A silhouette of a hacker with a black hat in a suit enters a hallway with walls textured with blue internet of things icons 3D illustration cybersecurity concept</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/05/istock-458239301.jpg</image:loc><image:title>WordPress</image:title><image:caption>astersund, Sweden - August 26, 2012: WordPress is a free and open source blogging tool.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/05/gehkej5asaavrv4-transformed.jpeg</image:loc><image:title>gehkej5asaavrv4-transformed</image:title></image:image><lastmod>2024-06-04T15:18:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/06/03/essential-cybersecurity-practices-for-smbs-automation-security-culture-and-updated-software/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/05/istock-1487428153.jpg</image:loc><image:title>IT department line icons collection. Technology, Nerking, Security, Infrastructure, Support, Hardware, Software vector and linear illustration. Integration,Maintenance,Automation outline signs set</image:title><image:caption>IT department outline icons collection. Technology, Nerking, Security, Infrastructure, Support, Hardware, Software vector and illustration concept set. Maintenance,Automation linear signs and symbols</image:caption></image:image><lastmod>2024-06-04T15:10:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/06/04/ticketmaster-confirms-massive-data-breach-potentially-impacting-560-million-customers/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/06/istock-1152279525.png</image:loc><image:title>iStock-1152279525</image:title></image:image><lastmod>2024-06-04T15:10:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/04/22/mitre-corporation-faces-significant-cybersecurity-breach-through-ivanti-vulnerabilities/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/04/istock-1286347796.jpg</image:loc><image:title>close up on programmer hand on keyboard computer desktop to access VPN mode during use internet data telecommunication with interface icon for future network communication technology concept</image:title><image:caption>close up on programmer hand on keyboard computer desktop to access VPN mode during use internet data telecommunication with interface icon for future network communication technology concept</image:caption></image:image><lastmod>2024-04-22T22:42:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/03/26/the-poisoned-colorama-package-attack-that-affected-a-community-of-over-170000-members/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/03/istock-1268535023.jpg</image:loc><image:title>Python code language sign. Programming coding and developing concept.</image:title><image:caption>Python code language sign. Programming coding and developing concept. Software development. Programming language</image:caption></image:image><lastmod>2024-03-26T17:32:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/03/25/threat-intelligence-the-putty-client-malvertising-campaign/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/03/istock-1373169073.jpg</image:loc><image:title>Malvertising - phone hack and attack method concept</image:title><image:caption>Malvertising - phone hack and attack method concept. Cyber criminal hacker using laptop and smartphone with glitch effect</image:caption></image:image><lastmod>2024-03-25T22:12:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/03/19/avoiding-non-compliance-common-cybersecurity-mistakes-under-pci-dss/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/03/istock-864527992.jpg</image:loc><image:title>Customer paying with smartphone</image:title><image:caption>NFC Near field communication concept: Male hands using smart phone to made payment. All graphics are made up</image:caption></image:image><lastmod>2024-03-19T19:35:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/03/18/understanding-ghostrace-insights-from-the-defining-research-on-speculative-race-conditions/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/03/istock-1394351672.jpg</image:loc><image:title>Cyber security concept. Electronic components and communication network.</image:title><image:caption>Cyber security concept. Electronic components and communication network.</image:caption></image:image><lastmod>2024-03-18T21:48:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/03/15/microsoft-announces-upcoming-launch-of-ai-enhanced-copilot-for-security/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/03/istock-2002670396.jpg</image:loc><image:title>Google Gemini, OpenAI ChatGPT and Microsoft Copilot app icon on phone screen</image:title><image:caption>Wuhan,China-Feb 11th 2024: Google Gemini, OpenAI ChatGPT and Microsoft Copilot app icon on phone screen. Assorted AI app logo</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/03/istock-1169692106-1.jpg</image:loc><image:title>TikTok application</image:title><image:caption>Bangkok, Thailand - August 22, 2019 : iPhone 7 showing its screen with TikTok and other social media application icons.</image:caption></image:image><lastmod>2024-03-18T18:14:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/03/14/the-tiktok-security-debate-how-real-are-the-national-security-risks/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/03/istock-1169692106.jpg</image:loc><image:title>TikTok application</image:title><image:caption>Bangkok, Thailand - August 22, 2019 : iPhone 7 showing its screen with TikTok and other social media application icons.</image:caption></image:image><lastmod>2024-03-14T23:30:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/03/13/fortinet-enhances-security-posture-with-latest-vulnerability-patches/</loc><lastmod>2024-03-14T02:31:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/03/12/future-proof-your-code-embracing-secure-coding-within-modern-cybersecurity/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/03/istock-1047259374.jpg</image:loc><image:title>Programming source code abstract background</image:title><image:caption>Creative abstract PHP web design, internet programming HTML language and digital computer technology business concept: 3D render illustration of the macro view of software source code on screen monitor with selective focus effect</image:caption></image:image><lastmod>2024-03-12T17:14:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/03/07/ensuring-data-privacy-and-protection-in-the-iot-ecosystem-best-practices-for-cybersecurity-professionals/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/03/istock-1363232669.jpg</image:loc><image:title>Digital transformation,IOT Internet of things Digital transformation Modern Technology concept businessman select the abstract chip with text IoT on the virtual display on virtual screen.</image:title><image:caption>Digital transformation,IOT Internet of things Digital transformation Modern Technology concept businessman select the abstract chip with text IoT on the virtual display on virtual screen.</image:caption></image:image><lastmod>2024-03-07T07:26:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/03/06/recent-ransomware-trends-the-evolving-threat-in-2024/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/03/istock-1357106778.jpg</image:loc><image:title>Ransomware malware on Laptop</image:title><image:caption>Ransomware on a laptop screen. Cyber Crime concept.</image:caption></image:image><lastmod>2024-03-10T05:21:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/03/05/inside-the-change-healthcare-cyberattack-a-security-analysis/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/03/istock-1127069581.jpg</image:loc><image:title>Medical technology concept.</image:title><image:caption>Medical technology concept.</image:caption></image:image><lastmod>2024-03-05T22:36:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/03/04/whats-new-in-nist-csf-2-0/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/03/download_image_1709570069209-1.png</image:loc><image:title>download_image_1709570069209</image:title></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/03/download_image_1709570069209.png</image:loc><image:title>download_image_1709570069209</image:title></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/03/r-1.png</image:loc><image:title>r-1</image:title></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/03/r.png</image:loc><image:title>R</image:title></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/03/screenshot-2024-03-04-035122.png</image:loc><image:title>screenshot-2024-03-04-035122</image:title></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/03/ghdceeuwkaagjdb.png</image:loc><image:title>ghdceeuwkaagjdb</image:title></image:image><lastmod>2024-03-04T16:35:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/03/01/netizen-cybersecurity-bulletin-february-29th-2024/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/03/istock-1195694298.jpg</image:loc><image:title>Medical global networking and healthcare global network connection on tablet, Medical technology.</image:title><image:caption>Medical global networking and healthcare global network connection on tablet, Medical technology.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/03/istock-1292091977.jpg</image:loc><image:title>Security cipher padlock on computer circuit board.</image:title><image:caption>Security cipher padlock on computer circuit board. Computer security concept.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/03/phishing.webp</image:loc><image:title>phishing</image:title></image:image><lastmod>2024-03-02T03:33:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/02/23/pyrit-microsofts-latest-tool-for-ai-red-teaming/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/02/istock-1299625485.jpg</image:loc><image:title>Microsoft Germany GmbH</image:title><image:caption>Munich, Bavaria Germany - January 31 2021: Microsoft Deutschland (Germany) GmbH corporation headquarters building with Windows logo.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/02/picture3-2.webp</image:loc><image:title>picture3-2</image:title></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/02/picture2-1.jpg</image:loc><image:title>picture2-1</image:title></image:image><lastmod>2024-02-24T00:42:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/02/22/cisa-launching-zero-trust-initiative-office-previewed-in-march-2023/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/02/istock-1450723537.jpg</image:loc><image:title>Network connection concept. Zero trust security model. Secure network. 3d render.</image:title><image:caption>Network connection concept. Zero trust security model. Secure network. 3d render..</image:caption></image:image><lastmod>2024-02-22T19:47:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/02/15/understanding-data-disposal-a-key-to-data-privacy/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/02/istock-521695182.jpg</image:loc><image:title>Computer hard disc repair</image:title><image:caption>The action of fixing disassembled hard drive by  hammer. Screwdriver and wrench lie   nearby</image:caption></image:image><lastmod>2024-02-16T02:20:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/02/09/choosing-the-right-comptia-security-certification-whats-new-in-sy0-701/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/02/istock-1398462038.jpg</image:loc><image:title>online exam or test</image:title><image:caption>online exam, choose correct answer in test</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/02/istock-1386319128-1.jpg</image:loc><image:title>Login icon in the screen.</image:title><image:caption>Binary code ( array of bits ) in the screen. 3D Illustration.</image:caption></image:image><lastmod>2024-02-08T19:35:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/02/08/fortisiems-critical-os-command-injection-vulnerabilities-cve-2024-23108-and-cve-2024-23109/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/02/istock-1386319128.jpg</image:loc><image:title>Login icon in the screen.</image:title><image:caption>Binary code ( array of bits ) in the screen. 3D Illustration.</image:caption></image:image><lastmod>2024-02-08T17:21:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/02/02/analyzing-the-dirtymoe-and-steadyursa-attack-on-ukrainian-infrastructure/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/02/istock-1366126478.jpg</image:loc><image:title>Ukrainian flag in the wind. Blue Yellow flag in the city of Kharkov</image:title><image:caption>Ukrainian flag in the wind. Blue Yellow flag in the city of Kharkov.</image:caption></image:image><lastmod>2024-02-03T02:19:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/01/31/netizen-cybersecurity-bulletin-january-31st-2024/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/01/netflix-phishing-2.jpg</image:loc><image:title>netflix-phishing-2</image:title></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/01/istock-875477982.jpg</image:loc><image:title>AI(Artificial Intelligence) and smart energy. Abstract mixed media.</image:title><image:caption>AI(Artificial Intelligence) and smart energy. Abstract mixed media.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/01/istock-458114779.jpg</image:loc><image:title>Windows 8 Start Screen Angled</image:title><image:caption>"Alpharetta, Georgia USA - November 12, 2012: Angled shot of a Microsoft Windows 8 start screen."</image:caption></image:image><lastmod>2024-02-01T02:35:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/01/24/ai-powered-siem-the-future-of-threat-detection-and-monitoring/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/01/istock-1050855182.jpg</image:loc><image:title>Robot Examining Invoice</image:title><image:caption>Photo Of Robot Examining Invoice With Magnifying Glass</image:caption></image:image><lastmod>2024-01-25T01:36:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/01/22/the-ftcs-crackdown-on-location-data-misuse-inmarkets-landmark-settlement/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/01/istock-1415269302.jpg</image:loc><image:title>Federal Trade Commission</image:title><image:caption>Washington, DC, USA - June 21, 2022: One of the entrances to the Federal Trade Commission Building in Washington, DC, that serves as the headquarters of the Federal Trade Commission (FTC).</image:caption></image:image><lastmod>2024-01-23T04:39:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/01/16/openai-new-ventures-in-military-collaboration/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/01/istock-529769841.jpg</image:loc><image:title>US Pentagon at sunset</image:title><image:caption>US pentagon building aerial view at sunset</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/01/untitled-design-2.png</image:loc><image:title>Untitled design (2)</image:title></image:image><lastmod>2024-01-17T02:49:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/01/10/thread-hijacking-the-escalating-threat-of-pikabot-malware/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/01/istock-1469637157.jpg</image:loc><image:title>Phishing scam image. Fishhook icon and laptop.</image:title><image:caption>Close up of hands typing.</image:caption></image:image><lastmod>2024-01-11T03:29:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/01/08/smtp-smuggling-the-new-technique-threatening-email-security-by-exploiting-protocol-discrepancies/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/01/istock-1406852194.jpg</image:loc><image:title>Smtp mail server</image:title><image:caption>Icon for smtp, mail server, email hosting, data, communication, envelope</image:caption></image:image><lastmod>2024-01-09T03:09:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2024/01/02/angel-drainer-the-rise-of-scam-as-a-service-in-cryptocurrency-phishing/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2024/01/istock-496819483.jpg</image:loc><image:title>phishing</image:title><image:caption>phishing - fish hook with a credit card on white computer keyboard</image:caption></image:image><lastmod>2024-01-02T20:39:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2023/12/27/netizen-cybersecurity-bulletin-december-27th-2023/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/12/screen-shot-2017-03-06-at-10.07.13-1.png</image:loc><image:title>screen-shot-2017-03-06-at-10.07.13-1</image:title></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/12/istock-1048265360.jpg</image:loc><image:title>Ransomware And Code Hacking Background</image:title><image:caption>Malicious computer programming code in the shape of a skull. Online scam, hacking and digital crime background 3D illustration</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/12/istock-1365432943-1.jpg</image:loc><image:title>Ukrainian flag in the wind. Blue Yellow flag Against the big city at night</image:title><image:caption>Ukrainian flag in the wind. Blue Yellow flag Against the city at night</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/12/istock-1365432943.jpg</image:loc><image:title>Ukrainian flag in the wind. Blue Yellow flag Against the big city at night</image:title><image:caption>Ukrainian flag in the wind. Blue Yellow flag Against the city at night</image:caption></image:image><lastmod>2023-12-28T03:22:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2023/12/17/spyloan-the-network-of-18-malicious-loan-apps-harvesting-your-data/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/12/istock-1347327761.jpg</image:loc><image:title>A futuristic glowing credit card isolated on a dark blue background with various graphs and data. Online payment. It can be used for a web banner. Secure payments, payment protection concepts. Vector</image:title><image:caption>A futuristic glowing credit card isolated on a dark blue background with various graphs and data. Online payment. It can be used for a web banner.</image:caption></image:image><lastmod>2023-12-17T18:15:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2023/12/12/the-massive-23andme-data-breach-implications-and-responses/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/12/istock-1167443638.jpg</image:loc><image:title>23andme headquarters in Silicon Valley</image:title><image:caption>August 8, 2019 Mountain View / CA / USA - 23andme headquarters in Silicon Valley; Based on a saliva sample, 23andMe provides reports about the customer's health, traits and ancestry</image:caption></image:image><lastmod>2023-12-12T21:17:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2023/12/08/nightshade-training-data-poisoning-attacks-in-machine-learning-security/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/12/istock-1206796363.jpg</image:loc><image:title>AI, Machine learning, Hands of robot and human touching on big data network connection background, Science and artificial intelligence technology, innovation and futuristic.</image:title><image:caption>AI, Machine learning, Hands of robot and human touching on big data network connection background, Science and artificial intelligence technology, innovation and futuristic.</image:caption></image:image><lastmod>2023-12-09T01:30:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2023/12/04/critical-webkit-vulnerabilities-patched-in-latest-apple-updates/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/12/istock-1488370614.jpg</image:loc><image:title>Apple Store and Genius Bar. Apple sells and services the iPhone, iPad, iMac and Macintosh computers.</image:title><image:caption>Chicago - Circa April 2023: Apple Store and Genius Bar. Apple sells and services the iPhone, iPad, iMac and Macintosh computers.</image:caption></image:image><lastmod>2023-12-04T13:09:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2023/12/01/u-s-sanctions-target-kimsuky-a-strategic-move-in-cybersecurity-against-the-dprk/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/12/istock-803270840.jpg</image:loc><image:title>Binary code with North Korea flag, data protection concept</image:title><image:caption>Data protection, binary code with North Korea flag</image:caption></image:image><lastmod>2023-12-01T23:28:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2023/11/30/netizen-cybersecurity-bulletin-november-30th-2023/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/11/istock-1437631312.jpg</image:loc><image:title>Businessman holding shield protect icon. Protection network security computer and safe your data concept, lock symbol, concept about security, cybersecurity and protection against dangers.</image:title><image:caption>Businessman holding shield protect icon. Protection network security computer and safe your data concept, lock symbol, concept about security, cybersecurity and protection against dangers.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/11/istock-1464781981.jpg</image:loc><image:title>Doctor using technology document management on computer system management for cardiologist Specialist in treating heart disease for treatment in hospital , DMS document management concept</image:title><image:caption>Doctor using technology document management on computer system management for cardiologist Specialist in treating heart disease for treatment in hospital , DMS document management concept</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/11/real-life-phishing-example-4-transformed.jpeg</image:loc><image:title>real-life-phishing-example-4-transformed</image:title></image:image><lastmod>2023-11-30T22:31:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2023/11/28/telekopye-decoding-online-marketplace-scams/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/11/istock-480137882.jpg</image:loc><image:title>Internet crime and electronic banking security</image:title><image:caption>Stealing a credit card through a laptop concept for computer hacker, network security and electronic banking security</image:caption></image:image><lastmod>2023-11-29T04:25:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2023/11/22/netizen-to-attend-2023-cdca-eastern-defense-summit/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/11/istock-522739970.jpg</image:loc><image:title>Charleston south Carolina</image:title><image:caption>Charleston, South Carolina, USA in the French Quarter.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/11/istock-1454141676.jpg</image:loc><image:title>Aerial view of the West Virginia State Capitol Building and downtown Charleston with fall foliage</image:title><image:caption>An aerial view of the West Virginia State Capitol Building and downtown Charleston with fall foliage</image:caption></image:image><lastmod>2023-11-23T01:33:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2023/11/21/cisa-launches-new-pilot-program-to-bolster-cybersecurity-in-critical-infrastructure-sectors/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/11/istock-1447889572.jpg</image:loc><image:title>Cybersecurity and privacy concept. Businessman protecting personal data on fingerprint technology with virtual screen. internet network security technology, Access banking safely, cloud privacy,</image:title><image:caption>Cybersecurity and privacy concept. Businessman protecting personal data on fingerprint technology with virtual screen. internet network security technology, Access banking safely, cloud privacy,</image:caption></image:image><lastmod>2023-11-21T18:11:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2023/11/20/understanding-the-randstorm-vulnerability-in-cryptocurrency-wallets-a-comprehensive-analysis/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/11/istock-908350372.jpg</image:loc><image:title>Bitcoin cryptocurrency security  and mining concept. Safe lock with symbol of bitcoin on circuit board.</image:title><image:caption>Bitcoin cryptocurrency security  and mining concept. Safe lock with symbol of bitcoin on circuit board. 3d illustration</image:caption></image:image><lastmod>2023-11-20T21:50:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2023/11/16/microsoft-releases-patches-for-63-vulnerabilities-including-5-zero-days-in-november-2023-update/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/11/istock-1402827477.jpg</image:loc><image:title>Entrance of Microsoft headquarters building in Issy les Moulineaux near Paris, France</image:title><image:caption>Entrance of Microsoft headquarters building in Issy les Moulineaux near Paris, France</image:caption></image:image><lastmod>2023-11-16T15:09:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2023/11/14/the-evolution-from-hive-to-hunters-international-ransomware-gangs-leveraging-peer-innovations/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/11/istock-1345658711.jpg</image:loc><image:title>Hacker attack computer hardware microchip</image:title><image:caption>Hacker attack computer hardware microchip while process data through internet network, 3d rendering insecure Cyber Security exploit database breach concept, virus malware unlock warning screen</image:caption></image:image><lastmod>2023-11-14T23:31:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2023/11/07/netizen-threat-detection-and-advisory-on-confluence-vulnerability-cve-2023-22518/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/11/istock-1424554719.jpg</image:loc><image:title>cyber security</image:title><image:caption>human hand using computer to surf the internet  There are security systems to protect against hackers, business ideas, internet, network security.</image:caption></image:image><lastmod>2023-11-07T23:08:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2023/11/06/cvss-v4-0-is-public-what-do-you-need-to-know-about-it/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/11/istock-544127088.jpg</image:loc><image:title>Security Vulnerability Search</image:title><image:caption>3D rendering graphic composition on the theme of 'Cyber Security Technologies'.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/11/common-vulnerability-scoring-sysytem.webp</image:loc><image:title>common-vulnerability-scoring-sysytem</image:title></image:image><lastmod>2023-11-06T17:43:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2023/11/02/deepfake-technology-a-technical-analysis-and-advisory/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/11/istock-1470340715.jpg</image:loc><image:title>Deepfake Concept</image:title><image:caption>Deepfake or Deep Fake Concept as a symbol for misrepresenting or identity theft or faking identification and misrepresentation in a 3D illustration style.</image:caption></image:image><lastmod>2023-11-02T21:00:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2023/10/31/netizen-what-is-an-ids-and-how-does-it-benefit-your-organization/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/10/istock-1367728600.jpg</image:loc><image:title>Cybersecurity Concept with Virtual Padlock on Abstract Background</image:title><image:caption>Cybersecurity Concept with Virtual Padlock on Abstract Background</image:caption></image:image><lastmod>2023-11-01T01:46:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2023/10/26/netizen-cybersecurity-bulletin-october-26th-2023/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/10/istock-1410922761.jpg</image:loc><image:title>Gear icon</image:title><image:caption>Gear icon in display with binary code ( array of bits ). 3D Illustration.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/10/istock-1422116990.jpg</image:loc><image:title>Google NYC Office</image:title><image:caption>New York, NY, USA - July 7, 2022: A man walks past the Google office, the Chelsea campus, in New York City. Google LLC is a global technology company headquartered in Mountain View, California.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/10/f9yzmv2w0aaxbbc.jpg</image:loc><image:title>f9yzmv2w0aaxbbc</image:title></image:image><lastmod>2023-10-26T18:18:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2023/10/23/cisco-finds-two-new-ios-xe-software-web-ui-zero-day-vulnerabilities/</loc><lastmod>2023-10-23T20:20:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2023/10/19/netizen-technical-analysis-and-advisory-on-cve-2023-4966/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/10/istock-1460853312.jpg</image:loc><image:title>Abstract connected dots and lines. Concept of AI technology, Motion of digital data flow.</image:title><image:caption>Abstract connected dots and lines. Concept of AI technology, Motion of digital data flow. Communication and technology network concept with moving lines and dots. 3D rendering</image:caption></image:image><lastmod>2023-10-19T22:19:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2023/10/16/gpu-zip-understanding-graphics-processor-side-channel-attacks/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/10/istock-1370212684.jpg</image:loc><image:title>crypto mining farm with graphic card or gpu rack</image:title><image:caption>3d rendering crypto mining farm with graphic card or gpu rack in neon light</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/10/0926-em-gpu-zip.png</image:loc><image:title>0926-em-gpu-zip</image:title></image:image><lastmod>2023-10-16T15:30:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2023/10/13/ransomware-new-innovations-and-evolutions-that-threaten-our-security/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/10/istock-942627364.jpg</image:loc><image:title>Ransomware vector symbol</image:title><image:caption>Ransomware vector symbol with laptop, red padlock and chain isolated on blue background. Flat design, easy to use for your website or presentation.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/10/istock-1400359666.jpg</image:loc><image:title>Network Security,Security,Security System,Technology,Internet,Safety,BIG Data,Encryption,Digitally Generated Image,Protection,Privacy, Blockchain, Computer,Connection,Lock,Coding,Network Security,Technology,Security,Security System,</image:title><image:caption>Cybersecurity IT engineers are working on protecting networks from cyber attacks from hackers on the Internet. Secure access to online privacy and personal data protection</image:caption></image:image><lastmod>2023-10-13T17:56:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2023/10/12/emerging-technologies-a-cybersecurity-deep-dive-into-web-3-0/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/10/istock-1390600542.jpg</image:loc><image:title>WEB 3.0 on futuristic electronic board background, Technology of decentralized social network connection concept, 3d rendering abstract background</image:title><image:caption>WEB 3.0 on futuristic electronic board background, Technology of decentralized social network connection concept, 3d rendering abstract background</image:caption></image:image><lastmod>2023-10-12T19:11:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2023/10/11/high-severity-vulnerability-in-adobe-acrobat-reader-added-to-cisas-kev-database/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/10/istock-1406172376.jpg</image:loc><image:title>Calendar set icon. Alarm clock, watch, percent, reminder, important event, anniversary, week, day. Date and time management concept. Glassmorphism style. Vector line icon for Business and Advertising</image:title><image:caption>PDF File line icon. Paid information, gallery, image, download file, text document, private, reader, search. Data set concept. Glassmorphism style. Vector line icon for Business and Advertising</image:caption></image:image><lastmod>2023-10-12T00:32:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2023/10/06/looney-tunables-understanding-the-glibc-buffer-overflow-vulnerability/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/10/istock-1447055424.jpg</image:loc><image:title>command line interface cli programming language concept with laptop and code programming - vector illustration</image:title><image:caption>command line interface cli programming language concept with laptop and code programming - vector illustration</image:caption></image:image><lastmod>2023-10-06T19:32:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2023/10/05/quantum-computing-preparing-for-skeleton-key-decryption/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/10/istock-1449305012.jpg</image:loc><image:title>Circuit Red and yellow lines Board Background - Copy Space</image:title><image:caption>Circuit Red and yellow lines Board Background - Copy Space</image:caption></image:image><lastmod>2023-10-05T20:46:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2023/10/03/fbi-warns-network-defenders-about-new-dual-ransomware-attack-pattern/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/10/istock-1403439566.jpg</image:loc><image:title>Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol. 3d rendering.</image:title><image:caption>Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol. 3d rendering.</image:caption></image:image><lastmod>2023-10-03T16:38:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2023/09/28/netizen-cybersecurity-bulletin-september-28th-2023/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/09/istock-690772190.jpg</image:loc><image:title>Big brother electronic eye concept, technologies for the global surveillance, security of computer systems and networks</image:title><image:caption>High-tech computer digital technology, global surveillance</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/09/istock-1189504735.jpg</image:loc><image:title>GitHub headquarters in San Francisco</image:title><image:caption>Nov 17, 2019 San Francisco / CA / USA - GitHub headquarters, in San Francisco; GitHub, whose company logo is the Octocat, is a Microsoft subsidiary that provides hosting for software development version control using Git</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/09/04cjcrov84l5acvafka2zj6-2.webp</image:loc><image:title>04cjcrov84l5acvafka2zj6-2</image:title></image:image><lastmod>2023-09-28T20:44:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2023/09/21/38-tb-of-private-company-data-was-leaked-by-microsoft-ai-researchers/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/09/istock-1366752472.jpg</image:loc><image:title>Microsoft corparaion office building. European Microsoft Office</image:title><image:caption>Cologne, Germany - July 2021: Microsoft corparaion office building. European Microsoft Office.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/09/1695041318-03-files.jpg</image:loc><image:title>1695041318-03-files</image:title></image:image><lastmod>2023-09-21T19:34:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2023/09/18/microsoft-enhances-teams-security-in-prevention-of-storm-0324-malware-distribution/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/09/istock-1164173769.jpg</image:loc><image:title>Microsoft store in Manhattan. Microsoft is world's largest software maker dominant in PC operating systems, office apps and web browser market</image:title><image:caption>New York, USA - May 15, 2019: Microsoft store in Manhattan. Microsoft is world's largest software maker dominant in PC operating systems, office apps and web browser market.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/09/netizen_logo-1.png</image:loc><image:title>netizen_logo-1</image:title></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/09/fig1-storm-0324-jssloader-infection-chain-1.webp</image:loc><image:title>fig1-storm-0324-jssloader-infection-chain-1</image:title></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/09/fig2-storm-0324-email.webp</image:loc><image:title>fig2-storm-0324-email</image:title></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/09/fig1-storm-0324-jssloader-infection-chain.webp</image:loc><image:title>fig1-storm-0324-jssloader-infection-chain</image:title></image:image><lastmod>2023-09-18T21:24:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2023/09/14/human-error-the-largest-threat-to-our-cybersecurity/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/09/istock-656479172.jpg</image:loc><image:title>Golden Lion at MGM Grand Hotel and Casino - Las Vegas, Nevada, USA</image:title><image:caption>Las Vegas, Nevada, USA - December, 2016: Golden Lion at MGM Grand Hotel and Casino</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/09/netizen_logo.png</image:loc><image:title>netizen_logo</image:title></image:image><lastmod>2023-09-14T23:26:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2023/09/13/alphv-blackcat-hacker-group-claims-responsiblity-for-mgm-resorts-ransomware-attack/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/09/istock-475510067.jpg</image:loc><image:title>Las Vegas, USA - September 4: MGM Grand</image:title><image:caption>Las Vegas, USA  - September 4, 2007: The MGM Grand Hotel &amp; Casino at night on September 4, 2007 in Las Vegas, Nevada, USA.</image:caption></image:image><lastmod>2023-09-13T21:02:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2023/09/11/apple-releases-patch-for-zero-day-ios-macos-vulnerabilities-blastpass/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/09/istock-1341657048.jpg</image:loc><image:title>iPad 8th generation with smartphone over silver laptop on desk</image:title><image:caption>Galati, Romania, March 31, 2021: - Apple release new iPad 8th generation with the powerful A12 Bionic chip, support for Apple Pencil and the smart keyboard. iPad 8th generation with smartphone over silver laptop on desk.</image:caption></image:image><lastmod>2023-09-11T13:11:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2023/09/08/prompt-injection-generative-ais-largest-vulnerability/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/09/istock-1502429660.jpg</image:loc><image:title>Ai tech, businessman show virtual graphic Global Internet connect Chatbot Chat with AI, Artificial Intelligence. using command prompt for generates something, Futuristic technology transformation.</image:title><image:caption>Ai tech, businessman show virtual graphic Global Internet connect Chatbot Chat with AI, Artificial Intelligence. using command prompt for generates something, Futuristic technology transformation.</image:caption></image:image><lastmod>2023-09-08T11:51:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2023/09/04/protecting-your-mssql-databases-defending-against-the-freeworld-ransomware-threat/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/09/istock-1365847213.jpg</image:loc><image:title>Phone lock to protect from cyber scam, online data fraud or identity theft. Laptop with hacker virus code in screen. Phishing, cybersecurity danger or ransomware attack.</image:title><image:caption>Phone lock to protect from cyber scam, online data fraud or identity theft. Laptop with hacker virus code in screen. Phishing, cybersecurity danger or ransomware attack. Encrypted privacy in email.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/09/image8-1.webp</image:loc><image:title>image8-1</image:title></image:image><lastmod>2023-09-04T17:32:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2023/08/31/critical-vulnerability-in-hikvision-surveillance-cameras-points-to-greater-issue-within-the-iot/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/08/istock-1474465082.jpg</image:loc><image:title>Concept of surveillance and monitoring.</image:title><image:caption>Concept of surveillance and monitoring. Camera Technology Safety Concept design. Camera vector low poly mesh design on dark blue background, Security system, CCTV Security concept.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/08/istockphoto-1459795167-1024x1024-1.jpg</image:loc><image:title>istockphoto-1459795167-1024x1024</image:title><image:caption>Surveillance camera glowing in the dark. Ominous mood scene with negative space. Digital 3D rendering.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/08/geographical-spread-of-vulnerable-hikvision-cameras-1.png</image:loc><image:title>geographical-spread-of-vulnerable-hikvision-cameras-1</image:title></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/08/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2023-08-31T13:53:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2023/08/14/netizen-august-vulnerability-review-2/</loc><lastmod>2023-08-14T15:11:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2022/07/12/netizen-the-five-lures-in-a-phisermans-tacklebox/</loc><lastmod>2023-08-02T15:28:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2023/08/02/voice-synthesis-the-growing-threat-of-vishing-with-ai-technology/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/08/istock-1453790531.jpg</image:loc><image:title>Woman reciving unwanted call on smartphone with red warning icons.</image:title><image:caption>Spam, scam, phishing and fraud concept. Security technology.</image:caption></image:image><lastmod>2023-08-02T15:17:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2023/07/07/netizen-july-vulnerability-review/</loc><lastmod>2023-07-07T14:06:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2023/06/05/netizen-june-vulnerability-review/</loc><lastmod>2023-06-05T17:12:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2023/05/05/netizen-may-vulnerability-review/</loc><lastmod>2023-05-05T15:54:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2023/04/21/netizen-breaking-into-cybersecurity/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/04/istock-1356364333.jpg</image:loc><image:title>Diverse Team of Professionals Meeting in Office at Night: Brainstorming IT Programmers Use Computer Together, Talk Strategy, Discuss Planning. Software Engineers Develop Inspirational App Program</image:title><image:caption>Diverse Team of Professionals Meeting in Office at Night: Brainstorming IT Programmers Use Computer Together, Talk Strategy, Discuss Planning. Software Engineers Develop Inspirational App Program</image:caption></image:image><lastmod>2023-04-21T15:17:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2023/04/07/netizen-april-vulnerability-review/</loc><lastmod>2023-04-07T16:51:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2023/03/27/netizen-ceo-named-for-a-third-year-to-the-power-100-list-of-the-most-influential-people-in-the-lehigh-valley/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/03/headshot-2.jpg</image:loc><image:title>Headshot 2</image:title></image:image><lastmod>2023-03-27T14:44:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2023/03/20/netizen-what-is-iso-27001-and-how-can-it-benefit-your-organization/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/03/istock-1438372637.jpg</image:loc><image:title>ISO 27001 icon - vector illustration . iso, information, security, management, system, standard, quality, certification, infographic, template, presentation, concept, banner, icon set, icons .</image:title><image:caption>This icon use for website presentation and banner infographic template</image:caption></image:image><lastmod>2023-03-20T18:01:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2023/03/06/netizen-march-vulnerability-review/</loc><lastmod>2023-03-06T18:59:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2023/03/07/netizen-hires-joe-carr-as-director-of-cybersecurity/</loc><lastmod>2023-03-03T15:38:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2023/02/28/netizen-cybersecurity-bulletin-february-28th-2023/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/02/istock-1367696835.jpg</image:loc><image:title>Hand showing laptop computer with cloud network Computer connects to internet server service for cloud data transfer.Cloud computing technology and online data storage for business network concept.</image:title><image:caption>Hand showing laptop computer with cloud network Computer connects to internet server service for cloud data transfer.Cloud computing technology and online data storage for business network concept.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/02/istock-1398625179.jpg</image:loc><image:title>Glass Window building of new office space</image:title><image:caption>Glass business office buildings architecture in modern city. Urban corporate skyscraper exterior and skyline. Copy space</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/02/walmart-bissel-phishing-example.jpg</image:loc><image:title>walmart-bissel-phishing-example</image:title></image:image><lastmod>2023-02-28T21:49:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2023/02/22/netizen-how-to-understand-a-vulnerability-report-and-prioritize-systems-for-remediation/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/02/istock-1048265190.jpg</image:loc><image:title>Internet Code Hack Background</image:title><image:caption>Computer programming code. Online safety, hacking and digital firewall background 3D illustration</image:caption></image:image><lastmod>2023-02-22T19:47:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2023/02/17/netizen-what-is-cmmc-2-0-and-what-can-your-organization-do-to-get-ready/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2023/02/cmmc-changes.jpg</image:loc><image:title>CMMC Changes</image:title></image:image><lastmod>2023-02-17T19:46:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2023/02/06/netizen-february-vulnerability-review/</loc><lastmod>2023-02-06T17:29:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2023/01/05/netizen-january-vulnerability-review/</loc><lastmod>2023-01-05T19:38:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2022/12/12/netizen-december-vulnerability-review/</loc><lastmod>2022-12-12T18:35:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2022/11/28/netizen-earns-5th-consecutive-federal-award-for-military-veteran-hiring-and-support/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2022/11/hirevets.png</image:loc><image:title>hirevets</image:title></image:image><lastmod>2022-11-28T14:29:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2022/11/04/netizen-november-vulnerability-review/</loc><lastmod>2022-11-04T17:21:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2022/10/05/netizen-october-vulnerability-review/</loc><lastmod>2022-10-05T19:57:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2022/09/30/netizen-cybersecurity-bulletin-september-30th-2022/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2022/09/istock-1319736355.jpg</image:loc><image:title>American Airlines Narrow-Body Jet Flying Above</image:title><image:caption>An American Airlines Airbus A321 soars overhead on a clear summer afternoon moments before landing at Los Angeles International Airport - Los Angeles, California, USA</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2022/09/istock-1326770854.jpg</image:loc><image:title>Cryptocurrency on Binance trading app, Bitcoin BTC with altcoin digital coin crypto currency, BNB, Ethereum, Dogecoin, Cardano, defi p2p decentralized fintech market</image:title><image:caption>Bangkok, Thailand - 1 July 2021: Cryptocurrency on Binance trading app, Bitcoin BTC with altcoin digital coin crypto currency, BNB, Ethereum, Dogecoin, Cardano, defi p2p decentralized fintech market</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2022/09/smsishing-example-3.jpg</image:loc><image:title>smsishing-example-3</image:title></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2022/09/smsishing-example-1.jpg</image:loc><image:title>smsishing-example-1</image:title></image:image><lastmod>2022-09-30T18:06:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2022/09/08/netizen-september-vulnerability-review/</loc><lastmod>2022-09-09T15:43:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2022/08/26/netizen-cybersecurity-bulletin-august-26th-2022/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2022/08/adt-phishing.jpg</image:loc><image:title>adt-phishing</image:title></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2022/08/istock-1253304399.jpg</image:loc><image:title>Brutalist architecture of J Edgar Hoover building, home of the FBI</image:title><image:caption>Washington DC USA - October 28 2014; Brutalist architecture of J Edgar Hoover building, home of the FBI</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2022/08/istock-1273254711.jpg</image:loc><image:title>Twitter Headquarters</image:title><image:caption>San Francisco, CA, USA - Feb 9, 2020: American microblogging and social networking service company Twitter's Headquarters in San Francisco, California, in the evening.</image:caption></image:image><lastmod>2022-08-26T17:48:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2022/08/05/netizen-august-vulnerability-review/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2022/08/istock-1354202603.jpg</image:loc><image:title>Cybercrime, piracy and data theft. Network security breach. Compromised computer showing skull and bones symbol. Digital 3D rendering concept.</image:title><image:caption>Cybercrime, piracy and data theft. Network security breach. Compromised computer showing skull and bones symbol. Digital 3D rendering concept.</image:caption></image:image><lastmod>2022-08-05T18:38:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2022/07/29/netizen-cybersecurity-bulletin-july-29th-2022/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2022/07/istock-1285394939.jpg</image:loc><image:title>"Welcome To Idaho" state road side sign</image:title><image:caption>This image shows an official "Welcome To Idaho" state road side sign with a beautiful landscape behind.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2022/07/istock-526060179.jpg</image:loc><image:title>T Mobile Sign at building in Berlin</image:title><image:caption>Berlin, Germany - November 27, 2014: T Mobile Sign at building in Berlin. The mobile company is primarily known with its C- network coverage available in Germany , which was shut down on 31 December 2000.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2022/07/louis-vuitton-phishing.jpg</image:loc><image:title>louis-vuitton-phishing</image:title></image:image><lastmod>2022-07-29T18:11:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2022/06/28/netizen-cybersecurity-bulletin-june-28th-2022/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2022/06/istock-1334051057.jpg</image:loc><image:title>Carnival Liberty and Disney Dream cruise ships docked in Port Canaveral at sunset. Beautiful red-orange-blue sunset sky in the background</image:title><image:caption>Port Canaveral, Florida, USA - September 5, 2019: Carnival Liberty and Disney Dream cruise ships docked in Port Canaveral at sunset. Beautiful red-orange-blue sunset sky in the background.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2022/06/istock-1284132688.jpg</image:loc><image:title>Sunny Aerial Vilnius Old Town aerial view scene. Red rooftops of Vilnius from the birds eye view - Vilnius - the capital of Lithuania</image:title><image:caption>Sunny Aerial Vilnius Old Town aerial view scene. Red rooftops of Vilnius from the birds eye view - Vilnius - the capital of Lithuania</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2022/06/home-depot-phish-example.png</image:loc><image:title>home-depot-phish-example</image:title></image:image><lastmod>2022-06-28T16:34:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2022/06/15/netizen-what-is-security-information-and-event-monitoring-siem/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2022/06/istock-808157830.jpg</image:loc><image:title>In Monitoring Room Technical Support Specialist Speaks into Headset. His Colleagues are Working in the Background.</image:title><image:caption>In Monitoring Room Technical Support Specialist Speaks into Headset. His Colleagues are Working in the Background.</image:caption></image:image><lastmod>2022-06-15T19:07:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2022/05/27/netizen-cybersecurity-bulletin-may-27th-2022/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2022/05/istock-1297336310.jpg</image:loc><image:title>Agriculture and technology concept. Agritech.</image:title><image:caption>Agriculture and technology concept. Agritech.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2022/05/istock-531249946.jpg</image:loc><image:title>Elite hacker entering a room in turquoise</image:title><image:caption>Elite hacker entering a room through a keyhole silhouette 3d illustration information security backdoor concept with turquoise digital background matrix</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2022/05/freedom-financial-example.jpg</image:loc><image:title>freedom-financial-example</image:title></image:image><lastmod>2022-05-27T19:55:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2022/05/09/netizen-penetration-testing-guide/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2022/05/istock-1322517295.jpg</image:loc><image:title>Cyber security IT engineer working on protecting network against cyberattack from hackers on internet. Secure access for online privacy and personal data protection. Hands typing on keyboard and PCB</image:title><image:caption>Cyber security IT engineer working on protecting network against cyberattack from hackers on internet. Secure access for online privacy and personal data protection. Hands typing on keyboard and PCB</image:caption></image:image><lastmod>2022-05-18T14:31:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2022/04/15/netizen-cybersecurity-bulletin-april-15th-2022/</loc><lastmod>2022-04-15T18:19:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2022/03/25/lapsus-the-teenager-run-cybercriminal-gang-targeting-fortune-500-companies/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2022/03/istock-937962670.jpg</image:loc><image:title>Hackers at work on the background of green office buildings</image:title><image:caption>Silhouettes of several men working intensively behind their computers against the background of glass office skyscrapers.</image:caption></image:image><lastmod>2022-03-25T20:25:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2022/03/11/netizen-cybersecurity-bulletin-march-11th-2022/</loc><lastmod>2022-03-11T21:21:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2022/02/25/global-cyber-war-what-is-at-stake/</loc><lastmod>2022-02-25T16:42:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2022/02/14/netizen-cybersecurity-bulletin-february-14th-2022/</loc><lastmod>2022-02-14T21:45:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2022/01/11/netizen-cybersecurity-bulletin-january-11th-2022/</loc><lastmod>2022-01-11T21:49:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2021/12/21/log4j-the-minecraft-found-java-fueled-nightmare/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2021/12/istock-1359619210.jpg</image:loc><image:title>Illustration of Log4j and Log4Shell vulnerability. Cybersecurity and information security incidence concept. System error cyber attack, alert, warning and crime</image:title><image:caption>Illustration of Log4j and Log4Shell vulnerability. Cybersecurity and information security incidence concept. System error cyber attack, alert, warning and crime..</image:caption></image:image><lastmod>2021-12-21T21:36:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2021/12/02/netizen-cybersecurity-bulletin-december-2nd-2021/</loc><lastmod>2021-12-02T20:29:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2021/11/19/netizen-cybersecurity-bulletin-november-19th-2021/</loc><lastmod>2021-11-19T20:12:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2021/11/10/netizen-corporation-awarded-hire-vets-platinum-medalion-for-the-4th-year-in-a-row/</loc><lastmod>2021-11-10T19:58:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2021/10/25/sinclair-broadcast-group-ransomware-attack-how-it-happened-and-what-this-means/</loc><lastmod>2021-10-25T16:03:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2021/10/11/netizen-cybersecurity-bulletin-october-11th-2021/</loc><lastmod>2021-10-11T19:00:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2021/09/24/new-cooperative-ransomware-attack-how-it-happened-and-what-this-means/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2021/09/istock-1202136432.jpg</image:loc><image:title>Agricultural Silos. Storage and drying of grains</image:title><image:caption>Silo in a corn field. Agricultural Silos. Storage and drying of grains.</image:caption></image:image><lastmod>2021-09-24T18:52:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2021/08/18/t-mobile-data-breach-what-happened-and-we-do-next/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2021/08/istock-1004848390.jpg</image:loc><image:title>People walking by a T Mobile store in Manhattan.</image:title><image:caption>New York, July 19, 2018: People walking by a T Mobile store in Manhattan.</image:caption></image:image><lastmod>2021-09-24T17:09:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2021/09/14/netizen-cybersecurity-bulletin-september-14th-2021/</loc><lastmod>2021-09-14T20:12:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2021/07/29/netizen-cybersecurity-bulletin-july-29th-2021/</loc><lastmod>2021-07-29T17:46:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2021/07/07/kaseya-ransomware-attack-how-it-happened-and-the-implications/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2021/07/istock-1188482164.jpg</image:loc><image:title>Ransomware red button on keyboard, 3D rendering</image:title><image:caption>Ransomware red button on keyboard, 3D rendering</image:caption></image:image><lastmod>2021-07-07T17:20:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2021/06/30/netizen-awarded-state-wide-cybersecurity-contract-for-commonwealth-of-massachusetts/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2021/06/istock-504574088.jpg</image:loc><image:title>Massachusetts State House</image:title><image:caption>Massachusetts State HouseMassachusetts State House</image:caption></image:image><lastmod>2021-06-30T15:09:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2021/06/22/netizen-appraised-at-cmmi-maturity-level-3/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2021/06/cmmi-services-v2.0-cmmi-svc-with-sam-maturi-color.png</image:loc><image:title>CMMI Services V2.0 (CMMI-SVC) with SAM - Maturi-Color</image:title></image:image><lastmod>2021-06-22T15:12:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2021/06/02/netizen-cybersecurity-bulletin-june-2nd-2021/</loc><lastmod>2021-06-02T17:37:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2021/05/13/netizen-hires-brian-keating-as-director-of-finance/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2021/05/brian-cover.png</image:loc><image:title>Brian Cover</image:title></image:image><lastmod>2021-05-13T19:03:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2021/05/13/colonial-pipeline-ransomware-attack-what-happened-and-how-we-move-forward/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2021/05/istock-471294961.jpg</image:loc><image:title>Several lines of cars at busy gas station</image:title><image:caption>Frederick, MD, USA - April, 4 2006: Cars wait in long lines to fill their gas tanks at a Costco filling station that offers discounted gasoline as the annual Summer travel season begins and gas prices rise as families increase seasonal travel.</image:caption></image:image><lastmod>2021-05-13T17:50:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2021/04/30/zero-trust-security-a-new-blueprint-to-fight-cybercrime/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2021/04/zero-trust-stock-photo-1-1.jpg</image:loc><image:title>Secure Computer Network. Zero Trust Security Model.</image:title><image:caption>3D illustration of the text zero trust over black background with padlock shapes in relief. Concept of network security.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2021/04/zero-trust-stock-photo-1.jpg</image:loc><image:title>Secure Computer Network. Zero Trust Security Model.</image:title><image:caption>3D illustration of the text zero trust over black background with padlock shapes in relief. Concept of network security.</image:caption></image:image><lastmod>2021-04-30T19:09:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2021/04/13/netizen-cybersecurity-bulletin-april-13th-2021/</loc><lastmod>2021-04-13T15:22:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2021/03/29/netizen-ceo-named-to-the-power-100-list-of-the-most-influential-people-in-the-lehigh-valley/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2021/03/power-100-600w-copy.png</image:loc><image:title>Power-100-600w-copy</image:title></image:image><lastmod>2021-03-29T14:03:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2021/03/25/microsoft-exchange-hack-what-happened-and-what-we-learned/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2021/03/istock-1217827434.jpg</image:loc><image:title>Microsoft offices in Bucharest, Romania. Office building with the logo of Microsoft.</image:title><image:caption>Bucharest/Romania - 03.19.2020: Microsoft offices in Bucharest, Romania. Office building with the logo of Microsoft.</image:caption></image:image><lastmod>2021-03-25T20:21:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2021/03/16/netizen-part-of-team-awarded-75m-department-of-veterans-affairs-community-care-support-contract/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2021/03/va_seal_large.png</image:loc><image:title>va_seal_large</image:title></image:image><lastmod>2021-03-16T14:13:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2021/03/12/netizen-cybersecurity-bulletin-march-12th-2021/</loc><lastmod>2021-03-12T18:14:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2021/02/25/oldsmar-water-treatment-facility-breach-what-happened-and-what-we-learned/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2021/02/istock-1222016728.jpg</image:loc><image:title>sewage treatment plant with sunrise</image:title><image:caption>The Solid Contact Clarifier Tank type Sludge Recirculation process in Water Treatment plant with sunrise</image:caption></image:image><lastmod>2021-02-25T15:54:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2021/02/01/netizen-cybersecurity-bulletin-february-1st-2020/</loc><lastmod>2021-02-01T21:47:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2021/01/14/solarwinds-breach-fallout-what-happened-and-what-we-learned/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2021/01/istock-1199334120.jpg</image:loc><image:title>SolarWinds logo in front of their office for Brno. SolarWinds is an american IT company specialized in Software development for network infrastructure.</image:title><image:caption>"n"nPicture of a sign with the logo of SolarWinds taken on their office in brno. SolarWinds is an American company that develops software for businesses to help manage their networks, systems, and information technology infrastructure. SolarWinds is headquartered in Austin, Texas, with sales and product development offices in a number of locations in the United States and several other countries around the world.</image:caption></image:image><lastmod>2021-01-14T17:07:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2021/01/05/netizen-hires-akhil-handa-as-chief-operating-officer-and-other-team-news/</loc><lastmod>2021-01-05T20:17:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2020/12/22/netizen-cybersecurity-bulletin-december-15-2020/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2020/12/vet-100-2.png</image:loc><image:title>vet-100-2</image:title></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2020/12/sdvosb-2.png</image:loc><image:title>sdvosb-2</image:title></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2020/12/hire-vets-1.png</image:loc><image:title>hire-vets-1</image:title></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2020/12/istock-1218505717.jpg</image:loc><image:title>Internet of things icon innovation technology concept. Smart city wireless communication network IOT ICT. Home intelligent system automation Industry 4.0 modern AI computer online vector illustration</image:title><image:caption>Internet of things icon innovation technology concept. Smart city wireless communication network IOT ICT. Home intelligent system automation Industry 4.0 modern AI computer online vector illustration.</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2020/12/fish-tail-1-amazon.png</image:loc><image:title>Fish Tail 1 Amazon</image:title></image:image><lastmod>2020-12-23T14:52:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2020/12/10/netizen-named-one-of-the-nations-fastest-growing-veteran-owned-businesses-for-2nd-year-in-a-row/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2020/12/vet-100.png</image:loc><image:title>Vet 100</image:title></image:image><lastmod>2020-12-10T20:06:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2020/10/13/netizen-named-2020-game-changer/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2020/10/untitled-design-2020-10-07t153306.961.png</image:loc><image:title>Untitled-design-2020-10-07T153306.961</image:title></image:image><lastmod>2020-10-13T16:14:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2020/09/25/cmmc-dfars-differences/</loc><lastmod>2020-09-25T19:55:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/about/</loc><lastmod>2020-09-06T00:45:04+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://blog.netizen.net/2020/08/24/cloud-databases-issues/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2020/08/adobestock_343144296.jpeg</image:loc><image:title>flat vector business technology storage and cloud server service concept with administrator and developer team working concept</image:title></image:image><lastmod>2020-08-24T18:37:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2020/08/12/netizen-ranks-184-on-the-2020-inc-5000-list/</loc><lastmod>2020-08-12T14:16:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2020/07/08/key-to-compliance/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2020/07/adobestock_316123009-1.jpeg</image:loc><image:title>Businessman using a laptop computer with technology cybersecurity and privacy concept. protection and safe data for global network security.</image:title><image:caption>Businessman using a laptop computer with technology cybersecurity and privacy concept. protection and safe data for global network security.</image:caption></image:image><lastmod>2020-07-08T19:10:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2020/06/05/prepare-your-company-for-cmmc/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2020/06/adobestock_214539256.jpeg</image:loc><image:title>Compliance Rules Law Regulation Policy Business Technology concept</image:title><image:caption>Compliance Rules Law Regulation Policy Business Technology concept.</image:caption></image:image><lastmod>2020-06-04T18:55:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2020/06/04/netizen-awarded-9-2m-u-s-army-cybersecurity-contract/</loc><lastmod>2020-06-04T14:55:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2020/03/17/is-your-company-prepared-for-the-great-remote-work-experiment/</loc><lastmod>2020-03-17T14:39:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2020/01/07/netizen-named-the-nations-second-fastest-growing-veteran-owned-business/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2020/01/ivmf_logo.png</image:loc><image:title>ivmf_logo</image:title></image:image><lastmod>2020-01-07T14:47:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2019/11/07/netizen-receives-award-from-u-s-department-of-labor-for-veteran-employment-initiatives/</loc><lastmod>2019-11-07T14:59:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2019/09/13/netizen-earns-iso-9001-quality-management-certification/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2019/09/iso_9001-2015.jpg</image:loc><image:title>ISO_9001-2015</image:title></image:image><lastmod>2019-09-13T15:25:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2019/09/04/cybersecure-solutions-security-bulletin-september-4-2019/</loc><lastmod>2019-09-04T14:52:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2019/08/21/cybersecure-solutions-security-bulletin-august-21-2019/</loc><lastmod>2019-08-21T14:50:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2019/08/15/inc-magazine-ranks-netizen-as-americas-fastest-growing-cyber-security-company/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2019/08/inc5000_medallion_color.png</image:loc><image:title>inc5000_medallion_color</image:title></image:image><lastmod>2019-08-14T19:56:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2019/08/07/cybersecure-solutions-security-bulletin-august-7-2019-2/</loc><lastmod>2019-08-07T15:51:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2019/07/24/cybersecure-solutions-security-bulletin-july-24-2019/</loc><lastmod>2019-07-24T16:29:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2019/07/10/netizen-cybersecurity-bulletin-june-26-2019-2/</loc><lastmod>2019-07-10T17:21:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2019/06/26/netizen-cybersecurity-bulletin-june-26-2019/</loc><lastmod>2019-06-26T13:36:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2019/06/18/netizen-awarded-845000-u-s-army-cyber-security-engineering-contract/</loc><lastmod>2019-06-18T17:29:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2019/06/12/netizen-cybersecurity-bulletin-12-june-2019/</loc><lastmod>2019-06-12T14:48:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2019/05/29/netizen-cybersecurity-bulletin-29-may-2019/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2019/05/annotation-2019-05-28-114458-1.jpg</image:loc><image:title>Annotation 2019-05-28 114458</image:title></image:image><lastmod>2019-05-29T13:17:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2019/05/16/netizen-named-a-national-best-workplace-by-inc-magazine/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2019/05/inc-magazine-small-1.png</image:loc><image:title>INC MAGAZINE small</image:title></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2019/05/inc-magazine-small.png</image:loc><image:title>INC MAGAZINE small</image:title></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2019/05/best-workplaces-badge-2019.png</image:loc><image:title>best-workplaces-badge-2019</image:title></image:image><lastmod>2019-05-28T19:28:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2019/05/15/netizen-corporation-cybersecurity-bulletin-may-15th-2019/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2019/05/baltimore-cs.jpg</image:loc><image:title>Baltimore Mayor Pugh Announces Her Resignation</image:title><image:caption>BALTIMORE, MD - MAY 02: Baltimore City Hall is seen on May 2, 2019 in Baltimore, Maryland. Baltimore Mayor Catherine Pugh resigned today over controversy related to sales of her children's book which she self-published. (Photo by Alex Wroblewski/Getty Images)</image:caption></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2019/05/hospitals-cs.jpg</image:loc><image:title>Hospitals CS</image:title></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2019/05/lehigh-phish.jpg</image:loc><image:title>Lehigh Phish</image:title></image:image><lastmod>2019-05-16T15:13:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2019/03/08/netizen-corporation-cyber-threat-brief-march-6-2019/</loc><lastmod>2019-05-16T13:36:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2019/03/25/netizen-corporation-cyber-threat-brief-march-20-2019/</loc><lastmod>2019-05-16T13:35:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2019/04/17/netizen-corporation-cybersecurity-bulletin-april-17th-2019/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2019/04/dragonblood-2-e1554995002477.jpg</image:loc><image:title>dragonblood-2-e1554995002477</image:title></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2019/04/cisco-vpn.png</image:loc><image:title>cisco-vpn</image:title></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2019/04/phish-4-15.png</image:loc><image:title>Phish 4-15</image:title></image:image><lastmod>2019-05-16T13:34:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2019/05/01/netizen-corporation-cybersecurity-bulletin-may-1st-2019/</loc><lastmod>2019-05-16T13:32:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2019/02/27/netizens-autostig-software-recognized-by-fedhealthit-magazine/</loc><lastmod>2019-02-27T16:25:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2019/02/20/netizen-cybersecurity-bulletin-20-february-2019/</loc><lastmod>2019-02-20T17:54:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2019/02/06/netizen-cybersecurity-bulletin-06-february-2019/</loc><lastmod>2019-02-06T16:54:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2019/01/23/netizen-cybersecurity-bulletin-23-january-2019/</loc><lastmod>2019-01-23T18:47:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2019/01/23/u-s-army-awards-netizen-4-8m-cyber-security-contract/</loc><lastmod>2019-01-22T21:26:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2019/01/09/netizen-cybersecurity-bulletin-09-january-2019/</loc><lastmod>2019-01-09T18:15:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2019/01/02/netizen-cybersecurity-bulletin-02-january-2019/</loc><lastmod>2019-01-02T17:19:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2018/12/19/netizen-cybersecurity-bulletine-19-december-2018/</loc><lastmod>2018-12-19T18:59:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2018/12/18/netizen-awarded-u-s-navy-seaport-nextgen-nxg-contract-with-52-5b-ceiling-value/</loc><lastmod>2018-12-17T21:06:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2018/12/12/netizen-cybersecurity-bulletin-12-december-2018/</loc><lastmod>2018-12-12T21:10:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2018/12/12/netizen-wins-charleston-defense-summit-innovation-spotlight-award-for-cybersecure-platform/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2018/12/picture1.png</image:loc><image:title>CyberSecure Dashboard</image:title></image:image><lastmod>2018-12-11T20:43:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2018/12/05/netizen-cybersecurity-bulletin-5-december-2018/</loc><lastmod>2018-12-05T16:19:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2018/11/30/netizen-alert-marriott-breached/</loc><lastmod>2018-11-30T19:46:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2018/11/28/netizen-cybersecurity-bulletin-28-november-2018/</loc><lastmod>2018-11-28T17:22:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2018/11/21/netizen-cybersecurity-bulletin-21-november/</loc><lastmod>2018-11-21T16:43:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2018/11/14/netizen-cybersecurity-bulletin-14-november-2018/</loc><lastmod>2018-11-14T15:10:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2018/11/07/netizen-cybersecurity-bulletin-7-november-2018/</loc><lastmod>2018-11-07T17:31:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2018/10/31/netizen-cybersecurity-bulletin-31-october-2018-edition/</loc><lastmod>2018-10-31T16:21:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2018/10/24/netizen-cybersecurity-bulletin-24-october-2018-edition/</loc><lastmod>2018-10-24T15:55:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2018/10/17/netizen-cybersecurity-bulletin-17-october-2018-edition/</loc><lastmod>2018-10-17T16:01:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/07/28/netizen-awarded-gsa-cyber-security-contract/</loc><lastmod>2018-10-12T16:49:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2018/10/11/netizen-receives-federal-recognition-for-veteran-hiring/</loc><lastmod>2018-10-11T17:24:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2018/10/10/netizen-cybersecurity-bulletin-10-october-2018-edition/</loc><lastmod>2018-10-10T16:58:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2018/10/03/netizen-cybersecurity-bulletin-3-october-2018-edition/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2018/10/scam1.jpg</image:loc><image:title>scam1</image:title></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2018/10/phis3.jpg</image:loc><image:title>phis3</image:title></image:image><lastmod>2018-10-03T19:54:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2018/09/26/netizen-cybersecurity-bulletin-26-september-2018-edition/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2018/09/phish25.jpg</image:loc><image:title>phish25</image:title></image:image><lastmod>2018-09-26T15:31:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2018/09/19/netizen-cybersecurity-bulletin-19-september-2018-edition/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2018/09/ips.png</image:loc><image:title>IPS</image:title></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2018/09/phish2.jpg</image:loc><image:title>phish2</image:title></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2018/09/phish1.jpg</image:loc><image:title>phish1</image:title></image:image><lastmod>2018-09-19T14:57:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2018/09/14/netizen-providing-college-scholarships-for-veterans/</loc><lastmod>2018-09-14T15:25:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2018/09/12/netizen-cybersecurity-bulletin-12-september-2018-edition/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2018/09/onephishdrive2.jpg</image:loc><image:title>OnePhishDrive2</image:title></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2018/09/onephishdrive.jpg</image:loc><image:title>OnePhishDrive</image:title></image:image><lastmod>2018-09-12T17:44:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2018/09/05/netizen-cybersecurity-bulletin-5-september-2018-edition/</loc><lastmod>2018-09-05T16:48:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2018/08/29/netizen-cybersecurity-bulletin-28-august-2018-edition/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2018/08/lockcharlie.png</image:loc><image:title>lockcharlie</image:title></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2018/08/phishingcharlie.png</image:loc><image:title>phishingcharlie</image:title></image:image><lastmod>2018-08-29T16:24:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2018/08/27/netizen-updates-and-news/</loc><lastmod>2018-08-27T19:30:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2018/08/22/netizen-cybersecurity-bulletin-22-august-2018-edition/</loc><lastmod>2018-08-22T14:09:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2018/08/15/netizen-cybersecurity-bulletin-15-august-2018-edition/</loc><lastmod>2018-08-15T15:12:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2018/08/08/netizen-cybersecurity-bulletin-8-august-2018-edition/</loc><lastmod>2018-08-08T13:26:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2018/08/07/netizen-named-veteran-owned-business-of-the-year-by-greater-lehigh-valley-chamber-of-commerce/</loc><lastmod>2018-08-07T20:19:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2018/08/01/netizen-cybersecurity-bulletin-1-august-2018-edition/</loc><lastmod>2018-08-01T16:19:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2018/07/25/netizen-cybersecurity-bulletin-25-july-2018-edition/</loc><lastmod>2018-07-25T16:02:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2018/07/18/netizen-cybersecurity-bulletin-18-july-2018-edition/</loc><lastmod>2018-07-18T16:02:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2018/07/11/netizen-cybersecurity-bulletin-11-july-2018-edition/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2018/07/iso.png</image:loc><image:title>ISO</image:title></image:image><lastmod>2018-07-11T16:45:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2018/07/10/netizen-earns-iso-27001-certification-for-cyber-security-solutions/</loc><lastmod>2018-07-10T18:15:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2018/07/05/netizen-cybersecurity-bulletin-5-july-2018-edition/</loc><lastmod>2018-07-05T18:49:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2018/06/27/netizen-threat-brief-27-june-2018-edition/</loc><lastmod>2018-06-27T15:09:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2018/06/20/netizen-threat-brief-20-june-2018-edition/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2018/06/phishingblackbar2.jpg</image:loc><image:title>phishingblackbar2</image:title></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2018/06/phishingblackbar.jpg</image:loc><image:title>phishingblackbar</image:title></image:image><lastmod>2018-06-20T15:11:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2018/06/13/netizen-threat-brief-13-june-2018-edition/</loc><lastmod>2018-06-13T14:38:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2018/06/06/netizen-threat-brief-6-june-2018-edition/</loc><lastmod>2018-06-06T13:59:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2018/05/30/netizen-threat-brief-30-may-2018-edition/</loc><lastmod>2018-05-30T14:52:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2018/05/23/netizen-threat-brief-23-may-2018-edition/</loc><lastmod>2018-05-23T13:57:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2018/05/16/netizen-threat-brief-16-may-2018-edition/</loc><lastmod>2018-05-16T15:10:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2018/05/09/netizen-threat-brief-9-may-2018-edition/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2018/05/https2.png</image:loc><image:title>HTTPS2</image:title></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2018/05/phishing2.jpg</image:loc><image:title>phishing2</image:title></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2018/05/phishing1.jpg</image:loc><image:title>phishing1</image:title></image:image><lastmod>2018-05-09T15:14:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2018/05/02/netizen-threat-brief-2-may-2018-edition/</loc><lastmod>2018-05-02T14:38:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2018/04/25/netizen-threat-brief-critical-threat-this-week/</loc><lastmod>2018-04-25T14:37:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2018/04/23/fda-plans-to-improve-medical-device-cybersecurity/</loc><lastmod>2018-04-23T12:43:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2018/04/18/netizen-threat-brief-18-april-2018-edition/</loc><lastmod>2018-04-18T16:37:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2018/04/17/netizen-hires-rocco-zegalia-as-vice-president-of-sales-and-marketing/</loc><lastmod>2018-04-17T14:52:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2018/04/17/u-s-and-u-k-warn-of-cybersecurity-threat-from-russia/</loc><lastmod>2018-04-17T13:09:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2018/04/11/netizen-threat-brief-11-april-2018-edition/</loc><lastmod>2018-04-11T14:02:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2018/04/04/netizen-threat-brief-4-april-2018-edition/</loc><lastmod>2018-04-04T14:21:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2018/03/28/netizen-threat-brief-28-march-2018/</loc><lastmod>2018-03-28T16:28:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2018/03/21/netizen-threat-brief-21-march-2018-edition/</loc><lastmod>2018-03-21T14:34:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2018/03/16/cybersecurity-by-the-numbers-market-estimates-forecasts-and-surveys/</loc><lastmod>2018-03-19T20:24:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2018/03/14/netizen-threat-brief-14-march-2018-edition/</loc><lastmod>2018-03-14T18:07:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2018/03/12/netizen-promotes-ray-harris-to-vice-president-of-operations/</loc><lastmod>2018-03-11T20:19:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2018/03/08/that-time-of-year-again-cisco-systems-releases-its-annual-cybersecurity-report/</loc><lastmod>2018-03-08T17:30:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2018/03/07/netizen-threat-brief-7-march-2018-edition/</loc><lastmod>2018-03-07T15:39:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2018/02/28/netizen-threat-brief-28-february-2018-edition/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2018/02/digitalbomb.jpg</image:loc><image:title>digitalbomb</image:title></image:image><lastmod>2018-02-28T15:13:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2018/02/27/netizen-promotes-gregory-r-allen-to-senior-vice-president/</loc><lastmod>2018-02-27T15:55:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2018/02/23/netizen-case-study-2018-allentown-city-government-breach/</loc><lastmod>2018-02-23T20:54:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2018/02/22/netizen-threat-brief-21-february-2018-edition/</loc><lastmod>2018-02-22T15:27:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2018/02/21/ai-a-threat-to-cyber-security-warns-report/</loc><lastmod>2018-02-21T15:22:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2018/02/07/netizen-hosting-public-open-house-at-new-allentown-location/</loc><lastmod>2018-02-07T16:12:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2018/01/18/who-should-be-responsible-for-cybersecurity/</loc><lastmod>2018-01-17T17:00:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/12/20/conferences-certifications-or-college-which-is-the-best-path-toward-a-cybersecurity-career/</loc><lastmod>2017-11-08T19:18:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/12/18/former-u-s-security-expert-5-ways-the-insurance-industry-can-improve-cybersecurity/</loc><lastmod>2017-11-08T19:16:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/12/15/regulation-cant-solve-cybersecurity-problems-fed-official-says/</loc><lastmod>2017-11-08T19:14:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/12/13/the-interdependency-of-people-policy-and-products-amid-a-cybersecurity-talent-shortage/</loc><lastmod>2017-11-08T19:13:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/12/11/most-people-arent-using-this-critical-web-security-feature/</loc><lastmod>2017-11-08T19:10:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/12/08/cybersecurity-threat-a-call-to-action/</loc><lastmod>2017-11-08T19:08:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/12/06/cybersecurity-how-blockchain-is-helping-e-commerce-businesses-protect-their-data/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2017/11/blockchain08.jpg</image:loc><image:title>blockchain08</image:title></image:image><lastmod>2017-11-08T19:04:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/12/04/why-directors-should-learn-to-love-cybersecurity/</loc><lastmod>2017-11-08T19:02:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/12/01/examining-the-three-classes-of-cybersecurity-needs/</loc><lastmod>2017-11-08T19:00:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/11/29/cyber-security-is-a-business-risk-not-just-an-it-problem/</loc><lastmod>2017-11-08T18:58:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/11/27/cybersecurity-takeaways-assess-yourself-protect-yourself/</loc><lastmod>2017-11-08T18:54:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/11/24/more-it-professionals-turn-to-cybersecurity-roles/</loc><lastmod>2017-11-07T20:47:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/11/22/cybersecurity-why-its-hard-to-protect-yourself-online/</loc><lastmod>2017-11-07T20:40:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/11/20/cybersecurity-is-becoming-a-problem-people-cant-ignore-hackers-say/</loc><lastmod>2017-11-07T20:38:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/11/17/cybersecurity-threats-create-career-opportunities/</loc><lastmod>2017-11-07T20:34:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/11/15/accenture-latest-firm-caught-with-lax-cybersecurity/</loc><lastmod>2017-11-07T20:05:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/11/13/how-to-sell-cybersecurity-to-your-executive-team/</loc><lastmod>2017-11-07T19:56:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/11/10/5-questions-to-ask-your-ceo-about-cybersecurity/</loc><lastmod>2017-11-07T19:48:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/11/09/the-future-of-cybersecurity-part-ii-the-need-for-automation/</loc><lastmod>2017-11-07T19:46:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/11/08/the-future-of-cybersecurity-part-i-the-problem-of-complexity/</loc><lastmod>2017-11-07T19:43:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/10/27/cybersecurity-should-be-chess-not-checkers/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2017/10/lli-checkers-and-chess-checkers-against-chess-5421249-900px.jpg</image:loc><image:title>Checkers Against Chess</image:title><image:caption>Black chess against white checkers on the board</image:caption></image:image><lastmod>2017-10-17T15:46:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/10/26/searching-for-unicorns-managing-expectations-to-find-cybersecurity-talent/</loc><lastmod>2017-10-17T15:43:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/10/25/cybersecurity-market-driven-by-survival-of-the-fittest/</loc><lastmod>2017-10-17T15:41:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/10/24/the-science-of-cybersecurity/</loc><lastmod>2017-10-17T15:40:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/10/23/why-diverse-cybersecurity-teams-are-better-at-understanding-threats-patient-needs/</loc><lastmod>2017-10-17T15:37:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/10/20/pumpkin-spiced-cybersecurity-october-is-national-cyber-security-awareness-month/</loc><lastmod>2017-10-17T15:34:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/10/19/3-steps-hospital-leaders-can-take-to-boost-cybersecurity-2/</loc><lastmod>2017-10-17T15:32:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/10/18/the-surprise-and-no-delight-edition-whole-foods-sonic-and-bams/</loc><lastmod>2017-10-17T15:30:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/10/17/whole-foods-investigating-hack-of-taprooms-restaurants/</loc><lastmod>2017-10-17T15:21:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/10/16/cybersecurity-program-at-nnmc-a-game-changer/</loc><lastmod>2017-10-16T13:26:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/10/04/cybersecurity-context-matters-when-protecting-patient-data-expert-says/</loc><lastmod>2017-10-05T13:29:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/10/13/3-steps-hospital-leaders-can-take-to-boost-cybersecurity/</loc><lastmod>2017-10-02T14:56:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/10/12/what-it-means-to-have-a-culture-of-cybersecurity/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2017/09/untitled1.png</image:loc><image:title>untitled</image:title></image:image><lastmod>2017-10-02T14:56:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/10/11/inside-job-cybersecurity-to-protect-trade-secrets/</loc><lastmod>2017-10-02T14:55:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/10/10/4-vital-cyber-security-measures-every-safety-conscious-entrepreneur-needs-to-take/</loc><lastmod>2017-10-02T14:55:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/10/09/campaign-advice-for-cisos-for-cyber-security-awareness-month/</loc><lastmod>2017-10-02T14:55:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/10/06/health-it-cybersecurity-5-hiring-misconceptions-to-avoid/</loc><lastmod>2017-10-02T14:55:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/10/05/utilities-will-spend-billions-on-cybersecurity-as-threat-grows/</loc><lastmod>2017-10-02T14:54:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/10/03/whole-foods-hit-by-hackers-in-latest-cybersecurity-breach/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2017/09/mw-fo636_amazon_20170616095907_zh.jpg</image:loc><image:title>MW-FO636_amazon_20170616095907_ZH</image:title></image:image><lastmod>2017-10-02T14:54:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/10/02/equifax-breach-makes-cybersecurity-more-urgent-than-ever/</loc><lastmod>2017-10-02T14:53:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/09/18/hackers-compromised-free-ccleaner-software-avasts-piriform-says/</loc><lastmod>2017-09-18T19:06:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/10/02/3-ways-ai-could-help-resolve-the-cybersecurity-talent-crisis/</loc><lastmod>2017-09-11T20:06:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/09/29/38-of-attorneys-fail-to-disclose-cybersecurity-issues-to-board/</loc><lastmod>2017-09-11T19:54:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/09/28/2-cybersecurity-violations-found-at-pilgrim/</loc><lastmod>2017-09-11T19:51:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/09/27/taking-stock-of-trumps-cybersecurity-executive-order-so-far/</loc><lastmod>2017-09-11T19:29:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/09/26/are-veterans-the-answer-to-the-channels-cyber-security-skills-gap/</loc><lastmod>2017-09-11T19:25:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/09/25/the-haves-and-have-nots-in-cybersecurity-how-your-company-can-level-the-playing-field/</loc><lastmod>2017-09-11T19:19:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/09/22/the-cybersecurity-regulatory-crackdown/</loc><lastmod>2017-09-11T19:15:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/09/21/how-to-keep-pace-with-the-shifting-sands-of-cybersecurity/</loc><lastmod>2017-09-11T19:11:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/09/20/3-ways-blockchain-is-revolutionizing-cybersecurity/</loc><lastmod>2017-09-11T19:04:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/09/19/the-equifax-breach-former-white-house-cio-believes-marketers-need-to-be-engaged-in-cybersecurity/</loc><lastmod>2017-09-11T18:52:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/09/18/equifax-a-category-5-cybersecurity-crisis-storm-chances-are-it-will-hit-you/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2017/09/untitled.png</image:loc><image:title>untitled</image:title></image:image><lastmod>2017-09-11T18:45:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/09/08/giant-equifax-data-breach-143-million-people-could-be-affected/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2017/09/broken_locks_by_fantasydreams46-d3fe2hp.jpg</image:loc><image:title>broken_locks_by_fantasydreams46-d3fe2hp</image:title></image:image><lastmod>2017-09-08T13:45:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/08/31/taxslayer-data-breach-leaves-thousands-of-us-financial-accounts-and-tax-filings-at-risk/</loc><lastmod>2017-08-31T20:19:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/09/15/5-reasons-cyber-security-is-failing-and-what-pc-insurers-can-do-about-it/</loc><lastmod>2017-08-24T17:24:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/09/14/100-of-government-it-workers-said-employees-are-biggest-threat-to-cybersecurity/</loc><lastmod>2017-08-24T17:22:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/09/13/all-the-ways-us-government-cybersecurity-falls-flat/</loc><lastmod>2017-08-24T17:17:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/09/12/10-bad-habits-cybersecurity-professionals-must-break/</loc><lastmod>2017-08-24T16:41:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/09/11/9-factors-to-ensure-your-cybersecurity-policy-works-for-your-staff-not-against-them/</loc><lastmod>2017-08-24T16:38:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/09/08/staying-in-front-of-cybersecurity-innovation/</loc><lastmod>2017-08-24T16:33:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/09/07/national-science-foundation-targets-cybersecurity-through-triad-scholarships/</loc><lastmod>2017-08-24T16:30:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/09/06/viewing-cybersecurity-from-the-consumers-perspective/</loc><lastmod>2017-08-24T15:32:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/09/05/350-more-cybersecurity-pros-in-washington-d-c-area-than-rest-of-u-s/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2017/08/washington-beltway-capital_beltway_anacostia_freeway_junction-100731006-large.jpg</image:loc><image:title>washington-beltway-capital_beltway_anacostia_freeway_junction-100731006-large</image:title></image:image><lastmod>2017-08-24T15:31:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/09/04/why-is-there-no-silver-bullet-in-cybersecurity/</loc><lastmod>2017-08-24T14:46:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/09/01/hacking-cybersecurity-to-anticipate-attacks/</loc><lastmod>2017-08-24T14:43:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/08/31/moving-forward-with-machine-learning-for-cybersecurity/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2017/08/artificial_intelligence_machine_learning_thinkstock_643516230-100724412-large.jpg</image:loc><image:title>artificial_intelligence_machine_learning_thinkstock_643516230-100724412-large</image:title></image:image><lastmod>2017-08-24T14:38:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/08/30/this-is-one-of-the-hottest-tech-jobs-right-now/</loc><lastmod>2017-08-24T14:35:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/08/29/the-cybersecurity-strategies-governments-need/</loc><lastmod>2017-08-24T14:32:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/08/28/one-easy-thing-your-agency-can-do-to-attract-more-cybersecurity-talent/</loc><lastmod>2017-08-24T14:27:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/08/25/why-the-majority-of-msps-struggle-to-find-enough-cybersecurity-pros-to-hire/</loc><lastmod>2017-08-24T14:25:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/08/24/3-things-you-need-to-know-about-cybersecurity-in-an-iot-and-mobile-world/</loc><lastmod>2017-08-10T16:43:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/08/23/how-to-become-a-cybersecurity-superhero/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2017/08/superman-stock-712.jpg</image:loc><image:title>Superman Costume on Strong Young Man</image:title><image:caption>Penfield, New York, USA - October 30, 2009: Young man dressed in a Superman costume pulls off his outer shirt and tie.</image:caption></image:image><lastmod>2017-08-10T16:39:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/08/22/technet-panel-discusses-lack-of-women-in-cyber-security-industry/</loc><lastmod>2017-08-10T16:34:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/08/21/healthcare-is-turning-a-corner-on-cybersecurity-new-himss-research-shows/</loc><lastmod>2017-08-10T16:31:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/08/18/cybersecurity-is-a-human-challenge-air-force-ciso-advises/</loc><lastmod>2017-08-10T16:28:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/08/17/stop-treating-users-as-the-enemy-when-it-comes-to-cybersecurity/</loc><lastmod>2017-08-10T16:26:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/08/16/cybersecurity-analytics-and-operations-skills-shortage/</loc><lastmod>2017-08-10T16:25:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/08/15/when-it-comes-to-cybersecurity-companies-need-force-fields-not-walls/</loc><lastmod>2017-08-10T16:22:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/07/25/survey-does-your-cybersecurity-have-defense-in-depth/</loc><lastmod>2017-08-10T15:39:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/08/14/cybersecurity-the-cold-war-online/</loc><lastmod>2017-07-25T17:09:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/08/11/un-finds-cybersecurity-is-a-struggle-worldwide/</loc><lastmod>2017-07-25T17:05:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/08/10/guide-to-the-top-college-and-university-cyber-security-degree-programs/</loc><lastmod>2017-07-25T17:03:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/08/09/cybersecurity-a-top-priority-among-companies-organizations/</loc><lastmod>2017-07-25T15:42:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/08/08/strengthening-cybersecurity-should-not-compromise-healthcare-delivery/</loc><lastmod>2017-07-25T15:40:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/08/07/a-new-approach-to-federal-cybersecurity-2-years-after-the-opm-breach/</loc><lastmod>2017-09-05T11:57:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/08/04/how-to-start-a-career-in-cybersecurity/</loc><lastmod>2017-07-24T19:48:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/08/03/local-governments-focus-on-cybersecurity-after-attacks/</loc><lastmod>2017-07-24T19:45:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/08/02/whos-responsible-for-cybersecurity-the-adviser-or-the-firm/</loc><lastmod>2017-07-24T19:43:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/08/01/the-3-most-in-demand-cybersecurity-jobs-of-2017/</loc><lastmod>2017-07-24T19:40:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/07/31/cybersecurity-is-too-important-to-be-bogged-down-in-government-bureaucracy/</loc><lastmod>2017-07-24T19:37:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/07/28/it-is-not-cybersecurity/</loc><lastmod>2017-07-24T19:35:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/07/27/cybersecurity-threats-create-growing-risk-of-destruction-of-service/</loc><lastmod>2017-07-24T19:32:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/07/26/cybersecurity-skills-shortage-hurts-security-analytics-operations/</loc><lastmod>2017-07-24T19:29:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/07/24/what-is-and-what-isnt-working-when-it-comes-to-cybersecurity/</loc><lastmod>2017-07-10T18:18:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/07/21/what-it-will-take-for-cybersecurity-to-become-common-sense/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2017/07/capture.png</image:loc><image:title>Capture</image:title></image:image><lastmod>2017-07-10T18:13:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/07/14/cybersecurity-for-the-road-warrior-3-tips-for-success/</loc><lastmod>2017-07-10T18:07:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/07/13/cybersecurity-is-hot-and-these-washington-colleges-teach-it/</loc><lastmod>2017-07-10T18:05:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/07/12/bankers-are-hiring-cyber-security-experts-to-help-get-deals-done/</loc><lastmod>2017-07-10T17:58:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/07/20/cybersecurity-411-effective-incident-response/</loc><lastmod>2017-07-10T17:50:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/07/17/cybersecurity-411-the-value-of-your-information/</loc><lastmod>2017-07-10T17:48:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/07/19/cybersecurity-411-tech-myths/</loc><lastmod>2017-07-10T17:48:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/07/18/cybersecurity-411-implementing-governance/</loc><lastmod>2017-07-10T17:46:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/07/11/four-cybersecurity-lessons-from-mr-robot/</loc><lastmod>2017-07-07T15:12:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/07/10/the-behavioral-economics-of-why-executives-underinvest-in-cybersecurity/</loc><lastmod>2017-06-26T20:01:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/07/07/cybersecurity-is-on-the-precipice-of-a-new-and-dark-era/</loc><lastmod>2017-06-26T20:00:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/07/06/cybersecurity-stands-as-big-sticking-point-in-software-ma/</loc><lastmod>2017-06-26T19:58:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/07/05/cybersecurity-insurance-a-new-answer-to-online-crime/</loc><lastmod>2017-06-26T19:56:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/07/04/how-to-use-the-mr-robot-approach-to-cybersecurity/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2017/07/e2f28d6303e0180b9e7c5f065cb65e22.jpg</image:loc><image:title>e2f28d6303e0180b9e7c5f065cb65e22</image:title></image:image><lastmod>2017-06-26T19:54:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/07/03/global-shortage-of-cybersecurity-workers-to-create-1-8mln-vacancies-by-2022/</loc><lastmod>2017-06-26T19:51:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/06/30/why-is-cybersecurity-so-hard/</loc><lastmod>2017-06-26T19:49:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/06/28/cyber-money-better-spent-on-attack-deterrence-not-recovery/</loc><lastmod>2017-06-26T19:47:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/06/27/cybersecurity-jobs-report-cybersecurity-ventures-predicts-there-will-be-3-5-million-cybersecurity-job-openings-by-2021/</loc><lastmod>2017-06-26T19:47:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/06/29/the-major-component-missing-from-trumps-executive-order-on-cybersecurity/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2017/06/170601_futuretense_techdonaldtrump-crop-promo-xlarge2.jpg</image:loc><image:title>170601_FUTURETENSE_TechDonaldTrump.jpg.CROP.promo-xlarge2</image:title></image:image><lastmod>2017-06-26T19:46:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/06/26/how-humans-not-computers-are-the-biggest-problem-in-cybersecurity/</loc><lastmod>2017-06-26T19:41:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/06/15/nonprofits-need-cybersecurity-too/</loc><lastmod>2017-06-15T18:40:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/06/16/why-manufacturers-should-be-mindful-of-cybersecurity/</loc><lastmod>2017-06-08T18:35:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/06/14/5-key-takeaways-from-isacas-cybersecurity-report/</loc><lastmod>2017-06-08T18:27:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/06/13/is-cybersecurity-a-second-coming-for-ai/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2017/06/aaeaaqaaaaaaaa1eaaaajdm2owfimmmyltvlzwutndrjyi05ytg3lwixntnkzgy4odvmng.jpg</image:loc><image:title>AAEAAQAAAAAAAA1EAAAAJDM2OWFiMmMyLTVlZWUtNDRjYi05YTg3LWIxNTNkZGY4ODVmNg</image:title></image:image><lastmod>2017-06-08T18:24:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/06/12/the-5-non-cyber-challenges-facing-federal-cybersecurity/</loc><lastmod>2017-06-08T18:20:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/06/09/how-to-get-your-staff-to-take-cybersecurity-seriously/</loc><lastmod>2017-06-08T18:06:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/06/08/cybersecurity-roi-still-a-tough-sell/</loc><lastmod>2017-06-08T17:59:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/05/30/cyber-security-the-worlds-best-and-worst-presented-with-a-well-designed-infographic/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2017/05/malware-rates-by-country_comparitech.jpg</image:loc><image:title>Malware-rates-by-country_Comparitech</image:title></image:image><lastmod>2017-05-19T18:05:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/05/29/the-pitfalls-of-cybersecurity-shopping-hype-and-shoddy-products/</loc><lastmod>2017-05-19T17:56:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/05/26/making-sense-of-cybersecurity-qualifications/</loc><lastmod>2017-05-19T17:49:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/05/25/medium-sized-employers-overlooking-cyber-security/</loc><lastmod>2017-05-19T17:47:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/05/24/financial-firms-hit-with-million-dollar-losses-per-cybersecurity-incident/</loc><lastmod>2017-05-19T17:27:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/05/23/harford-community-college-shows-off-new-cybersecurity-labs/</loc><lastmod>2017-05-19T17:24:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/05/19/cybersecurity-has-a-serious-talent-shortage-heres-how-to-fix-it/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2017/05/untitled.png</image:loc><image:title>untitled</image:title></image:image><lastmod>2017-05-19T17:21:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/05/22/what-you-need-to-know-now-about-cybersecurity-and-social-media/</loc><lastmod>2017-05-19T17:20:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/05/05/10-schools-top-new-ranking-of-best-cybersecurity-programs/</loc><lastmod>2017-04-24T15:49:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/05/04/these-are-10-cybersecurity-myths-that-must-be-busted/</loc><lastmod>2017-04-24T15:46:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/05/03/to-win-the-cybersecurity-war-we-need-to-teach-kids-how-to-hack/</loc><lastmod>2017-04-24T15:44:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/05/02/how-to-find-cybersecurity-vulnerabilities-across-your-environment/</loc><lastmod>2017-04-24T15:41:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/05/01/ai-powered-cybersecurity-bot-on-display-at-smithsonian/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2017/04/mayhem.png</image:loc><image:title>mayhem</image:title></image:image><lastmod>2017-04-24T15:37:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/04/28/whats-wrong-with-americas-current-approach-to-cybersecurity-2/</loc><lastmod>2017-04-24T15:34:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/04/27/tons-of-80000-entry-level-jobs-going-ignored/</loc><lastmod>2017-04-24T15:32:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/04/25/4-critical-points-to-consider-when-receiving-cybersecurity-and-privacy-advice/</loc><lastmod>2017-04-24T15:26:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/04/26/federal-effort-is-needed-to-address-shortfall-in-cybersecurity-talent/</loc><lastmod>2017-04-24T15:26:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/04/24/automation-advances-cybersecurity-in-ai-race-but-challenges-remain/</loc><lastmod>2017-04-24T15:20:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/04/18/congress-mulls-sme-cybersecurity-legislation/</loc><lastmod>2017-04-10T17:54:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/04/21/cybersecuritys-people-problem-more-millennials-needed/</loc><lastmod>2017-04-10T17:54:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/04/10/private-sectors-national-cybersecurity-strategy-contributions-lacking/</loc><lastmod>2017-04-10T17:53:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/04/10/survey-americans-have-shallow-understanding-of-cybersecurity/</loc><lastmod>2017-04-10T17:52:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/04/20/as-cities-get-smarter-hackers-become-more-dangerous-this-could-stop-them/</loc><lastmod>2017-04-10T17:49:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/04/19/whats-wrong-with-americas-current-approach-to-cybersecurity/</loc><lastmod>2017-04-10T17:47:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/04/14/cybersecurity-skills-arent-taught-in-college/</loc><lastmod>2017-04-10T17:39:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/04/12/inside-the-murky-world-of-hackers-for-hire/</loc><lastmod>2017-04-10T17:35:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/04/17/low-tech-threats-make-high-tech-cybersecurity-everyones-business/</loc><lastmod>2017-04-10T17:26:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/04/13/top-10-cybersecurity-best-practices/</loc><lastmod>2017-04-10T17:20:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/04/11/why-threat-hunting-is-the-future-of-cybersecurity/</loc><lastmod>2017-04-10T17:18:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/03/24/exploring-the-gap-between-cybersecurity-perception-and-reality/</loc><lastmod>2017-03-24T14:45:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/03/24/why-cybersecurity-should-be-a-no-1-business-priority-for-2017/</loc><lastmod>2017-03-24T14:45:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/03/24/congressman-we-need-a-national-guard-for-cybersecurity/</loc><lastmod>2017-03-24T14:45:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/03/24/cybersecuritys-human-side-how-can-we-solve-our-people-problem/</loc><lastmod>2017-03-24T14:45:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/03/24/artificial-intelligence-makes-cybersecurity-the-ideal-field-for-new-collar-jobs/</loc><lastmod>2017-03-24T14:44:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2017/02/15/netizen-welcomes-new-federal-sales-executive-greg-allen-to-the-team/</loc><lastmod>2017-02-15T20:16:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2016/10/26/security-fatigue-can-cause-computer-users-to-feel-hopeless-and-act-recklessly-new-study-suggests/</loc><lastmod>2016-10-07T00:31:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2016/10/03/netizen-awarded-9-9m-u-s-army-cybersecurity-contract/</loc><lastmod>2016-10-04T19:24:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2016/10/25/why-cybersecurity-is-not-so-complicated/</loc><lastmod>2016-09-28T13:30:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2016/10/20/cybersecurity-is-a-must-even-for-smaller-firms/</loc><lastmod>2016-09-28T13:23:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2016/09/28/dod-to-take-on-the-next-challenge-with-cloud-application-security/</loc><lastmod>2016-09-26T18:57:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2016/09/27/politicians-are-coming-with-new-cybersecurity-requirements-are-you-ready/</loc><lastmod>2016-09-26T18:55:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2016/10/19/bill-requires-agencies-to-help-small-businesses-with-cybersecurity/</loc><lastmod>2016-09-26T18:52:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2016/10/18/homeland-security-increases-focus-on-cybersecurity-at-the-polls/</loc><lastmod>2016-09-26T18:46:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2016/10/17/look-out-companies-here-come-the-cyber-regulations/</loc><lastmod>2016-09-26T18:42:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2016/10/13/good-cybersecurity-can-be-good-marketing/</loc><lastmod>2016-09-26T18:40:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2016/10/12/how-cybersecurity-teams-can-convince-the-c-suite-of-their-value/</loc><lastmod>2016-09-22T16:46:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2016/10/11/nist-launches-self-assessment-tool-for-cybersecurity/</loc><lastmod>2016-09-22T16:43:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2016/10/06/cybersecurity-is-threatening-americas-military-supremacy/</loc><lastmod>2016-09-22T16:42:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2016/10/05/securing-the-hybrid-cloud/</loc><lastmod>2016-09-21T17:49:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2016/10/04/nist-releases-draft-guidance-for-cybersecurity-excellence/</loc><lastmod>2016-09-21T17:47:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2016/09/29/the-biggest-cybersecurity-threats-are-inside-your-company/</loc><lastmod>2016-09-21T17:45:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2016/09/21/rugged-devops-build-security-into-software-development/</loc><lastmod>2016-09-13T17:34:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2016/09/15/nsa-chief-potential-russian-hacking-of-u-s-elections-a-concern/</loc><lastmod>2016-09-13T17:26:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2016/09/19/new-york-financial-regulator-rolls-out-cybersecurity-proposals/</loc><lastmod>2016-09-13T17:20:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2016/09/13/cybersecurity-is-the-job-of-every-executive/</loc><lastmod>2016-09-13T17:18:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2016/09/28/can-cybersecurity-save-the-november-elections/</loc><lastmod>2016-09-08T15:54:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2016/09/26/defining-the-common-core-of-cybersecurity-certifications-practical-experience/</loc><lastmod>2016-09-08T15:53:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2016/09/22/obama-warns-against-cyber-cold-war/</loc><lastmod>2016-09-08T15:50:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2016/09/20/that-call-from-your-friendly-computer-security-company-probably-a-scam/</loc><lastmod>2016-09-20T19:51:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2016/09/14/opm-spent-less-than-nearly-all-other-federal-agencies-on-cybersecurity/</loc><lastmod>2016-09-08T13:38:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2016/09/12/a-team-of-hackers-has-changed-the-future-of-computing-forever/</loc><lastmod>2016-09-07T15:23:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2016/09/08/feds-warn-states-to-batten-down-hatches-following-election-system-attacks/</loc><lastmod>2016-09-06T15:13:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2016/09/06/security-study-developer-rush-to-release-increases-app-risk/</loc><lastmod>2016-09-06T13:49:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2016/08/31/feds-are-using-big-data-analytics-for-cybersecurity-but-is-it-effective/</loc><lastmod>2016-08-31T14:18:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2016/08/25/hospital-cybersecurity-failing-to-encrypt-transmitted-health-records/</loc><lastmod>2016-08-24T18:59:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2016/08/24/despite-billions-spent-on-cybersecurity-companies-arent-truly-safe-from-hacks/</loc><lastmod>2016-08-23T14:09:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2016/08/23/health-care-cybersecurity-a-decade-behind-himss-survey-reveals/</loc><lastmod>2016-08-23T14:07:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2016/08/09/fda-outlines-cybersecurity-recommendations-for-medical-device-manufacturers/</loc><lastmod>2016-08-09T19:56:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2016/08/16/ransomware-hit-nearly-50-of-businesses-in-2015-study/</loc><lastmod>2016-08-04T15:37:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2016/08/11/leveraging-cybersecurity-for-a-better-entrepreneurial-ecosystem/</loc><lastmod>2016-08-03T19:17:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2016/08/09/cybersecurity-skills-shortage-leaves-companies-vulnerable/</loc><lastmod>2016-08-03T19:16:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2016/08/04/do-not-let-cybersecurity-threats-slow-productivity-and-economic-growth/</loc><lastmod>2016-08-03T19:14:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2016/08/03/the-most-critical-gap-in-cybersecurity-today-talent/</loc><lastmod>2016-08-03T19:13:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2016/07/21/companies-failing-to-plan-for-many-cyber-dangers/</loc><lastmod>2016-07-21T15:55:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2016/07/06/netizen-awarded-navy-seaport-e-contract-with-5-8b-ceiling-value/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2016/07/seaport-e.jpg</image:loc><image:title>seaport-e</image:title></image:image><lastmod>2016-07-06T14:02:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2016/07/13/what-does-a-cybersecurity-ready-company-look-like/</loc><lastmod>2016-07-01T15:44:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2016/07/11/it-is-time-to-think-of-cybersecurity-as-a-business-enabler/</loc><lastmod>2016-07-01T15:42:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2016/07/07/ciso-challenges-addressing-cybersecurity-blind-spots/</loc><lastmod>2016-06-29T19:17:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2016/07/05/why-government-security-belongs-in-the-cloud/</loc><lastmod>2016-06-29T19:14:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2016/06/30/gartners-top-10-security-predictions/</loc><lastmod>2016-06-29T19:13:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2016/06/29/study-shows-deep-flaws-in-healthcare-cybersecurity/</loc><lastmod>2016-06-29T19:09:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2016/04/25/netizen-ceo-named-to-top-40-under-40-in-the-lehigh-valley/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2016/04/cceimg.jpg</image:loc><image:title>cceimg</image:title></image:image><lastmod>2016-04-25T14:16:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2015/12/10/netizen-named-emerging-business-of-the-year-for-the-greater-lehigh-valley-region/</loc><lastmod>2015-12-10T18:39:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2015/11/30/lehigh-valley-company-enlisted-for-power-grid-cybersecurity-project/</loc><lastmod>2015-11-26T01:31:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2015/11/16/netizen-supporting-12-2m-federal-program-to-enhance-energy-grid-cyber-security/</loc><lastmod>2015-11-15T05:08:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2015/09/30/netizen-corporation-recognized-as-lehigh-valley-emerging-business-of-the-year-finalist/</loc><lastmod>2015-09-30T02:56:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2014/03/21/netizen-corporation-becomes-a-va-verified-service-disabled-veteran-owned-small-business-sdvosb/</loc><lastmod>2015-08-24T03:20:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2015/07/16/allentown-based-netizen-corporation-awarded-514000-contract-by-defense-logistics-agency-for-it-support/</loc><lastmod>2015-07-16T17:09:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2015/07/11/netizen-cyber-threat-intelligence-july-8th-2015/</loc><lastmod>2015-07-11T11:34:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2015/06/26/netizen-cyber-threat-intelligence-june-24-2015/</loc><lastmod>2015-06-26T20:01:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2015/06/12/it-threat-intelligence-newsletter/</loc><lastmod>2015-06-12T13:58:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2015/04/03/the-netizen-approach-to-security-and-innovation/</loc><lastmod>2015-04-03T22:43:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2014/12/30/2014-in-review/</loc><lastmod>2014-12-30T20:29:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2014/12/29/reimagining-healthcare-through-wearable-tech-and-collaboration/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2014/12/doctorpov.png</image:loc><image:title>Featured Image -- 702</image:title></image:image><lastmod>2014-12-29T16:47:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2014/12/23/the-new-age-of-the-security-startup/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2014/12/11484777313_faf91f9ca7_z.jpg</image:loc><image:title>Featured Image -- 700</image:title></image:image><lastmod>2014-12-23T21:52:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2014/12/18/why-the-future-of-digital-security-is-open/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2014/12/shutterstock_157028330.jpg</image:loc><image:title>Featured Image -- 697</image:title></image:image><lastmod>2014-12-19T01:30:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2014/12/18/waging-a-war-for-talent/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2014/12/talentwar.jpg</image:loc><image:title>Featured Image -- 695</image:title></image:image><lastmod>2014-12-19T01:22:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2014/11/28/the-problem-of-offshoring-it/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2014/11/stress_small.jpg</image:loc><image:title>Bankrupt</image:title></image:image><lastmod>2014-11-30T04:08:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2014/11/09/military-veterans-and-startups/</loc><lastmod>2014-11-10T00:39:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2014/10/02/why-including-women-matters-for-the-future-of-technology-and-society/</loc><lastmod>2014-10-02T17:12:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2014/09/04/va-seeking-analytics-tools-to-enhance-veteran-care/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2014/09/tomas-okeefe_65x85.jpg</image:loc><image:title>Tomas OKeefe_65x85</image:title></image:image><lastmod>2014-09-04T21:36:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2014/08/30/cyber-security-depends-on-education/</loc><lastmod>2014-08-30T19:24:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2014/08/25/compliance-does-not-equal-security/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2014/08/creditcards.jpg</image:loc><image:title>Credit and debit cards</image:title></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2014/08/checklist.jpg</image:loc><image:title>Handwritten checklist</image:title></image:image><lastmod>2014-08-25T23:39:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2014/08/22/are-the-hackers-winning-2014-is-shaping-up-as-a-record-year-in-security-breaches/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2014/08/hacker1.jpg</image:loc><image:title>hacker</image:title></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2014/08/hacker.jpg</image:loc><image:title>Featured Image -- 647</image:title></image:image><lastmod>2014-08-23T00:15:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2014/07/18/dont-sell-a-product-sell-a-whole-new-way-of-thinking/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2014/07/20140721_1.jpg</image:loc><image:title>Featured Image -- 645</image:title></image:image><lastmod>2014-07-19T02:35:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2014/06/25/seek-partners-not-prospects/</loc><lastmod>2014-06-25T21:52:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2014/06/23/smarter-government-through-openness/</loc><lastmod>2014-06-23T23:37:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2014/06/22/add-value-not-complexity/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2014/06/complex.jpg</image:loc><image:title>complex</image:title></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2014/06/cogs.png</image:loc><image:title>cogs</image:title></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2014/06/network.jpg</image:loc><image:title>Abstract network</image:title></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2014/06/crm-integration.png</image:loc><image:title>Integration</image:title></image:image><lastmod>2014-06-23T22:55:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2014/05/26/inside-jobs-why-the-best-software-engineers-never-stop-learning/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2014/05/screen-shot-2014-05-12-at-3-02-24-pm.png</image:loc><image:title>Featured Image -- 624</image:title></image:image><lastmod>2014-05-27T00:10:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2014/04/13/the-pace-of-change/</loc><lastmod>2014-04-13T22:44:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2014/04/12/what-to-do-about-heartbleed-a-gaping-security-hole-affecting-66-percent-of-the-internet-at-least/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2014/04/ss-cybersecurity.jpg</image:loc><image:title>Featured Image -- 455</image:title></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2014/04/heartbleed.png</image:loc><image:title>The terrifying Heartbleed bug's logo.</image:title></image:image><lastmod>2014-04-12T17:38:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2014/04/04/coding-vs-engineering-what-you-need-to-grow-your-startup/</loc><lastmod>2014-04-11T08:42:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2014/03/30/working-rediculously-long-hours-is-a-sign-that-something-is-wrong/</loc><lastmod>2014-03-31T01:26:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2014/03/27/on-hiring-veterans/</loc><lastmod>2014-03-28T02:02:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2014/03/23/fast-cheap-good-enough-software-is-not-good-for-business/</loc><lastmod>2014-03-24T18:30:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2013/11/19/the-startup-accelerator-trend-is-finally-slowing-down/</loc><lastmod>2013-11-20T01:56:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2013/10/17/startup-founders-must-love-to-learn/</loc><lastmod>2013-10-18T19:07:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2013/10/18/lessons-in-startup-project-management-part-ii-the-tools/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2013/10/ms-project-3.jpg</image:loc><image:title>MS Project</image:title></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2013/10/jira_project_dashboard.png</image:loc><image:title>Jira Project Dashboard</image:title></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2013/10/trello.png</image:loc><image:title>trello</image:title></image:image><lastmod>2013-10-20T20:02:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2013/10/06/how-a-scrappy-startup-in-a-dc-garage-revolutionized-healthcare-gov/</loc><lastmod>2013-10-18T19:06:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2013/09/18/microsoft-lync-online-speek-conferencing-bliss/</loc><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2013/09/speek.jpeg</image:loc><image:title>speek</image:title></image:image><image:image><image:loc>https://blog.netizen.net/wp-content/uploads/2013/09/lync13logo.png</image:loc><image:title>Lync13Logo</image:title></image:image><lastmod>2013-09-19T00:30:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2013/09/18/houston-we-have-a-problem-in-startup-project-management/</loc><lastmod>2013-09-18T01:57:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net/2013/09/17/why-we-are-proud-of-being-veteran-owned/</loc><lastmod>2013-09-17T00:15:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.netizen.net</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2026-04-02T21:32:12+00:00</lastmod></url></urlset>
