<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//heimdalsecurity.com/blog/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://heimdalsecurity.com/blog/posts/</loc>
		<lastmod>2026-03-31T14:31:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/improve-your-online-safety-the-daily-security-tip/</loc>
		<lastmod>2017-12-11T14:59:45+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hs-This-daily-email-will-help-you-secure-your-online-world_2691EC.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/the-daily-security-tip.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cybersecurity-quantum-era/</loc>
		<lastmod>2019-08-30T09:15:24+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Bianca-Cybersecurity-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/quantum_cryptography.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Atman-Rathod.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/the-krack-wi-fi-vulnerability/</loc>
		<lastmod>2021-02-03T14:43:25+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heres-what-you-need-to-know-about-the-Krack-vulnerability.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/krack-wifi-vulnerability-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/protect-your-pc-multiple-layers-security/</loc>
		<lastmod>2021-02-08T12:27:59+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hs-A-visual-guide-to-building-your-own-online-security-system_255515.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/build-your-protection-like-a-fortress.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/types-of-digital-assets-to-protect.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/How-to-Protect-Your-PC-with-Multiple-Layers-.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/linkedin-security-privacy-essential-guide/</loc>
		<lastmod>2021-02-15T12:18:10+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hs-Enhance-your-LinkedIns-account-security-_-privacy_007BB6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Password.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/LinkedIn-mobile-app.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/LinkedIn-security-Two-Step-Verification.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/LinkedIn-security-View-active-sessions.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/LinkedIn-security-Profile-viewing-options.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/LinkedIn-security-Third-Party-Apps.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/LinkedIn-security-Request-Data-Archive.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Phishing.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/LinkedIn-logo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/security-alert-adwind-rat-targeted-attacks-zero-av-detection/</loc>
		<lastmod>2021-02-16T16:00:29+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Security-Alert-Adwind-RAT-_894401.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/adwind-rat-detection-July-4-2016.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/ways-to-help-parents-with-online-security/</loc>
		<lastmod>2021-02-18T10:27:58+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hs-Essential-cyber-security-mistakes-our-parents-are-making_84A3BF.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Permanently-connected-online.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2015-worst-passwords.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Password.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2014/07/google_two_step_authentication.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/How-your-online-accounts-are-interconnected.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Mobile-phone.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Padlocks.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Lottery-scam-Facebook.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Common-scam-tricks-tactics.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Amy-Winehouse-dead-Facebook-scam.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Hurricane-Irene-Facebook-scam.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/shutterstock_167852012.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2014/12/data-privacy.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Adam-Sandler-conspiracy.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Top-software-vulnerabilities-2015.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Dangers-of-outdated-software-potential-for-malware-infections-Heimdal-Security.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/8-software-apps-make-99-percent-of-computer-vulnerable-heimdal-security.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/hackers-self-driving-cars/</loc>
		<lastmod>2021-02-18T15:16:02+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Bianca-Diveless-Cars-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/image4-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/deloitte2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/deloitte.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/image5.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/image3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/is-apple-pay-safe/</loc>
		<lastmod>2021-02-19T12:18:08+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Apple-Pay-Bianca-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Apple-Pay-Uses.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/apple-cash-apple-card.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Apple-email-phishing-attempt.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/blueborne-the-attack-that-can-spread-malware-without-an-internet-connection/</loc>
		<lastmod>2021-02-19T13:25:03+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/BlueBorne-the-new-attack-vector.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/fan-courier-phishing/</loc>
		<lastmod>2021-02-19T14:34:52+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/152202194_1114105279107013_8441166468278120140_n.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/152086342_702382910440707_7858647908218912326_n-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/151492437_443770390166795_7085118375988474562_n.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/hancitor-malware-delta-airlines/</loc>
		<lastmod>2021-02-19T17:50:02+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hs-This-Delta-Airlines-scam-wants-to-steal-your-credentials-a_48313C.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/180417-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/delta-schedule-change.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/data-leakage-types-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/security-alert-new-spam-run-dridex-malware/</loc>
		<lastmod>2021-02-22T15:19:49+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hs-Are-you-protected-against-financial-malware_172015.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/screenshot-of-AV-detection-rates.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/dridex-active-against-october-2015.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/twitter-security-privacy-essential-guide/</loc>
		<lastmod>2021-02-22T15:30:45+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/twitter-security_6EADDC.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Twitter-settings-Login-verification.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/iPhone-5s.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Twitter-settings-Protect-Tweets.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Twitter-settings-Location-information-delete.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Twitter-settings-third-party-apps.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Insider-Advice-12-Cyber-Security-Tips-for-Bloggers-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/security-alert-dridex-malware-creators-deceive-victims-with-fake-ikea-receipt/</loc>
		<lastmod>2021-02-22T15:35:21+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hs-Attackers-leverage-the-trusted-brand%E2%80%99s-name-to_1E4181.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/ikea-spam2810.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/virustotal-header-detection-rate.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/master-app-permissions-dont-get-hacked-guide/</loc>
		<lastmod>2021-02-22T16:13:27+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/app-permissions_05436A.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/How-your-online-accounts-are-interconnected.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/windows-10-privacy-settings.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/system-preferences-mac-os-x.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/chrome-privacy-settings.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/content-settings-in-chrome.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/chrome-extentions-options.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/example-of-a-firefox-add-on-page-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/example-of-a-firefox-add-on-page-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/firefox-extensions-checkup.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/firefox-appearance-add-ons.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/firefox-plugins-add-ons.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/firefox-security-add-ons.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Revoke-access-to-apps-linked-to-your-Facebook-account.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/facebook-games-permissions.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/instagram-Authorized-Applications.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Clean-Linkedin-app-permissions.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/clean-twitter-app-permissions.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/google-apps-connected-to-your-account-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/google-apps-connected-to-your-account-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/google-apps-connected-to-your-account-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/microsoft-Apps-and-services-youve-given-access.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/See-all-permissions-for-a-specific-app-on-Android.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/log-in-with-google.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/log-in-with-facebook.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/log-in-with-facebook-permissions.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Windows-10-privacy-permissions-13.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Windows-10-privacy-permissions-12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Windows-10-privacy-permissions-11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Windows-10-privacy-permissions-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Windows-10-privacy-permissions-9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Windows-10-privacy-permissions-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Windows-10-privacy-permissions-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Windows-10-privacy-permissions-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Windows-10-privacy-permissions-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Windows-10-privacy-permissions-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Windows-10-privacy-permissions-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Windows-10-privacy-permissions-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Windows-10-privacy-permissions-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/mac-os-x-app-permissions-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/mac-os-x-app-permissions-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/mac-os-x-app-permissions-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/mac-os-x-app-permissions-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/mac-os-x-app-permissions-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/web-app-permissions.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/web-app-permissions-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/web-app-permissions-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/android-app-permissions-manager-11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/android-app-permissions-manager-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/android-app-permissions-manager-9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/android-app-permissions-manager-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/android-app-permissions-manager-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/android-app-permissions-manager-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/android-app-permissions-manager-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/android-app-permissions-manager-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/android-app-permissions-manager-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/android-app-permissions-manager-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/android-app-permissions-manager-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/ios-app-permissions-management-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/ios-app-permissions-management-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/ios-app-permissions-management-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/ios-app-permissions-management-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/ios-app-permissions-management-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/ios-app-permissions-management-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/ios-app-permissions-management-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/xss-attack-definition-types-prevention/</loc>
		<lastmod>2021-03-15T11:10:54+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-1-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-network-monitoring/</loc>
		<lastmod>2021-03-26T15:25:23+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-10-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-broken-object-level-authorization-bola/</loc>
		<lastmod>2021-03-30T15:28:16+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-14.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-7.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Screenshot-of-Broken-Object-Level-Authorisation-attack.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/credit-cards-leaked-swarmshop-hack/</loc>
		<lastmod>2021-04-09T12:38:29+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Security-News-and-Updates-1030x360-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Swarmshop.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/security-alert-denmark-phishing-campaign-payments-processor/</loc>
		<lastmod>2021-04-20T15:35:28+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/1030x360-Phishing.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/malvertising-campaign-sundownek-seon-ransomware/</loc>
		<lastmod>2021-04-23T09:37:07+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Bianca-website-compromised-1030x360.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-net-based-malware-karkoff-adapts-security/</loc>
		<lastmod>2021-04-23T09:38:49+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Miriam-Korkoff-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Splt-API-call.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/spring-cleaning-remove-old-software-makes-pc-vulnerable/</loc>
		<lastmod>2021-04-23T10:06:07+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hs-The-toolkit-you-need-to-clean-up-your-PC-this-spring_1A6631.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/cluttered-desktop.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/simple-ransomware-infection-chain.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/well-that-escalated-quickly-meme.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/The-Most-Vulnerable-Software-Vendors-of-2015-900x500.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/control-panel.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/uninstall-or-change-a-program.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/chrome-settings-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/chrome-extensions.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/chrome-delete-extensions.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/firefox-addons.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/firefox-extensions-and-plugins.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/firefox-disable-extensions.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/firefox-plugins-activate.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/employee-spotlight-adelin-ghenea/</loc>
		<lastmod>2021-05-04T12:55:50+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Miriam-Employee-Story-of-the-Month-2-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Adelin-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/everything-you-need-to-know-about-the-2021-facebook-data-breach/</loc>
		<lastmod>2021-05-06T07:31:22+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-18-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-software-deployment/</loc>
		<lastmod>2021-05-07T07:54:04+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-27.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/sigmund-LTzU-4PhRIY-unsplash.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/egsefa.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/finastra-ransomware-attack/</loc>
		<lastmod>2021-05-07T08:22:31+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-23-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cyber-security-guide/</loc>
		<lastmod>2021-05-11T14:27:51+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hs-Cyber-Security-%E2%80%93-A-Mega-Guide-to_373446.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/victim-scam-phone-calls/</loc>
		<lastmod>2021-05-13T08:33:36+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/PhoneScams1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/pasted-image-0-39.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/pasted-image-0-38.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/heimdal-threat-prevention-rbs-business-customers/</loc>
		<lastmod>2021-05-13T08:35:38+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Rbs-and-Heimdal-partnership.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-ssl-vulnerability/</loc>
		<lastmod>2021-05-13T08:35:50+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Dora-SSL-1030x360.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/residual-risk/</loc>
		<lastmod>2021-05-13T08:39:20+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-15-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/security-alert-asus-computer-users-auto-update-virus/</loc>
		<lastmod>2021-05-13T09:38:28+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Asus-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Signed-ASUS-Live-Update-setup-installer.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/ShadowHammer-victim-distribution.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/ASUS-live-update-in-icon-bar.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cryptocurrency-security-how-to-safely-invest-in-digital-currency/</loc>
		<lastmod>2021-05-13T11:20:53+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hs-How-to-safely-invest-in-digital-currency_BC9917.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/bitcoin-is.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/new-yorker.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/b1080b5410907aade181a1247bd8908e.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/last_supper___bitcoin_project_by_youldesign-d79zjf8.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/20171910_Bitcoin_steal-1024x672.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/web16-protect-govt-surveillance-1160x768.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/old_new_miners___bitcoin_art_from_cezanne_by_youldesign-d8066qf.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Liu-Bolin-24.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/history-of-btc.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/1418205977834406.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/ransomware-damage-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/1920ee97983cd6b4803538866d7a57a6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/scranos-malware-rootkit/</loc>
		<lastmod>2021-05-13T11:39:32+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Scranos-rootkit-enabled-spyware-spreading-fast.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/pngbase6495f36152682c43b9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/pngbase64a0f71618d33ae64f.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/security-alert-malware-script-injection/</loc>
		<lastmod>2021-05-13T11:47:13+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Security-Alert-about-script-injections-attack-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/VirusTotal-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/security-alert-bad-rabbit-ransomware/</loc>
		<lastmod>2021-05-13T12:06:54+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Bad-Rabbit-ransomware-hit-the-Internet.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/rundll32-image-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/encrypted-file.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/drogon-task-displayed-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/badrabbit-lokal-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/badrabbit_1-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/VirusTotal-Detection.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/BadRabbit_Map-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/security-alert-gootkit-godzilla-infostealers-target-financial-information/</loc>
		<lastmod>2021-05-13T12:34:37+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hs-Security-Alert-GootKit-and-Godzilla-Infostealers-Target-Victims%E2%80%99-Financial-Information_E75D17.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/gootkit-gold.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/godzilla-detection-rate-December-28-2016.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/godzilla-login.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/godzilla-loader2812.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/credit-card-information-stolen-from-seniors/</loc>
		<lastmod>2021-05-14T14:24:10+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Security-News-and-Updates-1030x360-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Overheard-at-GW.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/avaddon-ransomware-hits-insurance-giant-axa/</loc>
		<lastmod>2021-05-17T08:51:02+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-23-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/avaddon-ransomwarefrench-insurance-axa.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/avaddon-ransomwarefrench-insurance-axajpg.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/avaddon-ransomwarefrench-insurance-axa1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/hse-hit-by-a-ransomware-attack/</loc>
		<lastmod>2021-05-17T10:54:48+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Security-News-and-Updates-1030x360-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/conti-ransom-demand.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/toyota-australia-rebuilt-it-system-following-the-2019-cyberattack/</loc>
		<lastmod>2021-05-17T13:47:51+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-23-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/fmovies-utorrent-common-malware-infections/</loc>
		<lastmod>2021-05-18T08:33:49+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hs-Fmovies-uTorrent-and-Other-Common-Ways-to-Get-Infected-wit_342020.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/thor-number-of-blocked-domains.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/malware-last-10-years_sum_en.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/popcorn-time.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/security-alert-attackers-using-script-injection-to-spread-bitcoin-mining-malware/</loc>
		<lastmod>2021-05-18T09:04:36+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Script-injection-to-spread-Bitcoin-mining-malware.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/VirusTotal-Bitcoin-miner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/campaigns-av-detection-new-malware-low/</loc>
		<lastmod>2021-05-18T09:27:07+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Why-it-takes-longer-for-AV-to-detect-new-malware-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/AV-detects-new-malware.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/false-positives-alerts.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/anti-malware-detects-new-malware-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Locky-Spam-Campaign-3-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Locky-Aug.-14-5-pm-21-of-64.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Locky-Spam-Campaign-4-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2017-08-17-09_58_35-VirusTotal-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Locky-Spam-Campaign-5-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Locky-18-Aug.-2017-15-of-58.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Locky-Spam-Campaign-6-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Locky-4-of-59-Aug.-24-2017.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Locky-Spam-Campaign-7-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Locky-Aug.-25-2017.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Locky-Spam-Campaign-8-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Locky-Spam-Campaign-9-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Locky-Spam-Campaign-1-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Locky-Spam-Campaign-2-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Nano-Core-Spam-Campaign-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/nano-core-5-of-64-Aug.-14-11am.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Hancitor-Spam-Campaign-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hancitor-aug.-22-2018-22-of-58.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Adwind-Spam-Campaign-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Adwind-12-of-60-Aug.-28-2017.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/spear-phishing-alert-hackers-impersonate-truist-bank-in-an-attempt-to-dispatch-malware/</loc>
		<lastmod>2021-05-18T13:32:48+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Security-News-and-Updates-1030x360-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Impersonated-financial-institutions-.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/darkside-ransomware-gang-made-90-million-in-bitcoin-from-47-victims/</loc>
		<lastmod>2021-05-19T09:05:02+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Security-News-and-Updates-1030x360-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Security-News-and-Updates-1030x360-9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Screenshot-of-the-share-of-ransom-payments-received-by-the-DarkSide-Developer-and-Affiliates.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/monday-com-source-code-accessed-by-codecov-threat-actors/</loc>
		<lastmod>2021-05-19T13:22:36+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Security-News-and-Updates-1030x360-7.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/android-stalkerware-rising/</loc>
		<lastmod>2021-05-19T14:28:04+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Security-News-and-Updates-1030x360-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Android-stalkerware-detection.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/stalkerware-app-security-an-dprivacy-issues.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/android-patches-4-new-zero-day-vulnerabilities-exploited-in-the-wild/</loc>
		<lastmod>2021-05-20T11:16:00+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-23-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/qlocker-ransomware-group-ceased-operating-after-collecting-350000-from-its-victims/</loc>
		<lastmod>2021-05-20T11:16:18+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Security-News-and-Updates-1030x360-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/ransom-note-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Qlocker-Tor-site-indicating-it-will-shut-down-soon.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/mountlocker-ransomware-is-now-using-the-windows-api/</loc>
		<lastmod>2021-05-20T12:42:00+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Security-News-and-Updates-1030x360-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/mountlocker-enumeration-errors.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/starting-service.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/phishing-attack-targeted-domain-group-site-users/</loc>
		<lastmod>2021-05-20T14:08:39+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Security-News-and-Updates-1030x360-7.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/pypi-repository-deluged-with-spam-packages-and-pirated-movie-links/</loc>
		<lastmod>2021-05-21T12:18:16+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Security-News-and-Updates-1030x360-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/pypi-spam-click-here.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/pypi-spam-package-conents.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/fraudsters-use-amazon-vishing-attacks-to-steal-private-information/</loc>
		<lastmod>2021-05-21T15:08:56+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Security-News-and-Updates-1030x360-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/screenshot-2021-05-17-at-08-59-48.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/screenshot-2021-05-17-at-09-00-55.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/expired-ssl-certificate-blocks-microsoft-exchange-admin-portal/</loc>
		<lastmod>2021-05-24T08:14:51+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-23-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/blocked-by-google-chrome.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/windows-http-vulnerability-also-impacts-winrm-servers/</loc>
		<lastmod>2021-05-24T11:36:57+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-23-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/tpg-reveals-it-has-been-compromised-in-a-cyberattack/</loc>
		<lastmod>2021-05-24T12:11:43+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Security-News-and-Updates-1030x360-6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/data-of-4-5m-passengers-was-stolen-in-sita-cyberattack/</loc>
		<lastmod>2021-05-24T14:00:17+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Security-News-and-Updates-1030x360-7.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/apple-fixes-macos-vulnerability-exploited-by-xcsset-malware/</loc>
		<lastmod>2021-05-25T13:12:57+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-23-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/zero-day-tcc-bypass-discovered-in-xcsset-malware-figure_1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/zero-day-tcc-bypass-discovered-in-xcsset-malware-Figure_F.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/the-man-who-has-stolen-the-pii-of-65k-employees-of-upmc-pleads-guilty/</loc>
		<lastmod>2021-05-25T14:28:06+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Security-News-and-Updates-1030x360-6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/indonesian-government-bans-raid-forums-website-after-alleged-leak/</loc>
		<lastmod>2021-05-25T14:28:27+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-23-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/bose-had-a-data-breach/</loc>
		<lastmod>2021-05-25T15:19:56+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Security-News-and-Updates-1030x360-7.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/european-court-rules-gchq-mass-surveillance-powers-violated-human-rights/</loc>
		<lastmod>2021-05-26T09:23:20+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-23-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/PDH_Small_Courtroom_B.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/critical-flaw-impacting-all-vcenter-server-deployments-vmware-alerts/</loc>
		<lastmod>2021-05-26T09:32:31+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Security-News-and-Updates-1030x360-6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/hydra-cryptocurrency-transactions-reached-1-37bn-in-2020/</loc>
		<lastmod>2021-05-26T10:08:16+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-23-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/01_BarChart_Hydra_Yearly_Transaction_Volumes_20210524-768x463.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Hydra-funds.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/180-million-clients-data-was-exposed-following-a-cyberattack-targeting-dominos-india/</loc>
		<lastmod>2021-05-26T10:20:09+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Security-News-and-Updates-1030x360-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Threat-actor-selling-data-for-Dominos-India.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Dominos-India-Tor-search-engine.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Dominos-India-data-breach-notification.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/agrius-hacking-group-targets-israel/</loc>
		<lastmod>2021-05-26T10:41:04+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Security-News-and-Updates-1030x360-6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/15-online-habits-that-are-compromising-your-online-safety/</loc>
		<lastmod>2021-05-26T13:07:49+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hs-You-are-involuntarily-exposing-yourself-to-cyber_265673.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/3.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/4.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/5.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/6.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/7.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/8.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/9.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/10.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/11.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/13.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/14.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/15.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/16.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/17.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/18.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/44-relevant-cyber-security-conferences-around-the-world/</loc>
		<lastmod>2021-05-26T14:11:40+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hs-Having-trouble-choosing-which-conference-to-go-to_224256.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/cyber-security-conferences-in-usa-and-canada.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/cyber-security-conferences-in-europe.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/cyber-security-conferences-in-Asia.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/5g-dangers-cybersecurity-implications/</loc>
		<lastmod>2021-05-26T14:23:15+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Bianca-5G-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/1G-2G-3G-4G-5G-comparison.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/tech-crunch-the-torpedo-attack.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/60-of-organizations-woould-not-pay-attackers-and-up-their-security-game/</loc>
		<lastmod>2021-05-26T14:53:50+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Security-News-and-Updates-1030x360-7.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/about-the-garmin-ransomware-case/</loc>
		<lastmod>2021-05-26T14:55:24+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-32.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/photo-1574680096145-d05b474e2155-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/the-ahrc-calls-for-protecting-human-rights/</loc>
		<lastmod>2021-05-27T11:46:36+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-23-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/AI-safety.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/AI-safety-commissioner.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-rowhammer-attack-technique-discovered/</loc>
		<lastmod>2021-05-27T13:35:07+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-23-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageLikeEmbed.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/klarna-vulnerability-allowed-90-000-users-to-see-the-account-details-of-other-customers/</loc>
		<lastmod>2021-05-28T09:51:15+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Security-News-and-Updates-1030x360-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/klarna-app-down.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/uyghurs-targeted-by-chinese-hackers-impersonating-un-human-rights-council/</loc>
		<lastmod>2021-05-28T11:30:58+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Security-News-and-Updates-1030x360-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/screenshot-2021-05-26-at-16-17-33.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-perfdump-in-android/</loc>
		<lastmod>2021-05-28T14:50:12+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-31-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-cert-in-security/</loc>
		<lastmod>2021-05-28T15:24:06+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-26-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/phishing-victims-are-urged-to-send-their-mailing-address-to-hackers-posing-as-walmart/</loc>
		<lastmod>2021-05-31T08:16:24+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Security-News-and-Updates-1030x360-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/walmart-phishing-email-iphone.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/walmart-picture-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/unsubscribe-spam-emails-used-by-spammers-to-confirm-legitimate-email-accounts/</loc>
		<lastmod>2021-05-31T09:41:02+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Security-News-and-Updates-1030x360-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/confirmation-spam-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/jbs-hit-by-cyberattack/</loc>
		<lastmod>2021-06-02T10:25:53+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Security-News-and-Updates-1030x360-6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/threat-actors-actively-exploiting-zero-day-in-wordpress/</loc>
		<lastmod>2021-06-02T14:48:29+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Security-News-and-Updates-1030x360-7.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/fujifilm-had-shut-down-its-network-after-a-suspected-ransomware-attack/</loc>
		<lastmod>2021-06-03T13:32:04+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Security-News-and-Updates-1030x360-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/usa-notification.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/airline-scams-3-useful-tips-avoid-scams/</loc>
		<lastmod>2021-06-03T13:46:09+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hs-Do-you-think-you-can-avoid-getting-scammed_664949.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/likejack-ad-2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/likejacking-ad-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/easyjet-spam-vs-real-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/twitter-spam-vs-real-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Capture.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/emirate-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/emirate-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/fake-sbs.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/180417-1-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/revil-ransomware-responsible-for-the-jbs-attack-fbi-says/</loc>
		<lastmod>2021-06-03T13:53:33+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-23-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/coveware-q1-2021-most-common.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/asd-is-using-confidential-capabilities-to-alert-local-companies-of-imminent-ransomware-attack/</loc>
		<lastmod>2021-06-03T14:19:04+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Security-News-and-Updates-1030x360-6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/arin-to-take-down-its-rpki-for-30-minutes-to-test-bgp-routes/</loc>
		<lastmod>2021-06-03T14:31:21+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Security-News-and-Updates-1030x360-5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/hackers-linked-to-the-chinese-government-attacked-the-nyc-mta-computer-systems/</loc>
		<lastmod>2021-06-04T09:28:19+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Security-News-and-Updates-1030x360-6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/the-largest-ferry-service-from-massachusetts-hit-by-ransomware-attack/</loc>
		<lastmod>2021-06-04T10:53:09+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Security-News-and-Updates-1030x360-6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cryptojacking-monero-malware/</loc>
		<lastmod>2021-06-04T14:30:57+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hs-What-is-cryptojacking_744746.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/blockchain.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Blockchain-diagram.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/1_F0TpPrjrfna5-nxzMsfqzw.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Capture2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/cryptojacking.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-evil-corp-ransomware-bypasses-ofac-sanctions/</loc>
		<lastmod>2021-06-07T09:42:47+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-23-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/encrypted-files.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/payloadbin-ransom-note.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/colonial-pipeline-ransomware-lures-are-used-in-phishing-attacks/</loc>
		<lastmod>2021-06-07T09:50:44+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Security-News-and-Updates-1030x360-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/ColonialPipelinePhishing_INKY.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/github-repo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/severe-rce-vulnerability-in-vmware-vcenter-server-is-under-attack/</loc>
		<lastmod>2021-06-07T09:58:58+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Security-News-and-Updates-1030x360-6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/latvian-woman-accused-of-deploying-trickbot-malware/</loc>
		<lastmod>2021-06-07T13:25:12+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Security-News-and-Updates-1030x360-6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/signal-app-safety-numbers-remain-unchanged/</loc>
		<lastmod>2021-06-07T13:37:21+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Security-News-and-Updates-1030x360-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/git-hub-signal.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/australians-have-spent-au26-5m-to-pay-scammers-in-2020/</loc>
		<lastmod>2021-06-07T14:39:11+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Security-News-and-Updates-1030x360-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/accellion-data-breach-impacts-nsw-health/</loc>
		<lastmod>2021-06-07T14:46:09+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-23-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-a-feature-pack/</loc>
		<lastmod>2021-06-08T14:54:50+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-34-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/navistar-reveals-it-has-been-affected-by-cyberattack/</loc>
		<lastmod>2021-06-09T08:25:02+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Security-News-and-Updates-1030x360-7.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/texas-ransomware-attack/</loc>
		<lastmod>2021-06-09T13:24:36+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Alina-Texas-1030x360.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cybersecurity-governmental-organizations/</loc>
		<lastmod>2021-06-09T13:45:12+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Alina-Essential-Cybersecurity-1030x360.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/ragnar-locker-ransomware-hits-electronics-maker-adata/</loc>
		<lastmod>2021-06-09T14:36:36+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-23-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/ADATA-leak-page.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/al-jazeera-exposed-to-cyberattacks-endeavoring-to-disrupt-its-services/</loc>
		<lastmod>2021-06-10T08:54:49+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Security-News-and-Updates-1030x360-6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/fbi-bec-scammers-now-impersonate-construction-companies/</loc>
		<lastmod>2021-06-10T11:33:51+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-23-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/after-having-her-photos-published-online-a-student-receives-millions-of-dollars-from-apple/</loc>
		<lastmod>2021-06-10T14:00:51+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Security-News-and-Updates-1030x360-6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/slilpp-disrupted-by-international-law-enforcement/</loc>
		<lastmod>2021-06-11T10:01:16+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-23-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Slilpp_iprc_seized_banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/hackers-are-tampering-with-pre-installed-apps-to-spy-on-samsung-users/</loc>
		<lastmod>2021-06-11T12:22:49+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Security-News-and-Updates-1030x360-10.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/ransomware-attack-hits-foodservice-distributor-edward-don/</loc>
		<lastmod>2021-06-11T15:08:39+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Security-News-and-Updates-1030x360-10.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/watch-out-emerging-malware-is-skulking-in-steam-profile-pictures/</loc>
		<lastmod>2021-06-11T15:13:49+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Security-News-and-Updates-1030x360-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/steam-iamge-malware-tweet.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/white-guy-blingking-malware-image-241x300.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/network-security-organization-coo-accused-of-cyberattack-on-medical-center/</loc>
		<lastmod>2021-06-14T08:41:28+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Security-News-and-Updates-1030x360-6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/mcdonalds-suffers-security-breach/</loc>
		<lastmod>2021-06-14T09:33:43+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Security-News-and-Updates-1030x360-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/msDonald_s.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/intuit-clients-warned-of-hacked-turbotax-accounts/</loc>
		<lastmod>2021-06-14T14:41:04+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Security-News-and-Updates-1030x360-6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/audi-and-volkswagen-involved-in-a-massive-data-breach/</loc>
		<lastmod>2021-06-14T14:54:24+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Security-News-and-Updates-1030x360-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/volkswagen-vendor-exposure-p1-large.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/scammers-bypassed-office-365-mfa-in-bec-attacks/</loc>
		<lastmod>2021-06-15T14:47:53+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/bec-cover-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Phishing-landing-page.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/western-australia-might-be-quarantining-covid-check-in-info/</loc>
		<lastmod>2021-06-15T14:58:50+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Australia-mobile-app-covid.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/the-source-code-of-paradise-ransomware-released-on-a-hacking-forum/</loc>
		<lastmod>2021-06-16T10:55:28+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Paradise-Ransomware-cover-photo-for-Heimdal-Blog.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Paradise-Ransomware.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Paradise-Ransomware-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/paradise-ransomware-source-code.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/scammers-are-mailing-fake-ledger-devices-to-steal-cryptocurrency/</loc>
		<lastmod>2021-06-17T11:19:44+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_10_8788005179.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/b3th3yg0zm571.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/o03iiyqcxm571.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/baobp36z2n571.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/u3j0fgitzm571.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/wzuzqxqcxm571.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/the-stolen-data-of-audi-and-volkswagen-is-being-sold-on-a-hacking-forum/</loc>
		<lastmod>2021-06-18T09:52:05+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_3318171086.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Audi-and-Volksvagen-forum-post.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/avaddon-ransomware-group-decryption-keys/</loc>
		<lastmod>2021-06-18T10:46:36+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Security-News-and-Updates-1030x360-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/1-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2-5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/a-massive-data-breach-hit-carnival-cruise/</loc>
		<lastmod>2021-06-18T11:25:58+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/carnival-march-bc-data-breach-notice-p1-xlarge.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/carnival-march-bc-data-breach-notice-p2-xlarge-1.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/a-new-study-shows-that-organizations-are-willing-to-pay-a-ransom-demand/</loc>
		<lastmod>2021-06-18T12:45:21+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_3_7764489876.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/vigilante-malware-rejects-software-pirates-and-blocks-them/</loc>
		<lastmod>2021-06-18T13:14:34+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-8-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/pirate-error-message.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/1flchier-http-request.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/hbo-max-mistakenly-sends-out-integration-test-email/</loc>
		<lastmod>2021-06-18T13:15:59+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/HBO-max-cover-photo-for-Heimdal-Blog-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/E4IC6vBX0AEWTiz.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cd-projekt-data-breach-data-exposure/</loc>
		<lastmod>2021-06-18T14:00:01+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Security-News-and-Updates-1030x360-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/picture-for-cd-projekt.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/eggfree-cake-box-data-breach-payment-info-stolen/</loc>
		<lastmod>2021-06-18T14:04:01+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_5158432266.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/cake-box.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/tracking-vulnerability-fixed-on-tor-browser/</loc>
		<lastmod>2021-06-22T10:36:12+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-1-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/url-scheme-prompt.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/kaeri-vpn-vulnerability-network-breach/</loc>
		<lastmod>2021-06-22T10:58:33+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_11_9671837866.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/opera-vpn-vyprvpn-classified-as-threats-and-banned-in-russia/</loc>
		<lastmod>2021-06-22T11:04:15+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_4_2767411083.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Russian-Demand.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/data-leak-marketplace-is-pressuring-victims/</loc>
		<lastmod>2021-06-22T13:46:26+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Marketo-data-theft-platform.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/marketo-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/marketo-email-victim.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/hmm-reveals-it-had-suffered-a-cyberattack-on-its-email-servers/</loc>
		<lastmod>2021-06-22T15:13:24+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_7_3202663269.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/HMM-picture.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/ever101-ransomware-payment-traced-to-a-sensual-massage-website/</loc>
		<lastmod>2021-06-22T16:21:06+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_6_9770503703.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/ever101-ransom-note.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/rubratings.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/massachusetts-massnotify-android-covid-app-forcedly-installed-by-google/</loc>
		<lastmod>2021-06-23T08:58:02+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Massachusetts-MassNotify-Android-COVID-App-Forcedly-Installed-by-Google.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/malicious-pypi-packages-used-to-mine-cryptocurrency/</loc>
		<lastmod>2021-06-23T15:06:41+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Phyton-PyPI.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/1024px-PyPI_logo.svg_.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/PyPIUbqminer.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/conti-ransomware-leaks-police-citations-and-forces-the-city-of-tulsa-to-issue-a-data-breach-warning/</loc>
		<lastmod>2021-06-24T11:23:23+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/162452768331116633.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/tulsa-leak.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/grupo-fleury-becomes-the-latest-victim-of-a-revil-ransomware-attack/</loc>
		<lastmod>2021-06-24T12:18:33+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_4_8244927342.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Announcement-on-the-website-about-the-Grupo-Fleurycyberattack.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Grupo-Fleury-ransom-demand.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/an-unpatched-flaw-existing-in-linux-pling-store-apps-might-lead-to-supply-chain-attacks/</loc>
		<lastmod>2021-06-24T13:18:22+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Pling-store-Linx-vulnerability.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/xss.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/plingstore.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/reverserat-backdoor-attack/</loc>
		<lastmod>2021-06-24T18:31:31+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_3_7426028458.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/atlassian-domain-flaws-threat-exposure/</loc>
		<lastmod>2021-06-25T11:40:25+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_3_6923061793.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/an-unusual-file-attachment-is-being-used-in-phishing-attacks/</loc>
		<lastmod>2021-06-25T14:29:06+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/An-Unusual-File-Attachment-Is-Being-Used-in-Phishing-Attacks-Cover.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/trying-to-open-wim-file.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/extracted-wim-file.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/wd-my-book-live-nas-devices-reformatted-remotely-all-over-the-world/</loc>
		<lastmod>2021-06-25T14:34:20+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_4_3860298990.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/my-book-live.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/mercedes-benz-data-breach-exposes-ssns-credit-card-numbers/</loc>
		<lastmod>2021-06-28T10:06:46+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Mercedes-Benz-Data-Breach-Cover-Image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/a-cisco-asa-vulnerability-is-actively-exploited/</loc>
		<lastmod>2021-06-28T13:16:56+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Cisco-ASA-vulnerability-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hs-How-an-XSS-Attack-works-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/windows-malware-that-mines-for-crypto-crackonosh-used-by-hackers-to-infect-gamers-pcs/</loc>
		<lastmod>2021-06-28T13:24:14+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_3_3242015130.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/hive-ransomware-gang-targets-software-provider-altus-group/</loc>
		<lastmod>2021-06-28T13:59:38+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_3_3831170902.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hive-leaks-blur.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/argus-certificates-blur-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/altus-business-files-blur-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/ransomware-attack-on-wolfe-eye-clinic-exposes-data-of-500k-patients/</loc>
		<lastmod>2021-06-28T14:40:47+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_5_8556892219.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/microsoft-edge-vulnerability-couldve-allowed-hackers-to-steal-files/</loc>
		<lastmod>2021-06-28T15:31:27+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_5_7491843288.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/microsoft-successfully-hit-by-a-dependency-hijacking-attack-again/</loc>
		<lastmod>2021-06-29T11:43:04+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_4225962020.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/swift-search-dep-github-outline.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/swift-search-contents.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/mercedes-benz-data-breach-third-party-risks/</loc>
		<lastmod>2021-06-29T14:53:38+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Mercedes-Benz-Data-Breach-Cover-Image-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/solarwinds-attack-cost-impacted-companies-an-average-of-12-million/</loc>
		<lastmod>2021-06-29T14:54:19+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_3_7768955880.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/SolarWinds-collage.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/doublevpn-servers-logs-and-account-info-seized-by-law-enforcement-agencies/</loc>
		<lastmod>2021-06-30T09:59:37+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/162504435243574345.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/double-vpn-encryption.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/doublevpn-fh.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/double-VPN-seized.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cybersecurity-specialists-developed-a-free-lorenz-ransomware-decryptor/</loc>
		<lastmod>2021-06-30T12:28:56+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_3_2634759369.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Lorenz-ransomware-data-leak-site.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Lorenz-ransomware-decryptor.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/parcel-delivery-scam-targets-victims-with-personalized-messages/</loc>
		<lastmod>2021-06-30T12:47:49+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/DHL-Scam-Cover.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/f3b0eea7598b1851371b2570194ff4ef59be5b9c-1624964411-062b34c5-1920x1280.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/my-book-live-exploit-zero-attack/</loc>
		<lastmod>2021-06-30T13:52:01+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_3_5652821739.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/zero-day-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/nfc-vulnerabilities-atms-pos-exposed/</loc>
		<lastmod>2021-06-30T14:00:52+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_8_4571278421.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/NFC-Vulnerabilities.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/babuk-locker-ransomware-tool-leaked-online/</loc>
		<lastmod>2021-07-01T09:50:48+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_5243411668.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Using-the-builder-to-create-a-customized-Babuk-ransomware.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/indigozebra-apt-campaign-continues-to-target-central-asia/</loc>
		<lastmod>2021-07-01T12:32:40+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_5_3544793177.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/IndigoZebra-email.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/IndigoZebra-infection-chain.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/map1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/vulnerabilities-found-in-a-wordpress-plugin-are-posing-remote-code-execution-risks/</loc>
		<lastmod>2021-07-01T12:56:39+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Wordpress-Plugin-Vulnerability-1-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/united-nations-security-council-tackles-threat-of-cyberattacks/</loc>
		<lastmod>2021-07-01T13:05:22+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_5_8801739347.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/adobe-zero-day-exploit-rce-threat/</loc>
		<lastmod>2021-07-01T14:37:14+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_5_7489383561.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/gru-russian-hackers-are-using-kubernetes-to-run-brute-force-attacks/</loc>
		<lastmod>2021-07-02T11:18:54+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Kubernetes-Brute-Force-Attacks.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/attack-flow.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/diavol-ransomware-a-new-ransomware-in-the-cybersecurity-landscape/</loc>
		<lastmod>2021-07-02T12:44:22+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/162522137845081214.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Diavol-ransomware-wallpaper.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/hackers-are-targeting-linkedins-1-2b-data-scrape-victims/</loc>
		<lastmod>2021-07-02T13:49:10+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_8568119994.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/88k-owners-leak-sample-screenshot.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/limevpn-website-was-taken-down-by-a-hacker/</loc>
		<lastmod>2021-07-02T14:35:17+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/LimeVPN-Website-Was-Taken-Down-by-a-Hacker-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/limevpn_chat-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/limevpn-security-breach.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/print-spooler-vulnerability/</loc>
		<lastmod>2021-07-05T09:01:11+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/7d6f1e8f-c8cc-4525-8eec-61b5b8eb63da.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/ajg-data-breach-data-exposure/</loc>
		<lastmod>2021-07-05T09:53:36+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_9028480118.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/chemical-distributor-brenntag-says-what-data-was-stolen-during-the-ransomware-attack/</loc>
		<lastmod>2021-07-05T10:15:21+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_9147179638.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/data-leak-site-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/unc1151-threat-actors-breach-polish-mps-email-accounts/</loc>
		<lastmod>2021-07-05T11:03:11+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_2758751372.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/coop-supermarket-had-to-close-500-stores-following-the-kaseya-ransomware-attack/</loc>
		<lastmod>2021-07-05T13:57:53+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Coop-Supermarkets-REvil-attack-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/coop-notice.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/malicious-google-play-apps-steal-facebook-users-logins-and-passwords/</loc>
		<lastmod>2021-07-05T14:10:39+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_3_3153285588.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/malicious-google-play-apps.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/leaked-infrastructure-secrets-costs-companies-an-average-of-1-2-million-in-revenue-annually/</loc>
		<lastmod>2021-07-05T14:27:42+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_5_2011234726.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/wssc-water-hit-with-ransomware-attack/</loc>
		<lastmod>2021-07-05T15:08:12+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_5_4942409038.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/qnap-fixes-improper-access-control-vulnerability-in-nas-backup/</loc>
		<lastmod>2021-07-06T09:56:09+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_4_4899574947.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/didi-app-removed-from-app-stores-in-china-following-a-suspension-order/</loc>
		<lastmod>2021-07-06T13:54:05+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_4925320771.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/printnightmare-exploit-details-public/</loc>
		<lastmod>2021-07-06T14:30:20+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_7767232732.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/printnightmare.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/printnightmare-updated.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/hackers-scraped-90000-gettr-user-emails/</loc>
		<lastmod>2021-07-07T12:25:38+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/162565048042963862.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/forum-post-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/c10b905e-65b2-4c90-bc7d-b4ea16d6583b.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/60e1c8eb22d19400191c90b1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/60e1c99722d19400191c90b5.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/malware-dropper-new-reports/</loc>
		<lastmod>2021-07-07T12:26:40+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_5_7293517835.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/british-airways-settles-2018-data-breach-lawsuit/</loc>
		<lastmod>2021-07-07T12:40:33+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_8_8831471410.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/moroccan-hacker-arrested-by-the-interpol-in-operation-lyrebird/</loc>
		<lastmod>2021-07-07T14:21:07+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Arrested-Hacker.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hacker-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/threat-actors-hasten-ransomware-cyberattacks-on-industrial-control-systems-ics/</loc>
		<lastmod>2021-07-07T14:41:56+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_3_5446310546.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/printnightmare-zero-day-security-updates/</loc>
		<lastmod>2021-07-08T06:53:17+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_3_5243793384.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/patches-dont-remove-printnightmare/</loc>
		<lastmod>2021-07-08T09:27:06+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_3_5029573104.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/172-android-cryptocurrency-mining-apps-turn-out-to-be-just-scams/</loc>
		<lastmod>2021-07-08T10:29:29+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_8678721236.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/indian-government-officials-targeted-by-sidecopy-actors-with-new-rats/</loc>
		<lastmod>2021-07-08T13:36:03+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_3452868439.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/investment-bank-morgan-stanley-discloses-data-breach/</loc>
		<lastmod>2021-07-09T10:33:55+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_2_4211135732.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/philips-vue-vulnerabilities-cause-rec/</loc>
		<lastmod>2021-07-09T12:31:12+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_3_6707771030.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/scammers-pretend-to-be-online-support-agents/</loc>
		<lastmod>2021-07-09T13:56:04+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/New-phishing-scam-Cover.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/researchers-disclose-coursera-api-vulnerabilities/</loc>
		<lastmod>2021-07-09T15:09:19+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_4_8547713747.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/coursera.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/security-vulnerabilities-found-in-sage-x3/</loc>
		<lastmod>2021-07-09T15:25:14+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Vulnerabilities-in-Sage-x3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/admin.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cyberattack-hits-irans-transport-ministry/</loc>
		<lastmod>2021-07-12T13:18:47+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_5_7248068845.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/iran-cyberattack.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/australians-have-lost-au7-2-million-to-remote-access-scams-so-far-this-year/</loc>
		<lastmod>2021-07-12T14:19:02+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_7_4106974707.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/american-clothing-brand-guess-discloses-data-breach/</loc>
		<lastmod>2021-07-13T09:26:13+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_9091033927.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/theft-of-customer-data-is-a-growing-risk-for-u-s-health-insurers/</loc>
		<lastmod>2021-07-13T11:15:21+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_5_7931938832.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/kb5004945-makes-zebra-printers-crash/</loc>
		<lastmod>2021-07-14T10:26:14+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_5761112962.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/reddit.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/a-windows-hello-authentication-bypass-vulnerability-was-fixed-by-microsoft/</loc>
		<lastmod>2021-07-14T12:10:50+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Windows-Hello-Authentication-Bypass-Vulnerability-Cover.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/bazarbackdoor-uses-nested-rar-and-zip-archives-to-sneak-in/</loc>
		<lastmod>2021-07-15T11:16:36+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/BazarBackdoor-sneaks-in-through-nested-RAR-and-ZIP-archives-Cover.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/BazarBackdoorLure_Cofense.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-joker-malware-variant-targets-android-apps/</loc>
		<lastmod>2021-07-15T13:39:43+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_8107679598.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/marvels-newest-movie-black-widow-served-with-a-side-of-malware/</loc>
		<lastmod>2021-07-15T14:20:41+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_18_9650140696.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/black-widow-malware-scam-768x516.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/black-widow-malicious-attempt.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/romanian-cryptojacking-gang-diicot-brute/</loc>
		<lastmod>2021-07-15T14:50:24+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_5_7153445657.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/woocommerce-fixes-bug-affecting-millions-of-wordpress-websites/</loc>
		<lastmod>2021-07-16T11:05:40+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_3_9611552052.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/1-7.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/devilstongue-spyware-targets-windows/</loc>
		<lastmod>2021-07-16T11:09:51+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_6723673068.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/candiru-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/iot-malware-infections-increased-by-700-amid-covid-19-pandemic/</loc>
		<lastmod>2021-07-16T12:42:51+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-67.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/IoT-frequency.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/IoT-transactions.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-windows-spooler-vulnerability/</loc>
		<lastmod>2021-07-16T13:05:44+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_5_6560512297.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/a-cryptomining-farm-was-discovered-in-ukraine/</loc>
		<lastmod>2021-07-16T13:29:05+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Cryptominining-Ukraine.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/iranian-apt-charming-kitten-attempts-to-steal-private-data-from-specialists-who-study-the-middle-east/</loc>
		<lastmod>2021-07-16T14:25:13+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_3051121902.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/A-spear-phishing-letter-sent-by-Charming-Kitten-using-University-of-Londons-School-of-Oriental-and-African-Studies-letterhead-to-fool-its-victims.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/forefront-dermatology-data-breach/</loc>
		<lastmod>2021-07-16T14:49:24+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_7_6754981975.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/pegasus-spyware-targets-phones-of-journalists-activists-and-politicians/</loc>
		<lastmod>2021-07-19T09:21:17+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_6422399903.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/pegasus-worldwide-targets.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/ransomexx-ransomware-impacts-ecuadors-corporacion-nacional-de-telecomunicaciones-cnt/</loc>
		<lastmod>2021-07-19T09:35:31+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_7241830893.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Announcement-on-the-website-about-the-cyberattack.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Hidden-RansomEXX-data-leak-page-for-CNT.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/campbell-data-breach-data-exposure/</loc>
		<lastmod>2021-07-19T09:57:31+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_3391025611.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/oil-company-saudi-aramco-affected-by-a-data-breach/</loc>
		<lastmod>2021-07-20T11:11:32+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_5734397830.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Forum-post-with-a-link-to-the-dark-web-leak-site.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/aramco-timer.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Samples-of-stolen-Saudi-Aramco-data-and-blueprints-shared-on-leak-site.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/linux-kernel-vulnerability-allows-hackers-to-acquire-root-privileges-on-most-distros/</loc>
		<lastmod>2021-07-21T10:52:23+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_7096054398.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/xloader-malware-now-upgraded-to-target-macos-systems/</loc>
		<lastmod>2021-07-22T08:53:22+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_2_7424160954.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/XLoader-Malware.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/XLoaderFormbook_CPR.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/npm-malware-steals-credentials/</loc>
		<lastmod>2021-07-22T09:15:13+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_3718425633.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/a-stealthy-malware-found-on-hacked-pulse-secure-devices/</loc>
		<lastmod>2021-07-22T12:59:46+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Pulse-Secure-devices-hacked.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cnas-network-was-breached-via-fake-browser-update/</loc>
		<lastmod>2021-07-23T13:05:56+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_2121953469.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/netfilter-rootkit-malware-signed-by-microsoft/</loc>
		<lastmod>2021-07-24T23:39:49+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_2_8416535399.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/rootkit-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/rootkit-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/fake-windows-11-installers-distribute-malware-on-your-computer/</loc>
		<lastmod>2021-07-26T08:39:51+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_5262309180.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/fake-windows-11-installers-screen1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/fake-windows-11-installers-screen2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cloud-delivered-malware-increased-68-in-q2-new-report-finds/</loc>
		<lastmod>2021-07-26T10:36:06+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_7_3396275173.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Malware-Netskope-report.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/a-macos-malware-is-stealing-telegram-accounts-and-google-chrome-data/</loc>
		<lastmod>2021-07-26T10:37:48+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/xcsset-malware.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/petitpotam-vulnerability-windows-domains/</loc>
		<lastmod>2021-07-26T10:39:58+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_9_9618346418.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/petitpotam.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/zero-day-vulnerability-impacting-ios-ipados-and-macos-fixed-by-apple/</loc>
		<lastmod>2021-07-27T11:05:20+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_8_4180662785.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/https-security-101/</loc>
		<lastmod>2021-07-29T09:10:54+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/https-security-concept-image-for-blog.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/https-security-concept.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/https-security-osi-model.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/https-security-security-status-icons.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/meteorexpress-wiper-responsible-for-the-iranian-railway-attack/</loc>
		<lastmod>2021-07-30T10:53:24+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_4742761588-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MeteorExpress-attack-chain.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/12-mscap.jpg-lockscreen-image.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/browser-hijacking/</loc>
		<lastmod>2021-07-30T14:29:52+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/browser-hijacking-cover.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/StatCounter-browser_version-ww-monthly-202006-202106.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hijacking-15.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/sshot-32.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hijacking-19.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hijacking-20.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hijacking-21.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hijacking-22.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/emails-from-27-us-attorneys-offices-breached-by-the-solarwinds-hackers/</loc>
		<lastmod>2021-08-02T11:22:28+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Emails-from-27-US-Attorneys%E2%80%99-Offices-Breached-by-the-the-SolarWinds-Hackers.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/pwnedpiper-vulnerabilities-found-in-swisslogs-translogic-pneumatic-tube-system/</loc>
		<lastmod>2021-08-02T14:45:49+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_6_2686690261.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-report-shows-global-ransomware-volume-reached-304-7-million-attempted-attacks-in-the-1st-half-of-2021/</loc>
		<lastmod>2021-08-02T15:01:24+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_6_4387889511.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/global-ransomware-volume.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/picture-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/ea-data-leakage/</loc>
		<lastmod>2021-08-03T13:10:12+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_9981389931.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/EA-Data-Leakage.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/EA-data-leakage-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/EA-DATA-leakage-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/elasticsearch-database-leaked-online/</loc>
		<lastmod>2021-08-03T14:53:06+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_3_9762381397.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/us-resident-data-exposure-record.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/stat-edit-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/thailands-covid-19-vaccination-platform-dedicated-to-foreigners-was-breached/</loc>
		<lastmod>2021-08-03T14:55:06+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Vaccine-registration-site-private-data-breach-Cover.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Vaccine-registration-site-private-data-1024x634.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Vaccine-registration-site-success.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/bazacall-strikes-again/</loc>
		<lastmod>2021-08-04T14:39:47+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_3_9347158422.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/erg-energy-group-reports-minor-disruption-following-cyberattack/</loc>
		<lastmod>2021-08-05T11:17:46+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_2103114595.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/lockbit-ransomware-gang-is-now-looking-for-employees-and-other-insiders-to-give-them-access-to-corporate-networks/</loc>
		<lastmod>2021-08-05T11:23:27+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_7626363512.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/New-LockBit-2.0-wallpaper-recruiting-insiders.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/newly-discovered-cobalt-strike-bugs-could-allow-the-takedown-of-attackers-servers/</loc>
		<lastmod>2021-08-05T12:41:18+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Cobalt-strike-bugs.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/foid-website-breach-attempt/</loc>
		<lastmod>2021-08-09T14:45:32+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_3_7509477340.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/the-go-and-rust-net-library-was-affected-by-a-critical-ip-address-validation-vulnerability/</loc>
		<lastmod>2021-08-09T14:45:37+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Go-and-Rust-%E2%80%9Cnet%E2%80%9D-lybrary-affected.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/ip-address-leading-zero.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/poc-rust-net.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/blackmatter-ransomware-claims-to-be-a-successor-to-darkside-and-revil/</loc>
		<lastmod>2021-08-09T14:47:13+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_6886587203.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Forum-post-by-BlackMatter-ransomware-to-the-Exploit-forum.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/blackmatter-tor-site.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/ransom-note-3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/one-million-stolen-credit-cards-leaked/</loc>
		<lastmod>2021-08-10T12:16:10+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/AllWorld-Cards-Cover.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/forum-post-5.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/synology-recently-noticed-a-rise-in-brute-force-attacks-on-nas-devices/</loc>
		<lastmod>2021-08-10T13:23:09+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2-6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/facebook-accounts-hijacked-by-flytrap-malware/</loc>
		<lastmod>2021-08-10T14:06:45+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/FlyTrap-malware-Cover.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/FlyTrapMalApps_Zimperium.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/john-deere-security-vulnerabilities/</loc>
		<lastmod>2021-08-10T15:01:02+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_5_2732483828.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/crytek-data-breach/</loc>
		<lastmod>2021-08-11T11:06:15+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_3081432173.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/egregor-data-breach.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/poly-network-loses-roughly-611-million-in-massive-cryptocurrency-hack/</loc>
		<lastmod>2021-08-11T12:04:04+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_8388611963.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/defi-hack-tips.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Picture2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/china-linked-hackers-impersonated-iranians-to-breach-israeli-targets/</loc>
		<lastmod>2021-08-11T12:48:21+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_8469409081.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/fig1-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-print-spooler-zero-day/</loc>
		<lastmod>2021-08-12T10:15:54+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_4660269002.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/new-print-spooler-zero-day.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/hackers-behind-the-poly-network-cryptocurrency-hack-return-the-stolen-funds/</loc>
		<lastmod>2021-08-12T10:19:35+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_2_2492750145.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-1-29.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-adload-malware/</loc>
		<lastmod>2021-08-12T13:22:26+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/New-AdLoad-Malware.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/databases-hit-by-a-new-attack-dubbed-dbreach-researchers-say/</loc>
		<lastmod>2021-08-12T14:27:00+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_5090196502.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-golang-version/</loc>
		<lastmod>2021-08-12T14:32:45+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_3_4195408604.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/kaseya-vsa-supply-chain-attack-revil-ransomware/</loc>
		<lastmod>2021-08-12T14:55:03+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Security-News-and-Updates-1030x360-12.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/alphabay-darknet-market-rises-from-the-dead/</loc>
		<lastmod>2021-08-13T14:31:25+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/AlphaBay-Cover-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/DeSnake_AlphaBay03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Alphabay_Listing.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/threat-actors-used-morse-code-to-avoid-detection/</loc>
		<lastmod>2021-08-13T14:33:23+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_9292453546.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Fig1b-sample-phishing-email-message.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Fig2-sample-credentials-dialog-box.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Fig10-Morse-code.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/github-expresses-disapproval-of-account-password-authentication-for-git-operations/</loc>
		<lastmod>2021-08-13T14:50:26+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_3_4032309659.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/accenture-confirms-ransomware-attack/</loc>
		<lastmod>2021-08-16T11:47:53+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_8472866451.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/leak-site.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-ech0raix-ransomware-version/</loc>
		<lastmod>2021-08-16T11:48:43+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_3_7389098068.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/fbi-finds-over-100-active-ransomware-variants/</loc>
		<lastmod>2021-08-16T11:55:46+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_9971206454.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/kaseya-managed-to-obtain-the-universal-decryptor-after-the-revil-ransomware-attack/</loc>
		<lastmod>2021-08-16T12:19:12+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Kaseya-decryptor.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/ford-vulnerability-data-exposure/</loc>
		<lastmod>2021-08-16T13:12:32+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_7761880586.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/ford-vulnerability.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/a-data-trading-forum-allegedly-sells-emails-belonging-to-lithuanian-ministry-of-foreign-affairs/</loc>
		<lastmod>2021-08-16T14:43:55+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_7_7943299661.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Lithuanian-Ministry-of-Foreign-Affairs-leak.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cybercriminals-may-be-targeting-tokyo-2020-olympic-games-fbi-warns/</loc>
		<lastmod>2021-08-16T15:53:07+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_8834858904.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cybercriminals-compromise-mongolian-certificate-authority-monpass-to-distribute-malware/</loc>
		<lastmod>2021-08-16T15:53:42+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_3_7058802981.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hacker.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/most-wanted-cybercriminals-revealed/</loc>
		<lastmod>2021-08-16T15:55:17+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_3_2666649026.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/fugitives-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/nobelium-cybercriminals-compromise-microsoft-customer-support-to-target-its-customers/</loc>
		<lastmod>2021-08-16T15:55:33+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_4861853042.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cobalt-strike-a-common-tool-in-the-arsenal-of-cybercriminals/</loc>
		<lastmod>2021-08-16T15:55:49+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-23-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/exploit-is-prohibiting-ransomware-ads/</loc>
		<lastmod>2021-08-16T15:57:15+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Security-News-and-Updates-1030x360-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Exploit-bans-ransomware-ads.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/press-release.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/accidental-exposure-of-sensitive-data-for-chase-bank-customers/</loc>
		<lastmod>2021-08-18T13:57:39+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_6_2270893209.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-iot-bug-throughtek/</loc>
		<lastmod>2021-08-18T14:36:59+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_7173658501.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/IoT-bug.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/heimdal-case-files-the-honda-ransomware-attack/</loc>
		<lastmod>2021-08-19T20:01:11+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_12_8920488013.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-emm-enterprise-mobility-management/</loc>
		<lastmod>2021-08-20T06:43:49+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-5-6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-evidence-shows-strong-connection-between-diavol-ransomware-and-trickbot-gang/</loc>
		<lastmod>2021-08-23T11:36:08+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-19-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/shadowpad-malware-a-popular-choice-among-chinese-espionage-groups/</loc>
		<lastmod>2021-08-23T11:58:39+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-39-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/image4-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/razer-synapse-vulnerability/</loc>
		<lastmod>2021-08-23T12:17:17+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_4090395473.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/bleeping-computer-screenshot_razer-synapse-vulnerability.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/lockfile-ransomware-microsoft-exchange/</loc>
		<lastmod>2021-08-23T15:07:31+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_3_2025704015.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Lockfile-ransomware.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Lockfile-ransomware-webshells-sample.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Lockfile-ransomware-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/iranian-threat-actor-siamesekitten-spies-on-israeli-organizations/</loc>
		<lastmod>2021-08-24T12:18:20+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_6617756167.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/lyceum.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/lyceum-excel.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/lyceum-executable.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/500k-reward-poly-network/</loc>
		<lastmod>2021-08-24T14:35:12+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_6_9043880573.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/hundreds-of-thousands-of-devices-using-realtek-sdk-targeted-by-mirai-botnet/</loc>
		<lastmod>2021-08-24T14:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_9_3789837943.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/popular-whatsapp-mod-spreads-malware-on-android-devices/</loc>
		<lastmod>2021-08-25T10:26:01+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_10_7700850314.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Trojan-Triada.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/hackers-impersonate-opensea-employees-in-an-attempt-to-steal-cryptocurrency-assets-and-nfts/</loc>
		<lastmod>2021-08-25T13:27:19+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/fake-opensea-support-message.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/dark-web-user-the-bull-charged-for-selling-insider-stock-info/</loc>
		<lastmod>2021-08-25T15:58:55+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_13_7714109222.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/darkside-ransomware-operations-shut-down/</loc>
		<lastmod>2021-08-25T16:12:19+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Security-News-and-Updates-1030x360-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/forum-post-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/data-leak-site-down.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/customers-in-sensitive-fields-affected-by-critical-f5-big-ip-vulnerability/</loc>
		<lastmod>2021-08-26T13:40:21+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_14_7933660111.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/us-bank-impacted-by-fin8-threat-actor-with-new-sardonic-backdoor/</loc>
		<lastmod>2021-08-26T14:34:47+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-6-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/ragnarok-ransomware-victims-receive-decryptor-key-after-the-gang-decided-to-shutdown/</loc>
		<lastmod>2021-08-27T10:28:09+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_2_7814684502.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/RagnarokLeakSiteDecryptor.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/dirtymoe-botnet-is-back-and-it-has-surprises/</loc>
		<lastmod>2021-08-30T11:43:57+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_7116597876.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/mastercard-and-maestro-pin-bypass-vulnerability/</loc>
		<lastmod>2021-08-30T14:41:09+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_3_8666444007.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/bazaloader-malware-hides-in-false-dmca-and-ddos-complaints/</loc>
		<lastmod>2021-08-30T14:50:29+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_5_7962871376.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/BazaLoader-malaware-trick.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/picture-2-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-paypal-credential-phishing-scam-conducted-via-live-chat-service/</loc>
		<lastmod>2021-08-30T17:09:30+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_3_3427641953.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/paypal-phishing-technique.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/PayPal-phishing-scam.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/a-microsoft-exchange-proxytoken-bug-may-allow-hackers-to-steal-user-emails/</loc>
		<lastmod>2021-08-31T11:18:03+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/A-Microsoft-Exchange-ProxyToken-Bug-May-Allow-Hackers-to-Steal-User-Emails.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/patients-at-dupage-medical-group-may-have-had-their-data-compromised-following-a-cyberattack/</loc>
		<lastmod>2021-09-01T12:36:16+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_2446304875.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/the-leaked-data-file-containing-details-about-the-guntrader-customers-has-been-shared/</loc>
		<lastmod>2021-09-01T13:01:12+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Guntrader-firearms-data-file-got-leaked.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/coinbase-customers-scared-after-2fa-change-notifications-were-sent-by-mistake/</loc>
		<lastmod>2021-09-01T13:44:06+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_5480454793.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/lockbit-leaked-data-belonging-to-bangkok-airways/</loc>
		<lastmod>2021-09-02T13:28:45+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/LockBit-leaked-data-belonginig-to-Bangkok-Airways-data-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/BangkokAirLeak.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/windows-11-alpha-themed-docs-are-used-to-deliver-a-new-malware/</loc>
		<lastmod>2021-09-06T10:47:10+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Windows-11-Alpha.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/synology-nas-brute-force-attack-story-and-how-to-prevent/</loc>
		<lastmod>2021-09-06T12:32:40+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/synology-nas-brute-force-attack.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/the-full-source-code-for-the-babuk-ransomware-published-on-a-russian-hacker-forum/</loc>
		<lastmod>2021-09-06T12:58:53+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_4414459547.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/1-8.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2-7.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/3-4.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/netiquette-rules-safety/</loc>
		<lastmod>2021-09-06T20:19:06+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hs-Security-Tools-Are-Nothing-Without-Knowledge_3D0000.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/incidents-source_employees.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/shutterstock_96887044.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/free-program.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/sensitive-data-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/sensitive-data-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/cyber-bullying.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/shutterstock_232426987.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/netgear-tackles-severe-security-vulnerabilities-impacting-several-of-its-smart-switches/</loc>
		<lastmod>2021-09-07T09:53:29+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_2129763653.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/russia-blamed-by-germany-for-alleged-parliament-cyberattack/</loc>
		<lastmod>2021-09-07T12:45:08+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_3_7898936734.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/alleged-trickbot-developer-arrested/</loc>
		<lastmod>2021-09-07T13:51:32+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/TrickBot-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/mcdonalds-password-for-the-monopoly-vip-database-leaked/</loc>
		<lastmod>2021-09-08T12:06:39+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Mcdonalds-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/monopoly-vip-credentials.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/the-ongoing-office-365-zero-day-attacks-have-a-temporary-fix/</loc>
		<lastmod>2021-09-08T13:41:28+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Office-365-zero-day-attacks.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/list-containing-almost-500000-fortinet-vpn-login-names-and-passwords-was-leaked/</loc>
		<lastmod>2021-09-09T10:23:44+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Fortinet-VPN-login-names-and-passwords-Was-Leaked.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/groove-data-leak-site.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/forum-post-6.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/github-identifies-arbitrary-code-execution-bugs-in-the-open-source-node-js-packages/</loc>
		<lastmod>2021-09-09T14:56:00+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_3_2965176618.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-android-banking-trojan-dubbed-sova-emerges/</loc>
		<lastmod>2021-09-10T13:44:37+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-60-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/schema.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/3stage.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/targets.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/79400-myrepublic-customers-affected-by-major-data-breach/</loc>
		<lastmod>2021-09-10T14:26:23+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_5_3009314392.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/windows-exploit-tutorials-shared-on-hacking-forums/</loc>
		<lastmod>2021-09-13T11:49:26+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Windows-MSHTML-Zero-day-Vulnerability.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/forum-post-1-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/forum-post-2-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/a-version-of-linux-cobalt-strike-beacon-is-being-used-in-ongoing-attacks/</loc>
		<lastmod>2021-09-14T10:56:31+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Cobalt-Strike-new-version.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/hackers-actively-exploit-critical-vulnerability-found-in-atlassian-confluence/</loc>
		<lastmod>2021-09-14T11:01:35+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_8_8717362942.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/all-printnightmare-vulnerabilities-were-fixed/</loc>
		<lastmod>2021-09-15T10:04:12+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/PrintNightmare-Bug-Fix.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/copyfile-policy-check-reverse.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/doj-indicted-apt40/</loc>
		<lastmod>2021-09-16T09:02:12+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_7217456813.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/the-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/internet-domains-used-by-apt29-in-phishing-attacks-seized-by-the-us/</loc>
		<lastmod>2021-09-16T09:04:35+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Security-News-and-Updates-1030x360-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Nobelium-spear-phishing.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/hackers-breached-u-s-local-govt-by-exploiting-fortinet-bugs/</loc>
		<lastmod>2021-09-16T09:34:43+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-23-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/meris-botnet-mitigation-measures-shared-by-mikrotik/</loc>
		<lastmod>2021-09-16T12:48:11+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_6_7330708554.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/50-cyber-security-online-courses-you-should-know-about/</loc>
		<lastmod>2021-09-16T13:12:51+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hs-Do-You-Want-to-Improve-your-Cyber-Security-level_142A5D.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/cybersecurity-fundamentals-coursera-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/ultimate-guide-angler-exploit-kit-non-technical-people/</loc>
		<lastmod>2021-09-16T13:25:03+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hs-Know-your-enemy_465762.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/how-angler-exploit-kit-works.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/exploit-kit-evolution.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/fig-1-angler-ek-growth.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/angler-exploit-kit-by-quarter.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/malware-families-installed-by-angler-in-april-2015.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/most-common-malware-vectors.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/time-to-detection-for-an-angler-ek-infection.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/new-angler-exploit-kit-campaign-december-11-2015.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/angler-revenue-talosintel.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/fbi-and-cisa-warn-regarding-a-critical-zoho-bug/</loc>
		<lastmod>2021-09-17T11:16:02+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/zoho-critical-bug.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/a-new-malware-uses-windows-subsystem/</loc>
		<lastmod>2021-09-17T13:38:36+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/linux-executables-deployed-as-stealth-windows-loaders.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/a-new-crypto-giveaway-scam-is-promoted-via-email/</loc>
		<lastmod>2021-09-20T09:44:20+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/A-New-crypto-giveaway-scam-was-promoted-via-email.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/spam-email.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/html-attachment.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/scam-site.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/windows-iis-servers-compromised/</loc>
		<lastmod>2021-09-21T10:22:20+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Windows-IIS.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/rga-data-breach-massive-microsoft-exchange-hacking-campaign/</loc>
		<lastmod>2021-09-21T10:32:36+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/RGA-Data-Breach-Cover.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/a-new-macos-zero-day-vulnerability-was-recently-discovered/</loc>
		<lastmod>2021-09-22T10:16:54+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/macOS-zero-day-vulnerabilty.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/us-sanctioned-suex-cryptocurrency-exchange-for-allegedly-processing-ransomware-payments/</loc>
		<lastmod>2021-09-22T11:02:01+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_7645988221.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Suex-funds-received-from-cybercriminals-since-2018.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/turla-apt-group-employs-new-tinyturla-backdoor-in-attacks-against-countries-around-the-world/</loc>
		<lastmod>2021-09-22T14:16:11+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_3_6784460558.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/TinyTurlaDLL.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/netgear-rce-in-soho-routers-fixed-by-the-enterprise/</loc>
		<lastmod>2021-09-22T15:04:22+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Netgear-RCE-cover-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/vulnerable-routers-to-Netgear-RCE.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/farming-cooperative-shut-down-by-ransomware/</loc>
		<lastmod>2021-09-23T10:19:56+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Crystal-Valley-Ransomware-Attack.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/apple-announced-that-tls-1-0-and-1-1-has-been-deprecated-in-ios-15-ipados-15-macos-12-and-more/</loc>
		<lastmod>2021-09-23T11:05:44+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_2157386810.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/the-raidforums-data-marketplace-mistakenly-makes-confidential-staff-pages-public/</loc>
		<lastmod>2021-09-23T12:48:08+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_4_3243618035.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/google-search-indexes-private-RaidForums-staff-page.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/picture-2-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/bloodystealer-malware-wreaks-havoc-on-the-gaming-platforms/</loc>
		<lastmod>2021-09-28T10:37:13+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/BloodyStealer-Malware-cover.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/critical-vulnerabilities-affecting-qvr-video-surveillance-software-patched-up-by-qnap/</loc>
		<lastmod>2021-09-28T13:15:25+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_3_5015618151.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/malicious-safepal-wallet-add-on-goes-after-cryptocurrency/</loc>
		<lastmod>2021-09-28T13:17:43+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Safepal-Wallet-Add-on-cover-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/restore-wallet-SafePal-Wallet-Add-on-phishing-website.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/SafePal-Wallet-Add-On-Mozilla-Mitigation-Measures.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/credential-stuffing/</loc>
		<lastmod>2021-09-29T08:56:11+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Miriam-1030x360-Credentials.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/illegitimate-call-centers-defrauding-foreign-cryptocurrency-investors-were-taken-down-by-ssu/</loc>
		<lastmod>2021-09-29T10:55:10+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_6_3419250931.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/windows-boot-manager-hijacked-by-finfisher-malware/</loc>
		<lastmod>2021-09-29T13:42:24+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Windows-Boot-Manager-hijacked-by-FinFisher-malware.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/forward-air-corporation-recently-disclosed-data-theft-following-a-ransomware-attack/</loc>
		<lastmod>2021-09-30T10:30:22+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_9319741987.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hades-tor-site.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cybersecurity-firm-ceo-arrested-on-suspicion-of-high-treason/</loc>
		<lastmod>2021-09-30T13:20:33+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Ilya-Sachkov-Arrested.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/ghostemperor-campaign-targets-asian-countries-abusing-microsoft-vulnerabilities/</loc>
		<lastmod>2021-10-01T11:04:38+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_8977073445.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/GhostEmperor-infection-chain.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/a-working-exploit-for-the-cve-2021-22005-flaw-in-vmware-vcenter-was-publicly-released/</loc>
		<lastmod>2021-10-04T09:05:45+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_8_3357707947.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/former-army-contractor-received-12-5-years-sentence-for-fraud-scheme/</loc>
		<lastmod>2021-10-04T10:33:57+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/PII-Fraud.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/sandhills-shut-down-by-ransomware-attack/</loc>
		<lastmod>2021-10-04T13:24:36+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Sandhills-Global-Ransomware.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/staking-protocol-compound-users-mistakenly-receive-90m/</loc>
		<lastmod>2021-10-04T14:07:34+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_18_4224439559.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/comp-value.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/apache-airflow-servers-leak-thousands-of-credentials/</loc>
		<lastmod>2021-10-05T11:39:27+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Apache-Servers.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/twitch-was-hacked/</loc>
		<lastmod>2021-10-07T10:09:29+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/twitch-hack-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/welland-park-academy-it-systems-hacked-by-a-former-employee-who-was-getting-bored/</loc>
		<lastmod>2021-10-07T14:33:20+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_3_3913252351.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/fake-facebook-scams/</loc>
		<lastmod>2021-10-07T16:42:50+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hs-Fake-online-profiles-can-compromise-your-personal-data_79A98A.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/fake-profile-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/fake-profile-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/fake-profile-3.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/fake-profile-4.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/fake-profile-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/fake-profile-6.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/fake-profile-7.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/fake-profile-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/fake-profiles-9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/fake-profiles-10.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/fake-profile-12.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/fake-profiles-13.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/fake-profiles-14.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/fake-profiles-15.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/fake-profiles-16.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/fake-profiles-17.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/fake-profiles-18.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/fake-profiles-19.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/one-page-anti-ransomware-checklist.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/hack-facebook-instagram-snapchat-password/</loc>
		<lastmod>2021-10-07T16:47:12+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hs-How-to-hack-facebookinstagramsnapchat-passwords_33545D.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/password-3.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/password-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/password-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/password-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/password-5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/vidar-stealer-returns-and-has-a-new-target-mastodon/</loc>
		<lastmod>2021-10-08T09:21:56+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Cover-image-Vidar-stealer.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/dependency-request-Vidar-stealer-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/excel-4-0-macros-will-be-disabled-in-order-to-protect-users/</loc>
		<lastmod>2021-10-08T10:19:22+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Excel-4.0-macros-will-be-disabled.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/security-alert-facebook-messenger-adware/</loc>
		<lastmod>2021-10-08T15:27:13+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/An-adware-is-targeting-Facebook-users-and-spreading-fast.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/facebook-malware-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/initial-domain-redirect.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/FB-malware-Firefox.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Chrome-extension.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/VirusTotal.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/security-alert-linkedin-phishing-campaign/</loc>
		<lastmod>2021-10-08T15:28:02+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/LinkedIn-Phishing-Campaign-2B6B91.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/linkedin_scam1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/LINKEDIN-phishing-email.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/linkedin_scam2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/linkedin_scam3.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/linkedin-phishing-footer.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/linkedin_scam6.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/security-footer-in-linkedin-emails.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/linkedin-secure-footer.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/vista-end-of-life/</loc>
		<lastmod>2021-10-08T15:33:53+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hs-Windows-Vista-reaches-end-of-life_0D465B.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Share-of-new-and-older-versions-of-browsers-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Windows-lifecycle.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hs-The-life-of-a-zeroday-vulnerability-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/three-men-accused-to-have-participated-in-a-scheme-to-launder-the-profits-of-a-bec-attack/</loc>
		<lastmod>2021-10-11T10:56:30+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_2471684301.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Bec-scheme-transactions.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cox-media-group-ransomware-attack-confirmed/</loc>
		<lastmod>2021-10-11T14:37:32+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Cox-Media-ransomware-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/crypto-mining-malware-targets-huawei-cloud/</loc>
		<lastmod>2021-10-12T11:59:46+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/cover-picture-crypto-mining-malware.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/crypto-mining-malware-infection-process-trend-micro.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/undercover-fbi-agent-reveals-espionage-plans-of-nuclear-engineer/</loc>
		<lastmod>2021-10-12T14:25:43+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/nuclear-engineer-arrested-cover-picture.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/jvckenwood-suffers-ransomware-attack/</loc>
		<lastmod>2021-10-12T14:32:59+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_15_6290784852-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/biometric-authentication/</loc>
		<lastmod>2021-10-13T08:23:25+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_17_4405981493.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/biometric-authentication-methods.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-audit-failure-in-event-viewer/</loc>
		<lastmod>2021-10-13T08:24:53+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-36.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Example-of-Event-ID-4771-.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Example-of-Event-ID-4625-.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/vulnerable-video-dvr-devices-now-targeted-by-the-freakout-botnet/</loc>
		<lastmod>2021-10-13T11:41:38+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_6_5250782805.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/attack-DVR.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/picture-2-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-hashing/</loc>
		<lastmod>2021-10-13T13:18:03+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/What-Is-Hashing.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Hashing-example.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/banco-pichincha-impacted-by-a-cyberattack/</loc>
		<lastmod>2021-10-13T13:40:06+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_8_3713923655.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Banco-pichincha-website-outage.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/olympus-cyberattack-it-systems-closed-off/</loc>
		<lastmod>2021-10-13T14:49:52+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Olympus-cyberattack-cover-image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/hackers-exploit-opensea-bug-to-empty-crypto-wallets/</loc>
		<lastmod>2021-10-14T09:50:47+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/OpenSea-bug-cover-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/users-report-OpenSea-account-hijacking.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/the-anonymous-domain-registration-might-be-prohibited-shortly/</loc>
		<lastmod>2021-10-14T10:54:01+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_3077066884.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/the-botnet-dubbed-mykings-is-still-active/</loc>
		<lastmod>2021-10-14T11:18:26+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MyKings-Botnet.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/customers-of-visible-wireless-carrier-had-their-accounts-compromised/</loc>
		<lastmod>2021-10-14T13:28:44+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_3_6408514329.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Visible-user-post.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/virtual-global-anti-ransomware-event-takes-place-this-week/</loc>
		<lastmod>2021-10-14T14:08:02+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/global-anti-ransomware-event-cover.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/heimdal-security-discovers-new-cryptocurrency-scam-campaign/</loc>
		<lastmod>2021-10-15T06:58:58+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_4950514202.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/crypto.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/crypto2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/crypto3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/revil-ransomwares-tor-sites-were-hijacked/</loc>
		<lastmod>2021-10-18T10:11:28+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/REvil-shut-down.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/accenture-discloses-it-had-suffered-data-breach-following-a-ransomware-attack/</loc>
		<lastmod>2021-10-18T14:26:09+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_3_3723417426.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/5-2-billion-worth-of-bitcoin-transactions-related-to-ransomware/</loc>
		<lastmod>2021-10-18T14:29:05+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/5.2-Billion-Worth-of-Bitcoin.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/israeli-hospitals-allegedly-targeted-by-chinese-threat-actors/</loc>
		<lastmod>2021-10-19T09:54:31+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_4_8739694149.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/harvester-malicious-group-is-going-after-telcos/</loc>
		<lastmod>2021-10-19T10:58:38+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Harvester-cyberattack.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/watch-out-attackers-can-guess-your-credit-card-pin-even-if-you-are-covering-the-atm-pad/</loc>
		<lastmod>2021-10-19T13:28:47+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_8_4660511841.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/pin_attack.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/picture-2-digits.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Picture-3-PIN-guesses-and-probabilities-for-each-digit.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/over-25-of-malicious-javascript-is-being-obfuscated-research-shows/</loc>
		<lastmod>2021-10-20T10:17:10+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_9_9048252599.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/samples.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/a-well-known-bug-bounty-platform-wants-zero-day-exploits-for-windows-vpn-clients/</loc>
		<lastmod>2021-10-20T10:18:41+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Zerodium.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Zerodium-Process.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/acer-hit-twice-in-one-week-by-the-same-hacker/</loc>
		<lastmod>2021-10-20T13:28:39+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Acer-was-hacked-the-second-time-in-a-week.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/desorden-acer-taiwan-hack.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/macaw-locker-evil-corps-latest-version-makes-new-victims/</loc>
		<lastmod>2021-10-22T11:58:33+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_6_4603710937.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Macaw-Locker-ransom-note.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/tor-payment-site.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/a-well-known-npm-library-was-hijacked/</loc>
		<lastmod>2021-10-25T14:38:31+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2-9.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/microsoft-adds-support-for-detecting-jailbroken-ios-devices-to-microsoft-defender-for-endpoint/</loc>
		<lastmod>2021-10-26T13:13:28+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-1-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Jailbreak-Alert-Console-edit.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/avd-bug-fixed-by-microsoft/</loc>
		<lastmod>2021-10-26T13:17:06+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/AVD-bug-cover-picture-for-news.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/cumulative-updates-ADV-bug.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/a-new-flaw-was-discovered-in-the-microsoft-windows-platform-binary-table-wpbt/</loc>
		<lastmod>2021-10-26T13:17:34+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/WPBT-Vulnerabilty.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/microsoft-exchange-autodiscover-bug-leads-to-the-leakage-of-100k-windows-credentials/</loc>
		<lastmod>2021-10-26T13:18:37+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Microsoft-Exchange-Autodiscover-Bug-cover.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Microsoft-Exchange-Autodiscover-Bug.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/epsilon-red-ransomware-goes-after-unpatched-microsoft-exchange-servers/</loc>
		<lastmod>2021-10-26T13:21:29+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Security-News-and-Updates-1030x360-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/553347-epsilon_red_00.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/EpsilonREvil-RansomNote.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/ultimasms-subscription-fraud-campaign-targeted-android-users/</loc>
		<lastmod>2021-10-26T13:58:23+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/UltimaSMS-Subscription-Fraud-Campaign-Targeted-Android-Users.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/2-million-dollars-for-polygon-vulnerability/</loc>
		<lastmod>2021-10-26T14:27:46+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Polygon-vulnerability-cover-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/1_kA76q2qL6Tz6SJqfFHl6cQ.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/iranian-gas-stations-unable-to-operate-after-massive-cyberattack/</loc>
		<lastmod>2021-10-27T11:35:22+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Iranian-gas-stations-suffered-a-cyberattack.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/lazarus-hacking-group-now-focusing-on-it-supply-chain-attacks/</loc>
		<lastmod>2021-10-27T11:49:35+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_2071169434.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/ranzy-locker-compromised-over-30-us-companies-the-fbi-declares/</loc>
		<lastmod>2021-10-27T14:29:41+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Ranzy-Locker-cover-image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/personal-information-belonging-to-400000-german-students-exposed/</loc>
		<lastmod>2021-10-28T11:24:58+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Scoolio-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Scoolio.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/israeli-users-targeted-by-android-spyware-apps-since-2018/</loc>
		<lastmod>2021-10-28T11:33:02+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-34-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/pdf.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/picture-2-6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/abstractemu-new-malware-roots-android-devices/</loc>
		<lastmod>2021-10-29T17:56:02+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/AbstractEmu-malware-cover-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Collected-system-info-AbstractEmu.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/minecraft-alt-lists-used-by-chaos-ransomware/</loc>
		<lastmod>2021-11-01T12:08:05+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Minecraft-Alt-Lists-Used-By-Chaos-Ransomware-The-Ransomware-gang-encrypts-gamers.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/ios-15-windows-10-and-google-chrome-hacked-during-the-tianfu-cup-contest/</loc>
		<lastmod>2021-11-01T13:44:59+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Tianfu-cup-cover-image-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/targeted-software.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/iphone-13-hacked-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/google-chrome.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/hellokitty-ransomware-adds-new-extortion-tactics/</loc>
		<lastmod>2021-11-02T14:43:46+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hellokitty-ransomware-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cyberserve-hijacked-by-blackshadow-hacker-group-to-extort-customers/</loc>
		<lastmod>2021-11-02T14:45:29+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_14_8901735192.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/dan-bus.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/heimdal-detection-telemetry/</loc>
		<lastmod>2021-11-02T15:38:28+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-8-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Graph1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Graph2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Graph3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/squid-game-cryptocurrency-squid-crashed-on-monday-in-an-apparent-scam-investors-lose-millions-of-dollars/</loc>
		<lastmod>2021-11-04T11:01:12+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_19_4436967109.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/data-breach-hits-uk-labour-party/</loc>
		<lastmod>2021-11-04T14:12:14+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/UK-Labour-party-data-breach-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/machine-learning-in-cybersecurity/</loc>
		<lastmod>2021-11-05T13:26:51+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/machine-learning-in-cybersecurity-blog.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/machine-learning-in-cybersecurity-ml-classification.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/machine-learning-in-cybersecurity-advantages-and-disadvantages.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/pcconsole-controllers-manufacturer-scuf-gaming-hacked-to-steal-banking-information/</loc>
		<lastmod>2021-11-06T00:17:02+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_4_5216250109.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/icedid-banking-trojan-new-version/</loc>
		<lastmod>2021-11-06T00:19:17+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_5_4620896736.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Macro-starts-payload-IcedID.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/feedzais-verdict-banking-attacks-have-increased-159-over-the-past-year/</loc>
		<lastmod>2021-11-06T00:19:44+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Security-News-and-Updates-1030x360-7.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/google-ads-used-for-stealing-credentials-and-draining-accounts/</loc>
		<lastmod>2021-11-08T15:36:01+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Google-Ads-Used-for-stealing-credentials-and-draining-balances-of-victims.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/hackers-impersonate-proofpoint-to-collect-microsoft-office-365-and-google-credentials/</loc>
		<lastmod>2021-11-08T15:52:06+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_28_7727288909.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/proofpoint-phish-email-final-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/proofpoint-credential-phishing-login-page-host-final.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/hive-ransomware-gang-impacts-mediamarkt/</loc>
		<lastmod>2021-11-09T10:54:25+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_29_7605098831.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hive-ransom-note.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/vulnerabilities-impacting-philips-tasy-emr-could-lead-to-patient-data-exposure/</loc>
		<lastmod>2021-11-09T14:47:01+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_31_9661959911.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/robinhood-suffered-a-massive-data-breach/</loc>
		<lastmod>2021-11-09T15:00:16+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Robinhood-Suffered-a-Massive-Data-Breach.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/medatixx-hit-with-ransomware-attack-customers-need-to-change-passwords-asap/</loc>
		<lastmod>2021-11-10T10:00:43+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_32_9395597032.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/DSC04102.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/clop-ransomware-exploits-solarwinds-serv-u-flaw/</loc>
		<lastmod>2021-11-10T14:21:53+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/A-SolarWinds-Serv-U-Flaw-Is-Exploited.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/teamtnt-targets-docker-servers/</loc>
		<lastmod>2021-11-10T14:45:33+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Docker-servers-abused-cover-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/attack-workflow.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/14-security-vulnerabilities-found-in-busybox/</loc>
		<lastmod>2021-11-10T14:55:18+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_35_7105088316.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/hackers-for-hire-from-void-balaur-are-selling-stolen-mails-and-personal-information/</loc>
		<lastmod>2021-11-11T12:43:56+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Hackers-for-hire-from-Void-Balaur-sell-stolen-mails-and-personal-information.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/hackers-breached-aruba-central/</loc>
		<lastmod>2021-11-11T14:33:28+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Hackers-breached-Aruba-Central.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/hackers-use-gmail-accounts-to-execute-baiting-attacks/</loc>
		<lastmod>2021-11-12T13:27:06+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_8254276972.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/bait-attacks-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/picture-2-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/picture-3-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/picture-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/sunwater-data-breach-hackers-hid-for-9-months/</loc>
		<lastmod>2021-11-12T13:36:04+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/SunWater-data-breach-cover-image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/magniber-ransomware-internet-explorer-vulnerabilities/</loc>
		<lastmod>2021-11-12T15:16:23+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Internet-Explorer-Vulnerabilities-cover-picture.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/ps5-root-encryption-keys-hacked/</loc>
		<lastmod>2021-11-15T11:11:33+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/PS5-root-encryption-keys-news-cover-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Fail0verflow-tweet.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/PS5-tweet-root-encryption-keys-code.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/PS5-debug-settings-printscreen.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/fbi-email-servers-were-hacked/</loc>
		<lastmod>2021-11-15T11:25:57+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/FBI-hacked.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/israeli-entities-targeted-by-the-new-politically-motivated-moses-staff-hacking-group/</loc>
		<lastmod>2021-11-16T10:52:24+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_9_6185400722.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/infection_chain.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/picture-2-3.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/picture-3-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/sharkbot-android-trojan-deploys-cryptomining-malware/</loc>
		<lastmod>2021-11-16T12:42:30+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/SharkBot-Android-Trojan-Cover-Image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/how-Sharkbot-perform-an-ATS-attack-Cleafy-image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/costco-credit-card-skimmer-led-to-data-breach/</loc>
		<lastmod>2021-11-16T12:43:29+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_8_4490651452.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/the-telegraph-leaked-10-tb-database/</loc>
		<lastmod>2021-11-16T12:54:40+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/telegraph-data-leak-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/emotet-malware-appears-to-be-back-in-business/</loc>
		<lastmod>2021-11-16T14:05:31+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Emotet-malware-appears-to-be-back-in-business.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/robinhood-customers-have-their-email-addresses-available-for-sale-on-hacker-forum/</loc>
		<lastmod>2021-11-16T15:18:05+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-43-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Threat-actor-selling-the-stolen-Robinhood-data.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/picture-2-4.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-emotet-spam-campaigns-hard-at-work/</loc>
		<lastmod>2021-11-17T11:10:21+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/emotet-new-email-campaign-cover.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/fake-ransomware-attacks-target-wordpress-sites/</loc>
		<lastmod>2021-11-17T11:40:59+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/fake-ransomware-attacks-targeting-wordpress-cover.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/siteencrypted.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/wordpress-plugin-sucuri-illustration.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/microsoft-exchange-and-fortinet-vulnerabilities-exploited-by-iranian-apt/</loc>
		<lastmod>2021-11-18T15:36:29+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Microsoft-Exchange-and-Fortinet-Vulnerabilities-Exploited-by-Iranian-APT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/memento-ransomware-group-winrar-archives/</loc>
		<lastmod>2021-11-19T11:43:26+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/memento-ransomware-group-cover-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/memento-flow-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/california-pizza-kitchen-suffers-data-breach-ssn-of-100k-individuals-exposed/</loc>
		<lastmod>2021-11-22T12:49:27+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_3_7044357176.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/redcurl-makes-a-comeback-updated-hacking-tools/</loc>
		<lastmod>2021-11-22T15:06:31+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/RedCurl-returns-cover-image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/us-securities-and-exchange-commission-is-warning-investors/</loc>
		<lastmod>2021-11-22T15:12:11+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/US-Securities-and-Exchange-Commission-Is-Warning-Investors.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/be-aware-fake-tsa-precheck-websites-swindle-american-passengers-with-bogus-renewals/</loc>
		<lastmod>2021-11-22T15:46:19+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_5_4425423451.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/email1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/TSA-PreCheck-fake-site.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/paypal_payment.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/vestas-cyberattack-makes-the-company-shut-down-its-it-systems/</loc>
		<lastmod>2021-11-23T13:38:32+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/vestas-cyberattack-cover-image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/malicious-actors-were-able-to-compromise-exposed-services-in-24-hours/</loc>
		<lastmod>2021-11-24T11:47:42+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Malicious-actors-able-to-compromise-exposed-services-in-24-hours.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/data-stealing-malware-impacts-android-devices-cynos-version/</loc>
		<lastmod>2021-11-24T12:00:33+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/data-stealing-malware-cover-image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/a-new-microsoft-windows-installer-zero-day-is-exploited/</loc>
		<lastmod>2021-11-24T15:13:36+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/A-New-Microsoft-Windows-Installer-zero-day-is-exploited.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/android-smartphones-impacted-by-mediatek-vulnerabilities/</loc>
		<lastmod>2021-11-25T12:48:08+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Mediatek-vulnerabilities-cover-picture.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/IPI-message.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/printjack-printer-attacks-pose-a-serious-threat-researchers-warn/</loc>
		<lastmod>2021-11-25T12:51:33+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_3_9512215840.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/printer-numbers.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/python_script.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/godaddy-data-breach-update-six-wordpress-hosting-service-resellers-impacted/</loc>
		<lastmod>2021-11-25T14:25:17+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_10_9932931116.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/javascript-loader-ratdispenser-infects-windows-pcs-with-rats/</loc>
		<lastmod>2021-11-26T14:53:20+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_3_8582389521.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/double-extension.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/deobfuscated_arguments.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/dropping_diagram.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/huntington-hospital-former-employee-accesses-private-info-of-13000-patients/</loc>
		<lastmod>2021-11-26T15:01:51+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_11_3286778840.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/reply-chain-email-cyberattacks-hit-ikeas-email-systems/</loc>
		<lastmod>2021-11-30T19:51:12+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/reply-chain-email-cyberattacks-cover-picture.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/ikea-internal-email-phishing.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/fake-adobe-windows-app-installer-packages-are-distributing-the-emotet-malware/</loc>
		<lastmod>2021-12-02T11:37:02+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Fake-Adobe-Windows-App-Installer-Packages-Are-Distributing-the-Emotet-Malware.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/bogus-android-app-steals-banking-credentials-from-malaysian-individuals/</loc>
		<lastmod>2021-12-02T13:37:37+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_3650016632.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/SMS_exfiltration.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/cleaning-service-malaysia.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/bank_selection.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/fake-house-cleaning-site.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/the-in-house-zoho-servicedesk-exploit-used-to-drop-webshells/</loc>
		<lastmod>2021-12-03T12:20:18+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/The-In-house-Zoho-ServiceDesk-Exploit-Used-to-Drop-Webshells.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/session-hijacking/</loc>
		<lastmod>2021-12-07T12:52:17+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_6582348042.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Copy-of-Untitled-53.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Copy-of-Copy-of-Untitled-15.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/session-ID.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/http-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/misconfigured-kafdrop-instances-lead-to-sensitive-data-exposure-for-various-big-companies/</loc>
		<lastmod>2021-12-07T12:56:59+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/misconfigured-Kafdrop-instances-cover-picture.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-desktop-configuration/</loc>
		<lastmod>2021-12-07T13:23:57+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Dora-Desktop-Configuration-1030x360.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/a-critical-zoho-manageengine-desktop-central-and-desktop-central-msp-vulnerability-is-exploited-by-an-apt-actor/</loc>
		<lastmod>2021-12-07T14:18:42+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/zoho-vulnerability.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/qnap-nas-devices-are-now-being-targeted-by-another-cryptocurrency-mining-malware/</loc>
		<lastmod>2021-12-08T12:06:21+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/cryptocurrency-mining-malware-NAS-devices-cover.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/heimdal-wins-cloud-delivered-security-solution-of-the-year-award/</loc>
		<lastmod>2021-12-08T12:58:20+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-53.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/best-cloud-delivered-security-award.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/emotet-is-dropping-cobalt-strike/</loc>
		<lastmod>2021-12-08T13:22:14+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Emotet-Is-Dropping-Cobalt-Strike-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/huawei-usb-lte-dongles-are-prone-to-attacks/</loc>
		<lastmod>2021-12-08T14:45:57+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-23-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/6a0133f264aa62970b0278802af971200d-800wi.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/computing-security-awards-2021-heimdal-wins-ai-and-machine-learning-based-security-of-the-year/</loc>
		<lastmod>2021-12-09T12:28:01+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Computing-Security-Awards-cover-picture-Heimdal%E2%84%A2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Computing-Security-Awards-2021-Heimdal%E2%84%A2s-Prize-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/AI-and-Machine-Learning-Based-Security-of-the-Year-second-image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/moobot-botnet-targets-unpatched-hikvision-video-systems/</loc>
		<lastmod>2021-12-09T13:25:12+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Moobot-cover-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/moobot-attack-scenario.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/mikrotik-routers-a-target-for-cybercriminals/</loc>
		<lastmod>2021-12-10T14:22:20+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MikroTik-routers-cover-image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/strongpity-malware-spread-using-malicious-notepad-installers/</loc>
		<lastmod>2021-12-10T15:09:02+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_4_7175348980.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/service.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/french-users-and-orgs-targeted-by-tinynuke-info-stealing-malware/</loc>
		<lastmod>2021-12-14T11:14:06+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-21-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/campaigns.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/IoCs.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Screen-Shot-2021-12-08-at-1.56.47-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/message.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/the-ransomware-attack-suffered-by-kronos-may-cause-weeks-of-downtime/</loc>
		<lastmod>2021-12-14T12:19:18+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Kronos-Ransomware-Fin.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/iis-extensible-web-server-used-to-steal-microsoft-exchange-credentials/</loc>
		<lastmod>2021-12-15T11:48:31+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_4_9347101177.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Owowa-infection-map.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/token.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/list-of-modules.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/anubis-android-malware-is-back-and-it-is-focusing-on-financial-institutions/</loc>
		<lastmod>2021-12-15T14:43:21+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_6_4172660122.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Anubis-phishing-login-form-overlay.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/anubis_classes.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/disable_play_protect.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/quick_bit_trade.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/espionage-hacking-campaign-is-targeting-telecom-operators/</loc>
		<lastmod>2021-12-15T14:48:43+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_5_7840375762.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/all-you-need-to-know-about-the-new-zero-day-found-in-the-log4j-java-library/</loc>
		<lastmod>2021-12-15T14:49:59+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Proof-of-concept-exploits-for-a-significant-zero-day-vulnerability-in-the-widely-used-Apache-Log4j-Java-based-logging-library-were-distributed-online.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/monero-miners-injected-in-log4j-through-rmi/</loc>
		<lastmod>2021-12-17T11:52:47+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-13-7.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/phorpiex-botnet-is-becoming-harder-to-disrupt/</loc>
		<lastmod>2021-12-17T13:37:38+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Phorpiex-botnet-Became-harder-to-disrupt.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/heimdal-social-media-giveaway/</loc>
		<lastmod>2021-12-17T14:00:45+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-57.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/facebook-banns-spy-for-hire-entities/</loc>
		<lastmod>2021-12-20T12:50:46+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/spy-for-hire-entities-banned-by-meta-cover-picture.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/dridex-malware-installed-with-the-help-of-log4j-vulnerability/</loc>
		<lastmod>2021-12-21T11:17:52+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_7469254138.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/zoho-zero-day-exploited-by-state-threat-actors-since-october-according-to-fbi/</loc>
		<lastmod>2021-12-21T14:07:43+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Zoho-zero-day-desktop-central-cover-image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/scammers-earn-80-million-with-false-giveaways-and-surveys/</loc>
		<lastmod>2021-12-22T13:53:44+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/false-giveaways-cover-picture.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/stats-false-giveaways-group-ib.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/2easy-a-new-dark-web-marketplace-for-stolen-data/</loc>
		<lastmod>2021-12-22T13:56:04+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_2_3835925851.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/more-ech0raix-ransomware-attacks-hit-qnap-nas-devices/</loc>
		<lastmod>2021-12-28T13:29:46+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/QNAP-NAS-devices-impacted-by-eCh0raix-ransomware-cover-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/eCh0raixNote.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/fintech-company-impacted-by-log4j-does-not-pay-the-ransom/</loc>
		<lastmod>2021-12-30T11:10:19+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/ONUS-impacted-by-Log4j-cover-image-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/backup-error-results-in-kyoto-university-losing-77tb-of-research-data/</loc>
		<lastmod>2022-01-03T15:04:46+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_17_2573700563.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/supercomputer.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/curious-cat-app-loses-control-of-its-domain/</loc>
		<lastmod>2022-01-03T15:12:12+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-31-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/curious-cat.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/watch-out-you-might-get-hacked-when-copy-pasting-commands-from-webpages/</loc>
		<lastmod>2022-01-04T11:47:25+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/copy-paste-commands-hack-news-cover-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/command.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/poc-code-js.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/a-data-breach-affected-broward-health/</loc>
		<lastmod>2022-01-04T13:14:53+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-34-11.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/blacktech-apt-uses-flagpro-malware-to-target-japanese-companies/</loc>
		<lastmod>2022-01-04T15:11:54+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Flagpro-malware-cover-picture.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/datpiff-data-breach-has-an-impact-on-millions-of-people-have-i-been-pwned-warns/</loc>
		<lastmod>2022-01-05T12:39:39+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/DatPiff-data-breach-cover-image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/50-million-lost-to-fraudsters-posing-as-broker-dealers/</loc>
		<lastmod>2022-01-06T11:09:25+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-38-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/customer-accounts-from-17-firms-were-stolen-by-hackers-in-credential-stuffing-attacks/</loc>
		<lastmod>2022-01-06T12:32:34+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-14-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/credential_stuffing_ny_oag.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/elephant-beetle-threat-actor-is-stealing-money-from-companies-new-report-reveals/</loc>
		<lastmod>2022-01-06T12:46:21+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Elephant-Beetle-cover-picture-.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/lateral_movement.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/sonicwall-email-security-and-firewall-products-impacted-by-the-y2k22-vulnerability/</loc>
		<lastmod>2022-01-10T12:07:28+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_2278306787.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/the-npm-libraries-colors-and-faker-were-corrupted/</loc>
		<lastmod>2022-01-10T13:08:57+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_2336056264.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/online-impersonation/</loc>
		<lastmod>2022-01-11T16:17:55+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-1030-x-360-px-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cryptocurrency-startups-targeted-by-the-bluenoroff-hacking-group/</loc>
		<lastmod>2022-01-14T12:54:52+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_2_4538501107.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Email-used-in-latest-BlueNoroff-campaigns.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/logos.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/tampered-component.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/stolen-credit-cards-biggest-dark-web-marketplace-closes-down/</loc>
		<lastmod>2022-01-18T13:38:54+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/UniCC-retirement-cover-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Screenshot-2022-01-12-at-19.23.41.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Screenshot-2022-01-12-at-19.07.25.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/redline-malware-steals-your-password-from-the-browser/</loc>
		<lastmod>2022-01-19T16:07:56+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/RedLine-malware-cover-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/features.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/crypto-wallets-and-passwords-targeted-by-bhunt-malware-new-report-says/</loc>
		<lastmod>2022-01-20T10:44:51+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/BHUNT-malware-cover-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/signature.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/BHUNT-victim-heatmap-bitdefender.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/anomalous-spyware-targets-industrial-firms/</loc>
		<lastmod>2022-01-21T14:25:52+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/anomalous-spyware-cover-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Campaigns_abusing_corporate_trusted_infrastructure_02-856x1024.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/virtual-patch/</loc>
		<lastmod>2022-01-21T20:43:26+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-29.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/1515dec55c192cff2620f323e222e94a.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/android-malware-brata-is-more-dangerous-than-ever/</loc>
		<lastmod>2022-01-25T12:59:16+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_15_9920076151.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/av-detection.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/factory-permission.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/qnap-devices-targeted-in-ransomware-attack/</loc>
		<lastmod>2022-01-26T12:00:20+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_3370878424.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/chainsaw-the-new-tool-that-helps-incident-responding-teams/</loc>
		<lastmod>2022-01-26T16:53:03+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/chainsaw-cover.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/770-million-lost-from-social-media-fraud-surge/</loc>
		<lastmod>2022-01-31T14:39:02+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_8010526470.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/muddywater-targets-turkey/</loc>
		<lastmod>2022-02-01T14:52:33+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_6248494932.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/critical-wordpress-plugin-rce-in-essential-addons-for-elementor-impacts-600k-wordpress-sites/</loc>
		<lastmod>2022-02-01T15:18:48+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Critical-WordPress-plugin-RCE-cover-picture.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Wordpress-plugin-RCE-triggering-code-Patchstack.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/samba-vulnerability-in-the-vfs-module-can-trigger-rce-and-full-root-user-access/</loc>
		<lastmod>2022-02-02T11:05:19+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Samba-vulnerability-cover-image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-backdoor-deployed-by-chinese-hackers-targets-taiwanese-financial-institutions-researchers-say/</loc>
		<lastmod>2022-02-07T12:25:35+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/xPack-cover-image-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/vodafone-portugal-4g-and-5g-services-got-shut-down/</loc>
		<lastmod>2022-02-09T11:32:15+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Vodafone-cyberattack.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/news-corp-reportedly-targeted-by-chinese-hackers/</loc>
		<lastmod>2022-02-09T11:47:54+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/News-Corp-cyberattack-cover-image-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/north-korean-apt-kimsuky-uses-commodity-rats-with-custom-gold-dragon-backdoor/</loc>
		<lastmod>2022-02-09T12:59:01+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-7-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/XRAT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/registry.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/wiper.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/taking-host-intrusion-prevention-system-hips-apart/</loc>
		<lastmod>2022-02-09T18:58:11+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-4-5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/criminals-are-using-sim-swap-attacks-to-steal-millions/</loc>
		<lastmod>2022-02-10T11:58:37+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/SIM-Swapping.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/microsoft-autorun-motw-macro-malware/</loc>
		<lastmod>2022-02-11T15:15:25+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Vladimir-Macro-Malware-1030x360.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-report-shows-that-threat-actors-use-google-docs-comment-feature-to-send-malicious-links/</loc>
		<lastmod>2022-02-13T12:43:38+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_21_7222899427.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/pasted-image-0-42.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/picture-2-7.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/pakistani-and-syrian-threat-actors-banned-from-facebook/</loc>
		<lastmod>2022-02-13T12:48:00+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-45-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/mirai-botnet-threat-multiple-variants/</loc>
		<lastmod>2022-02-13T12:53:36+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_7_2314022491.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cryptowall-ransomware/</loc>
		<lastmod>2022-02-13T22:03:26+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hs-Dont-Let-CryptoWall-Block-Your-Data_310E16.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2015/02/cryptowall2502.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/cryptowall-4-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/the-49ers-hit-by-blackbyte-ransomware-attack/</loc>
		<lastmod>2022-02-14T12:28:21+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/49ers-ransomware.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/blackbyte-ransom-note.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/heimdal-and-bechtle-partner-up-for-an-exquisite-webinar-on-the-cybersec-threat-outlook/</loc>
		<lastmod>2022-02-15T07:24:42+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/An-insight-into-cybersecurity-and-the-key-threats-cover-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/An-insight-into-cybersecurity-and-the-key-threats-webinar-social-media-image-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-buffer-overflow/</loc>
		<lastmod>2022-02-20T14:03:27+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-4-9.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/voip-provider-telnyx-targeted-with-ddos-attacks/</loc>
		<lastmod>2022-02-22T12:13:47+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_7_8196114133.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/voip-ms-ransom-note.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/expeditors-international-impacted-by-cyberattack/</loc>
		<lastmod>2022-02-22T12:21:15+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Expeditors-International-Became-Victim-of-a-Cyberattack-post.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/bandwidth-com-became-the-victim-of-ddos-attacks/</loc>
		<lastmod>2022-02-22T12:55:44+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/VoIP-DDoS-Attack.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/meris-botnet-breaks-ddos-record/</loc>
		<lastmod>2022-02-22T13:12:07+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Meris-Botnet.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/eu-to-send-a-newly-created-cyber-rapid-response-team-crrt-to-ukraine/</loc>
		<lastmod>2022-02-24T12:22:09+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-87.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/toyota-was-hit-by-cyberattack/</loc>
		<lastmod>2022-03-01T15:13:12+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-94.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/nvidia-data-breach-confirmed-by-the-company/</loc>
		<lastmod>2022-03-02T11:41:53+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/NVIDIA-data-breach-cover-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/nvidia-telegram.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/teabot-trojan-resurfaces-into-google-play-store/</loc>
		<lastmod>2022-03-02T12:38:25+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-12-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/qr-code-app1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/process1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/permissions1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/TeaBot.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/conti-affiliate-leaks-the-attack-playbook-of-the-ransomware-gang/</loc>
		<lastmod>2022-03-03T12:17:26+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Conti-Ransomware-Playbook-Leaked-Cover.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/forum-post-3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/german-fuel-supplier-oiltanking-hit-with-cyberattack/</loc>
		<lastmod>2022-03-03T12:57:48+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_4_7625182340.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/diavol-ransomware-appears-to-have-connections-with-trickbot/</loc>
		<lastmod>2022-03-03T13:02:02+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_6932322938.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/list-of-ips-and-domains-targeting-the-russian-infrastructure-with-ddos-was-made-public-by-the-govt/</loc>
		<lastmod>2022-03-04T14:01:27+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_2_2038966313.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/71000-employees-credentials-exposed-as-a-result-of-the-recent-nvidia-data-breach/</loc>
		<lastmod>2022-03-04T14:38:46+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/NVIDIA-data-breach-Have-I-Been-Pwned-update-cover-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/have-I-been-pwned-Nvidia-data-breach.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/start-using-two-factor-authentication/</loc>
		<lastmod>2022-03-04T15:49:36+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hs-Everything-you-need-to-know-about-Two-Factor_46BE74.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/onlyfans-twitter-users-banned-for-leaking-bdsm-video-of-city-council-candidate/</loc>
		<lastmod>2022-03-07T09:22:37+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_12_9220701130.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/hundreds-of-onlyfans-creators-had-their-adult-content-published-online/</loc>
		<lastmod>2022-03-07T09:23:58+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Security-News-and-Updates-1030x360-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/forum-post.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/owned-by.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/onlyfans-lookup.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/important-news-websites-host-hardcore-porn-after-vidme-domain-purchase/</loc>
		<lastmod>2022-03-07T09:25:51+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_3_2514878997.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/vidme-farewell.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/vidme-example.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/vidme-iframe.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/190gb-of-samsung-data-leaked/</loc>
		<lastmod>2022-03-08T15:26:02+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-100.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/zero-click-flaws-discovered-in-ups-devices/</loc>
		<lastmod>2022-03-09T13:29:04+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_3032827764.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/spoofing/</loc>
		<lastmod>2022-03-11T08:49:29+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_2956247368.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Injects-fake-DNS-entry-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-64-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/ransomware-attack-suffered-by-finalsite-shuts-down-thousands-of-websites/</loc>
		<lastmod>2022-03-11T11:00:44+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-40-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/kaseya-patches-the-vulnerabilities-used-in-revil-ransomware-attack/</loc>
		<lastmod>2022-03-11T11:06:31+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Kaseya-Patch-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/ukraines-it-army-targeted-by-disguised-malware/</loc>
		<lastmod>2022-03-11T11:58:10+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_9897765890.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/bazarbackdoor-malware-distributed-via-corporate-website-contact-forms/</loc>
		<lastmod>2022-03-11T15:03:13+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/BazarBackdoor-cover-picture.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/ubisoft-was-the-victim-of-a-cyber-security-incident/</loc>
		<lastmod>2022-03-14T10:48:17+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Ubisoft-hack.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/bogus-valorant-cheat-lures-on-youtube-infect-users-with-redline-stealer-malware/</loc>
		<lastmod>2022-03-14T10:54:50+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-8-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Add-a-subheading-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/proxy-vs-vpn/</loc>
		<lastmod>2022-03-15T12:28:02+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/proxy-vs-vpn-image-for-blog.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/proxy-vs-vpn-proxy.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/proxy-vs-vpn-how-vpn-works.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cobalt-strike-deployed-in-ukraine-through-fake-av-updates/</loc>
		<lastmod>2022-03-15T12:39:39+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-11-9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-18-15.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-8-9.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/solarwinds-issues-warning-on-possible-web-help-desk-instances-attacks/</loc>
		<lastmod>2022-03-17T11:37:55+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-03-17T131433.927.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/wordpress-plugin-vulnerabilities-affect-over-1-million-websites/</loc>
		<lastmod>2022-03-18T17:13:02+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_4_6100458948.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/plugin.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/patch-asset-management-for-linux/</loc>
		<lastmod>2022-03-18T17:38:36+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Vladimir-Patch-Management-1030x360.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-seo-poisoning-is-wreaking-havoc-on-the-cyberthreat-landscape-dropping-batloader-and-atera-agent/</loc>
		<lastmod>2022-03-23T17:43:17+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/SEO-poisoning-campaign-cover-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/attack-chain.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-ceeloader-malware-used/</loc>
		<lastmod>2022-03-23T22:11:55+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/New-Ceeloader-Malware-Used-By-Russian-backed-Advanced-Persistent-Threat-APT-Organization-Nobelium.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/masterfred-malware-netflix-instagram-twitter-users/</loc>
		<lastmod>2022-03-23T22:13:43+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MasterFred-malware-cover-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MasterFred-avast-thread.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Alberto-Segura-Tweet-on-MasterFred-malware.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/megacortex-ransomware/</loc>
		<lastmod>2022-03-23T22:40:30+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Alina-Mega-cortex1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/ransom-note-r.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/microsoft-source-code-allegedly-leaked/</loc>
		<lastmod>2022-03-24T08:28:55+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-03-22T153426.974.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/russian-cybercrime-market-owner-added-to-fbis-most-wanted-list/</loc>
		<lastmod>2022-03-24T12:13:53+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Yoragraph-text-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/isps-and-diplomats-targeted-in-a-new-mustang-panda-hacking-campaign/</loc>
		<lastmod>2022-03-24T12:27:33+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Mustang-Panda-Hacking-Campaign-cover-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Figure-2.-Overview-of-the-deployment-process-for-the-Hodur-Korplug-variant.-768x1200.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/impacted-countries-mustang-panda-hacking-campaign.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-malware-as-a-service-maas/</loc>
		<lastmod>2022-03-24T15:13:45+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-03-22T104603.916.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MaaS-Ecosystem.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/london-classified-ads-site-gumtree-experiences-data-breach-due-to-f12-key/</loc>
		<lastmod>2022-03-25T13:57:28+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_8_9920483277.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/leaked_data.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/volvo-cars-data-breach-results-in-theft-of-r-and-d-data/</loc>
		<lastmod>2022-03-25T13:58:19+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Volvo-Cars-Data-Breach-Cover-image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/planned-parenthood-la-data-breach-due-to-ransomware-attack/</loc>
		<lastmod>2022-03-25T13:59:03+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Planned-Parenthood-LA-data-breach-cover-image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/a-honda-vulnerability-allows-hackers-to-use-a-replay-attack/</loc>
		<lastmod>2022-03-25T14:01:06+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_9588106850.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/social-engineering-attacks-target-morgan-stanley-client-accounts/</loc>
		<lastmod>2022-03-25T14:54:59+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Morgan-Stanley-Client-Accounts-compromised-in-vishing-cyberattack.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-korplug-variant-discovered/</loc>
		<lastmod>2022-03-28T11:27:07+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hodur.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/threat-actors-hijack-email-reply-chains-on-vulnerable-exchange-servers-to-deliver-icedid-malware/</loc>
		<lastmod>2022-03-29T10:48:44+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_9414907003.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/email-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/shutterfly-hit-by-data-breach/</loc>
		<lastmod>2022-03-30T10:47:00+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_3953960623.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/mars-stealer-a-new-popular-malware-on-the-cyberthreat-landscape/</loc>
		<lastmod>2022-03-30T11:04:18+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Mars-Stealer-cover-image-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/open-office-search-results-malicious-ads.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/directory-storing-stolen-data-morphisec-report.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/medtronic-cybersecurity-risks-some-devices-should-be-returned-to-vendor/</loc>
		<lastmod>2022-03-30T21:46:49+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Medtronic-cybersecurity-risks-cover-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Medtronic-Cybersecurity-Risks-controllers-models.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/a-step-by-step-guide-to-cybersecurity-risk-assessment/</loc>
		<lastmod>2022-03-30T21:47:28+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/A-Step-by-Step-Guide-to-Cybersecurity-Risk-Assessment-Cover-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/A-Step-by-Step-Guide-to-Cybersecurity-Risk-Assessment-graphic-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/it-and-software-consultancy-company-globant-got-hacked/</loc>
		<lastmod>2022-03-31T09:41:06+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-03-31T115717.746.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/the-national-emergency-in-the-united-states-has-been-prolonged/</loc>
		<lastmod>2022-03-31T13:48:53+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-03-31T161655.804.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/deep-panda-hacking-group-is-targeting-vmware-horizon-servers/</loc>
		<lastmod>2022-04-01T10:34:48+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-04-01T124424.563.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/blackguard-a-new-info-stealer-for-sale-on-russian-hacking-forums/</loc>
		<lastmod>2022-04-01T12:56:34+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/BlackGuard-Malware-cover-image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/a-fake-data-breach-used-emails-to-steal-cryptocurrency-wallets/</loc>
		<lastmod>2022-04-04T11:40:45+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_7917017604.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/info-stealing-malware-pushed-through-whatsapp-messages/</loc>
		<lastmod>2022-04-05T10:33:38+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_5415942198.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/vlc-media-player-leveraged-by-hackers-to-distribute-malware-loader/</loc>
		<lastmod>2022-04-06T10:26:13+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/VLC-media-player-used-in-malicious-campaign-cover-image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cashapp-customers-affected-by-data-breach/</loc>
		<lastmod>2022-04-06T11:05:04+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/CashAPP.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/russian-darknet-marketplace-hydra-shutdown-by-the-us-doj/</loc>
		<lastmod>2022-04-06T11:07:16+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-8-13.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/a-member-of-the-fin7-hacking-gang-was-sentenced-to-five-years-in-jail/</loc>
		<lastmod>2022-04-08T11:27:26+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_3829487500.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-malware-leveraged-cryptominers-to-target-aws-lambda/</loc>
		<lastmod>2022-04-08T13:51:04+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Denonia-Malware-targets-Aws-Lambda-cover-image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/apt-c-23-hacking-group-target-israeli-officials-in-catfish-campaign/</loc>
		<lastmod>2022-04-08T14:06:36+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_2_2363196147.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/fake-persona.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/the-complete-guide-to-desktop-virtualization-and-its-importance/</loc>
		<lastmod>2022-04-08T14:16:55+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_4_8203917725.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/octo-android-malware-can-take-over-your-device/</loc>
		<lastmod>2022-04-11T12:00:31+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-15-13.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/octo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/skinnyboy-malware-is-used-by-russian-hackers-to-breach-sensitive-organisations/</loc>
		<lastmod>2022-04-12T07:29:24+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Security-News-and-Updates-1030x360-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/SkinnyBoy01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/SkinnyBoy_connectivity.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/spring4shell-vulnerability-exploited-to-distribute-mirai-malware/</loc>
		<lastmod>2022-04-12T11:51:45+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Spring4Shell-Vulnerability-cover-image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/millions-of-endpoints-affected-by-critical-hp-teradici-pcoip-vulnerabilities/</loc>
		<lastmod>2022-04-13T10:25:36+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-19-12.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/hacking-forum-raidforums-shut-down/</loc>
		<lastmod>2022-04-13T11:22:40+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-04-13T140900.981.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/RaidForums.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/hacking-group-modifiedelephant-has-been-living-out-of-sight-for-years/</loc>
		<lastmod>2022-04-13T14:46:55+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/ModifiedElephant-cover-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/email2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-fodcha-ddos-malware-targets-more-than-100-victims-daily/</loc>
		<lastmod>2022-04-14T10:47:53+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-21-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/fodcha.online.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/devices-and-services-targeted-by-the-Fodcha-botnet.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/aethon-tug-robots-have-been-found-to-have-critical-vulnerabilities/</loc>
		<lastmod>2022-04-14T11:26:45+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Jekyllbot5-vulnerabilities-cover-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/what-can-hackers-do-if-exploiting-the-5-vulnerabilities.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/industrial-spy-a-new-stolen-data-market-is-advertised-via-adware-and-cracks/</loc>
		<lastmod>2022-04-18T10:49:56+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_8500594170.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Premium-stolen-data-category-solt-by-industrial-spy.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/lazarus-hackers-make-use-of-fraudulent-crypto-apps-us-warns/</loc>
		<lastmod>2022-04-19T10:22:57+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Lazarus-hackers-leverage-malicious-crypto-apps-cover-picture.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cybersecurity-businesses-tackling-the-war-in-ukraine/</loc>
		<lastmod>2022-04-26T11:32:42+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_7845795168.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Cybernews-quote.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cyber-reporting-new-legislation-impacts-us-banks/</loc>
		<lastmod>2022-04-29T06:47:41+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_3_7056766152.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_3_3860461975-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/medical-software-company-fined-e1-5m-for-exposing-490k-patients-data/</loc>
		<lastmod>2022-04-29T11:05:02+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-04-29T132621.595.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/transport-for-nsw-suffered-a-cyber-incident/</loc>
		<lastmod>2022-05-04T12:52:39+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-05-04T140444.688.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-rat-dubbed-borat-emerging-on-the-cyberthreat-landscape/</loc>
		<lastmod>2022-05-05T13:10:39+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Borat-cover-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Borat-features.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/dont-underestimate-the-dcrat-malware/</loc>
		<lastmod>2022-05-10T11:34:01+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-17-14.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/a-complete-guide-to-desktop-as-a-service-daas/</loc>
		<lastmod>2022-05-11T10:15:47+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/DaaS-a-complete-guide-cover.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/DaaS-Desktop-as-a-Service.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/south-asian-governments-targeted-by-bitter-apt-group/</loc>
		<lastmod>2022-05-12T11:53:56+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Bitter-APT-Group-targets-South-Asian-govts.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/malicious-RTF-infection-chain-TALOS.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/wordpress-websites-files-and-databases-injected-with-malicious-javascript/</loc>
		<lastmod>2022-05-13T10:41:30+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-05-13T130210.106.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/nerbian-rat-malware-new-threat-on-the-market/</loc>
		<lastmod>2022-05-13T10:42:13+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_7051173791.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/The-emails-sent-to-the-victims-are-allegedly-coming-from-the-World-Health-Organization-WHO-with-important-information-concerning-COVID-19..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/bpfdoor-has-the-capacity-to-bypass-firewalls/</loc>
		<lastmod>2022-05-13T11:22:14+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/BPFdoor-cover-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/BFPdoor-process.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/BPFdoor-technical-details.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cybercriminals-launch-a-new-malware-as-a-service-the-eternity-project/</loc>
		<lastmod>2022-05-13T12:05:54+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-21-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/The-Eternity-Project-site.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/malicious-php-code-used-to-steal-banking-information-fbi-said/</loc>
		<lastmod>2022-05-18T09:57:09+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-27-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/millions-of-cyberattacks-are-targeting-tatsu-wordpress-plugin/</loc>
		<lastmod>2022-05-18T11:24:28+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Tatsu.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/best-twitter-cybersec-accounts/</loc>
		<lastmod>2022-05-20T14:03:01+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hs-These-are-the-best-Twitter-cybersecurity-accounts-ou_2B68A0.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/swift-on-security.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/hackers-are-targeting-healthcare-industry/</loc>
		<lastmod>2022-05-23T09:45:06+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-04-28T150317.458.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/tenet.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/deep-fakes-of-elon-musk-promote-bitvex-fraud/</loc>
		<lastmod>2022-05-23T14:29:17+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-05-23T172006.372.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/BitVex.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/gm-credential-stuffing-attack-reveals-automobile-owners-details/</loc>
		<lastmod>2022-05-24T09:46:56+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-05-24T121908.289.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/this-malware-spreading-pdf-uses-a-clever-file-name-to-fool-the-unsuspecting-victims/</loc>
		<lastmod>2022-05-24T09:47:19+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_3299170831.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/supply-chain-risk-management-scrm-explained/</loc>
		<lastmod>2022-05-25T15:02:38+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_2_2238427064.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Identify.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/industrial-spy-is-now-targeting-corporate-websites-to-display-ransom-notes/</loc>
		<lastmod>2022-06-03T11:32:39+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-40-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Example-Industrial-Spy-ransom-note.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/industrial-spy.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/60gb-of-user-data-was-exposed-by-australian-trading-company-acy-securities/</loc>
		<lastmod>2022-06-06T11:00:38+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-42-6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/business-email-security/</loc>
		<lastmod>2022-06-06T14:47:45+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/vendor-email-compromise-vec/</loc>
		<lastmod>2022-06-06T14:49:04+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Bianca-email-Vendor1030x360.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/nerbianrat-trojan-spreads-via-emails/</loc>
		<lastmod>2022-06-06T14:51:09+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/NerbianRAT-malware-cover-image-for-Heimdal-news.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Screen-Shot-2022-05-10-at-8.58.09-AM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Screen-Shot-2022-05-10-at-8.58.20-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-dmarc/</loc>
		<lastmod>2022-06-06T14:57:36+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-5-10.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/duckduckgo-launches-a-new-email-privacy-service/</loc>
		<lastmod>2022-06-06T15:00:49+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/DuckDuckGo-Email-Privacy-Service.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/lenovo-laptops-vulnerable-to-privilege-escalation-exploit/</loc>
		<lastmod>2022-06-07T09:50:52+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_10_8553512906.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/loading_plugin.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/account-takeover-ato/</loc>
		<lastmod>2022-06-07T11:29:20+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Alina-Account-Takeover-Fraud-1030x360.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/16-years-old-vulnerability-hp-samsung-xerox/</loc>
		<lastmod>2022-06-07T11:51:56+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_3_3963151050.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/today-21-7.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cybersecurity-essentials-for-schools/</loc>
		<lastmod>2022-06-07T13:24:31+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Alina-ED-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/k12-stats-piechart-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/k12-stats-piechart-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/zegna-confirmed-ransomware-attack/</loc>
		<lastmod>2022-06-07T13:34:17+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Zegna.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/qbot-now-attacks-using-black-basta-ransomware/</loc>
		<lastmod>2022-06-07T13:35:23+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/qbot-blackmamba.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/a-new-ransomware-variant-dubbed-cheers-was-discovered/</loc>
		<lastmod>2022-06-07T13:36:29+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Cheers-Ransomware.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/500000-chicago-students-data-exposed-in-ransomware-attack/</loc>
		<lastmod>2022-06-07T13:40:53+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-05-23T133929.412.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/ransomware-hits-media-giant-nikkeis-asian-unit/</loc>
		<lastmod>2022-06-07T13:41:35+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Nikkei-Impacted-by-Ransomware-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/thanos-ransomware-builder-was-designed-by-a-physician/</loc>
		<lastmod>2022-06-07T13:43:47+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-05-17T142856.157.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/ZAGALA-THANOS-FORUM-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/nordex-hit-by-conti-ransomware/</loc>
		<lastmod>2022-06-07T13:55:11+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_8936568623.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/contis-leaked-ransomware-used-to-target-russian-businesses/</loc>
		<lastmod>2022-06-07T13:55:55+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-04-11T132108.874.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/VGTRK-hack.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/suncrypt-ransomware-still-alive-in-2022/</loc>
		<lastmod>2022-06-07T13:58:49+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-03-29T133717.908.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/ragnar-locker-ransomware-breached-52-us-critical-infrastructure-organizations/</loc>
		<lastmod>2022-06-07T14:33:34+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_7_7143106362.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/hive-ransomware-gang-impacts-rompetrol-gas-station-network/</loc>
		<lastmod>2022-06-07T14:34:25+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_8302761678.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/rompetrol-announcement.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/picture-2.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hive-ransomware-ransom-demand.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/conti-ransomwares-source-code-is-now-public/</loc>
		<lastmod>2022-06-07T14:34:56+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Conti-Source-Code-leak.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cuba-ransomware-hacked-microsoft-exchange-servers/</loc>
		<lastmod>2022-06-07T14:36:29+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-91.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/japanese-sports-equipment-and-sportswear-company-mizuno-fell-victim-to-a-ransomware-attack/</loc>
		<lastmod>2022-06-07T14:38:04+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_3_3454073486.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/mizuno-website.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/puma-suffers-data-breach-due-to-kronos-ransomware-attack/</loc>
		<lastmod>2022-06-07T14:38:33+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_16_4583448035.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/alphv-ransomware-connected-to-blackmatter-and-darkside/</loc>
		<lastmod>2022-06-07T14:39:16+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-82.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/ransomware-gangs-rethink-their-strategies/</loc>
		<lastmod>2022-06-07T14:40:30+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-7-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/payment1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/size1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/ransomware-gangs.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/ransomware-attack-against-kp-snacks/</loc>
		<lastmod>2022-06-07T14:42:01+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_5_8648536167.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/qnap-force-installs-update-after-ransomware-attack/</loc>
		<lastmod>2022-06-07T14:42:35+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-71.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/conti-ransomware-targets-taiwanese-apple-and-tesla-contractor-delta-electronics/</loc>
		<lastmod>2022-06-07T14:42:59+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Delta-Electronics-Hit-by-cyberattack-cover-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Delta_Conti_ransom_note.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/delta-electronics-website-down.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/luxury-fashion-brand-moncler-suffers-data-breach-following-a-ransomware-attack/</loc>
		<lastmod>2022-06-07T14:51:47+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_8_5622059231.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/moncler-data-leak-page.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/qlocker-ransomware-is-apparently-back-in-business/</loc>
		<lastmod>2022-06-07T14:53:37+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-52-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/alphv-blackcat-a-new-ransomware/</loc>
		<lastmod>2022-06-07T14:56:55+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Blackcat-Ransomware-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/free-decrypters-available-now-for-atomsilo-babuk-and-lockfile-ransomware/</loc>
		<lastmod>2022-06-07T15:06:56+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/free-decrypters-cover-picture-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Avast_Atom_Silo_decryptor.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/free-decrypters.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/blackmatter-ransomware-victims-helped-with-a-secret-decryptor/</loc>
		<lastmod>2022-06-07T15:08:13+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/BlackMatter-ransomware-victims-helped-with-a-secret-decryptor.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/good-news-a-free-decryptor-for-blackbyte-ransomware-has-just-been-released/</loc>
		<lastmod>2022-06-07T15:10:22+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_11_7266323176.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/blackbyte-ransom-note.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/blackbyte-blog.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/how-to-stay-safe-from-blackmatter-ransomware-attacks/</loc>
		<lastmod>2022-06-07T15:12:10+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Blackmatter-ransomware-advisory.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/deepbluemagic-new-ransomware-discovered/</loc>
		<lastmod>2022-06-07T15:18:49+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-18-5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/kia-ransomware-101/</loc>
		<lastmod>2022-06-07T15:24:09+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-27-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/maintenance-message.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/mobile-app-outages.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/kia-ransom-note-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/crylock-ransomware/</loc>
		<lastmod>2022-06-07T15:24:40+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-24-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/CryLock-ransomware.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/dharma-ransomware-origins-m-o-and-how-to-remove-it/</loc>
		<lastmod>2022-06-07T15:25:14+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-31.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Dharma-Ransomware-ranom-note.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/blackbaud-ransomware-attack-101/</loc>
		<lastmod>2022-06-08T07:02:38+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-21-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/samsam-ransomware/</loc>
		<lastmod>2022-06-08T07:05:51+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Alina-SamSam-Rnasomware-1030x360.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/epiq-ransomware/</loc>
		<lastmod>2022-06-08T07:35:46+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Elena-Ryuk-blog.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/source-spanning.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/kolz-ransomware/</loc>
		<lastmod>2022-06-08T07:57:18+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Alina-Kolz-Ransomware-101-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/KOLZ-ransomware.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/contis-bazarloader-replaced-with-bumblebee-malware/</loc>
		<lastmod>2022-06-08T12:01:43+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Bumblebee-malware-cover-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/image-20220427171512-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/rrd-suffered-a-data-theft-in-a-conti-ransomware-attack/</loc>
		<lastmod>2022-06-08T12:05:46+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-59-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/ctb-locker-ransomware/</loc>
		<lastmod>2022-06-08T14:42:18+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hs-CTB_000912.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2015/01/unnamed.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2015/01/CTB-locker.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/gss-ransomware-attack-affecting-major-european-call-center-provider/</loc>
		<lastmod>2022-06-08T14:44:47+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/GGS-ransomware-attack-cover-picture.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/GSS-ransomware-attack.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/conti-ransomware-is-now-using-proxyshell-exploits-to-compromise-exchange-servers/</loc>
		<lastmod>2022-06-08T14:46:33+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_4_2054726241.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/sophos-conti-tools.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/conti-ransomware-releases-decryptor-for-irelands-hse/</loc>
		<lastmod>2022-06-08T14:49:52+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-23-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/clop-ransomwares-members-arrested-in-operation-cyclone/</loc>
		<lastmod>2022-06-08T14:55:22+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Clop-Ransomware-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/binance-helps-take-down-multiple-clop-ransomware-gang-members/</loc>
		<lastmod>2022-06-08T14:55:58+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_5687861766.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/22134e49-3edf-400d-8446-39fe96d17bcd.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/over-500-domains-were-used-in-phishing-operation-to-steal-credentials/</loc>
		<lastmod>2022-06-08T19:14:47+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_6371054557.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-6-8.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-runescape-phishing-scam-aimed-at-stealing-accounts-and-in-game-item-bank-pins/</loc>
		<lastmod>2022-06-08T19:15:22+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/RuneScape-phishing-cover.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/phishing-threat-actors-still-fond-of-html-attachments/</loc>
		<lastmod>2022-06-08T19:15:40+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_3108752435.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/HTML-phishing-attachment-impersonating-a-Microsoft-login.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-phishing-toolset-allows-for-browser-in-the-browser-bitb-attacks/</loc>
		<lastmod>2022-06-08T19:17:36+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Bitb.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-phishing-method-discovered/</loc>
		<lastmod>2022-06-08T19:22:41+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/new-phishing-method-is-able-to-bypass-MFA-.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/1-7-million-stolen-in-opensea-phishing-attack/</loc>
		<lastmod>2022-06-08T19:22:55+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/OpenSea-Hack.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/OpenSea-phishing-email-Heimdal-Security.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Nadav-Hollander-on-Twitter.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/medusa-malware-increases-the-number-of-android-sms-phishing-cyberattacks-phishing-campaign/</loc>
		<lastmod>2022-06-08T19:23:18+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/medusa-malware-cover-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/medusa-malware-actions.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/backend.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/spider-man-fans-watch-out-you-might-become-the-next-victim-in-a-new-phishing-campaign/</loc>
		<lastmod>2022-06-08T19:24:54+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_13_9465208443.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/phishing-study-shows-who-is-more-prone-to-fall-victim-to-phishing-attacks/</loc>
		<lastmod>2022-06-08T19:26:17+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/phishing-study-cover-image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/whaling-phishing-attack/</loc>
		<lastmod>2022-06-09T10:51:05+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Elena-What-is-Whaling-1030x360.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/agent-tesla-spyware-used-in-phishing-campaign/</loc>
		<lastmod>2022-06-09T10:52:49+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_3_3699647215.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/hackers-use-qr-codes-to-steal-banking-credentials-in-recent-phishing-attempts/</loc>
		<lastmod>2022-06-09T10:53:32+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_5_4311404378.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/email2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/redirection.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/qr_code_1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/glitch-platform-abused-by-phishing-threat-actors/</loc>
		<lastmod>2022-06-09T10:54:47+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Glitch-platform-abused-by-hackers-cover-picture.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Glitch-lists-of-sites-where-PDFs-point-to.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/mirrorblast-the-new-phishing-campaign-targeting-financial-organizations/</loc>
		<lastmod>2022-06-09T10:55:49+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MirrorBlast-phishing-campaign-cover-.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/mirrorblast-diagram.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-docusign-phishing-campaign/</loc>
		<lastmod>2022-06-09T10:56:11+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/DocuSign-New-Phishing-Campaign.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/14000-gmail-users-warned-by-google-of-phishing-campaign/</loc>
		<lastmod>2022-06-09T10:56:46+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_9141599131.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/GovHackAlert.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-emotet-variant-scrapes-google-chrome-credit-card-info/</loc>
		<lastmod>2022-06-09T11:11:22+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Emotet.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/millions-of-users-have-been-enticed-to-phishing-pages-in-massive-campaign-exploiting-facebook-messenger/</loc>
		<lastmod>2022-06-09T11:46:33+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_2828688957.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/One-of-the-ads-showed-to-phished-users.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Website-belonging-to-the-campaign-operator.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/medical-records-of-12000-revere-health-patients-exposed/</loc>
		<lastmod>2022-06-09T12:09:08+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_2_8728085086.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-1-1-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/ups-phishing-campaign/</loc>
		<lastmod>2022-06-09T12:10:33+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_3_9725355409.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/phishing-email.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/UPS-phishing-campaign.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/UPS-phishing-campaign-string-one.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/UPS-phishing-campaign-string-two.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/UPS-phishing-campaign-message.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/threat-actors-use-wetransfer-to-perform-phishing-attacks-and-steal-credentials/</loc>
		<lastmod>2022-06-09T12:12:37+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_9_8800964465.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/wetransfer-phishing-email.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-phishing-attack-uses-compromised-sharepoint-website-as-a-lure/</loc>
		<lastmod>2022-06-09T12:12:55+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/New-Phishing-Attack-Cover.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/E7k7MZKUcAIeN3s.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/E7k7QrgVcAAODJp.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cybercriminals-use-chipotle-marketing-account-for-phishing-attacks/</loc>
		<lastmod>2022-06-09T12:13:12+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_6853745814.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Chipotle-phishing-campaign.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/unc-patch-injection-issue/</loc>
		<lastmod>2022-06-09T13:18:05+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Vladimir-Zoom-1030x360.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/linkedin-onedrive-phishing-campaign/</loc>
		<lastmod>2022-06-09T13:20:35+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Vladimir-Linkedin-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/1-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Annotation-2020-03-06-135315.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Annotation-2020-03-10-144224.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/security-alert-norwegian-campaign-of-scam-phone-calls/</loc>
		<lastmod>2022-06-09T13:22:57+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Miriam-Security-Alert-1030x360.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/convert-youtube-videos-to-mp3/</loc>
		<lastmod>2022-06-09T13:25:16+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Vladimir-Youtube-1030x360.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/scam-alert-digi-phishing-campaign-detected-asking-credentials-for-a-prize/</loc>
		<lastmod>2022-06-09T13:26:17+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Miriam-Digi-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/0_google_serp-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/1-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/3-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/4-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/5-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/heimdal-linkedin-giveaway-10k/</loc>
		<lastmod>2022-06-09T13:29:35+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/banner-blog.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/amazon-provides-ring-doorbell-encryption/</loc>
		<lastmod>2022-06-10T08:33:51+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Copy-of-Untitled-50.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/doorbell-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/how-to-send-encrypted-email/</loc>
		<lastmod>2022-06-10T10:51:34+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/141672251_787124572151321_150356950961592093_n.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-social-engineering/</loc>
		<lastmod>2022-06-10T11:07:30+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Miriam-Social-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/System-users-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/data-loss-prevention-dlp/</loc>
		<lastmod>2022-06-10T20:05:35+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Alina-DLP-Security-1030x360.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/an-in-depth-look-at-software-defined-perimeters/</loc>
		<lastmod>2022-06-14T10:13:03+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/An-In-Depth-Look-at-Software-Defined-Perimeters-and-How-They-Are-Helping-Businesses.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-data-leakage/</loc>
		<lastmod>2022-06-14T11:12:57+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Alina-Data-Leakage-Prevention-1030x360.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-virtual-network-computing-vnc/</loc>
		<lastmod>2022-06-14T13:52:50+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/VNC.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/insider-threat/</loc>
		<lastmod>2022-06-14T13:58:24+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hs-Most-companies-protect-themselves-from-outside-cybersec_4F7075.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/insider-threat.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Source_-Ponemon-Institute-2020-Cost-of-Insider-Threats-Report.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/secure-video-conferencing-101/</loc>
		<lastmod>2022-06-14T15:12:26+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Elena-Secure-Video-Conferencing-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/microsoft.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/google.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/zoom.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/go-to-meeting-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/lifesize-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/over-2-million-people-have-downloaded-android-malware-from-the-google-play-store/</loc>
		<lastmod>2022-06-15T11:44:47+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-49-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Three-malicious-applications-still-available-on-the-Google-Play-Store.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-ping-of-death/</loc>
		<lastmod>2022-06-17T09:35:09+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Ping-of-Death-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/russian-hackers-danish-reseller-attack/</loc>
		<lastmod>2022-06-17T09:43:51+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Vladimir-Muscovite-Hacking-Group-2-1030x360.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/robbinhood-ransomware/</loc>
		<lastmod>2022-06-17T09:45:39+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Vladimir-Robin-Hood-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/1-3.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2-3.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Vladimir-schema-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/is-bitcoin-safe/</loc>
		<lastmod>2022-06-17T09:48:20+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Vladimir-Cryptocurrency-1030x360.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/firewall-enterprise-security/</loc>
		<lastmod>2022-06-17T09:50:35+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Vladimir-Firewall-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/February.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/marchjpg.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/March-April.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-malibot-android-malware-mines-cryptocurrency/</loc>
		<lastmod>2022-06-17T11:20:48+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-06-17T140433.882.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/zoom-video-phishing/</loc>
		<lastmod>2022-06-17T13:10:30+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Vladimir-Zoom-21030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-Vladimir-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-Vladimir-2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-8-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/malicious-chrome-extension/</loc>
		<lastmod>2022-06-17T13:16:28+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Elena-Malicious-Chrome-Extensions-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Nexus_007.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/StatCounter-browser-ww-monthly-201912-202012.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/awake-malicious-chrome-extensions.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/is-credit-karma-safe/</loc>
		<lastmod>2022-06-17T13:22:51+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Vladimir-Karma-Credit-1030x360.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/crypto-virus/</loc>
		<lastmod>2022-06-17T13:27:05+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Elena-Crypto-Virus-vs-Ransomware-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/symmetric-key-encryption.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/assymetric-or-public-key-encryption.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/cryptolocker-ransom-message.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/is-aliexpress-safe/</loc>
		<lastmod>2022-06-17T13:29:04+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Elena-Aliexpres-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/screen_rating.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Public-Wi-Fi-sniffer-attack-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/is-uber-safe/</loc>
		<lastmod>2022-06-17T13:32:14+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Vladimir-Uber-1030x360.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/web-application-security/</loc>
		<lastmod>2022-06-17T13:46:04+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/blogElena-Web-Application-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/the_anatomy_of_a_web_application_jason_stonebraker_2011.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/threats.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/advice.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/replacement-for-vpn/</loc>
		<lastmod>2022-06-17T14:15:39+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Vladimir-VPN-1030x360.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/security-alert-flawed-ammyy-rat/</loc>
		<lastmod>2022-06-17T14:24:09+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Spam-campign-using-excel-web-query-file-to-spread-malware.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/VirusTotal-Detection-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/security-alert-attack-wpa-protocols/</loc>
		<lastmod>2022-06-17T14:26:01+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/How-cybercriminals-try-to-crack-the-WPA-PSK-passwords.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/feature-bug-security-risk-skype-for-business/</loc>
		<lastmod>2022-06-17T14:26:52+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/skype-for-business-screen-sharing-error.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/what-i-could-see-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/SfB-share-screen-issue.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/what-i-could-see-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/award-Blog_Banner@100x-100.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/mass-credit-card-stealing-campaign-online-shops/</loc>
		<lastmod>2022-06-17T14:27:32+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Miriam-Card-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/js-1-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/pos-systems-vulnerabilities/</loc>
		<lastmod>2022-06-17T14:28:09+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Bianca-Guest-Post-POS-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/images-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/sweden-data-leak-browsing-history-spyware/</loc>
		<lastmod>2022-06-17T14:39:36+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Bianca-Data-Leak-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/nacho-analytics-data-leak-september-2019.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/gdpr-after-brexit-no-deal-all-scenarios/</loc>
		<lastmod>2022-06-17T14:42:12+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Miriam-Brexit-1030x360.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/software-rot/</loc>
		<lastmod>2022-06-17T14:50:46+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Elena-Software-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/outdated-software-software-rot.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/how-to-hide-a-folder-windows-10/</loc>
		<lastmod>2022-06-17T14:58:47+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Vladimir-Secure-Folder-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/LastKey-Path.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/disk-management.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/data-protection-sell-your-phone/</loc>
		<lastmod>2022-06-17T15:00:32+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Vladimir-Data-1030x360.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-safe-mode-on-my-phone/</loc>
		<lastmod>2022-06-17T15:02:49+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Vladimir-Safe-Mode-1030x360.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/blood-work-results-sensitive-information/</loc>
		<lastmod>2022-06-17T15:04:59+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Miriam-GDPR-1030x360-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Unavngivet.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/home-security-cameras-safety/</loc>
		<lastmod>2022-06-17T18:49:22+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Vladimir-Security-Cameras-1030x360.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/data-security-with-business-process-outsourcing/</loc>
		<lastmod>2022-06-17T19:50:09+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Binaca-Data-Security-with-Business-Process-Outsourcing-2-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Body-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Body-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Derek-Gallimore.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-legacy-software-system-risks/</loc>
		<lastmod>2022-06-17T19:54:20+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Miriam-Legacy-System-1030x360.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/a-zero-click-vulnerability-is-exploited-by-nso-spyware/</loc>
		<lastmod>2022-06-20T11:50:42+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_2_3924250609.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/how-to-stay-anonymous-online/</loc>
		<lastmod>2022-06-20T12:08:51+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Miriam-Digital-Anonymity-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/cover.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/info-about-cookies.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/pew-research.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2nd-graph.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/is-signal-secure/</loc>
		<lastmod>2022-06-20T12:09:26+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Alina-Messaging-App-1030x360.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/is-telegram-secure/</loc>
		<lastmod>2022-06-20T12:10:52+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Alina-Telegram-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/mtproto_partone.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/mtproto_parttwo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/can-a-smart-tv-get-a-virus/</loc>
		<lastmod>2022-06-20T12:16:34+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Vladimir-TVs1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/samsung-tv-scan-smart-virus-1200x630.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/samsung-smart-tv-virus-2-1280x720.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/virus-tv.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/vlc-flaw-remote-code-execution/</loc>
		<lastmod>2022-06-20T12:19:13+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/VLC-Flaw-1030x360.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/vr-ar-security-privacy-risks/</loc>
		<lastmod>2022-06-20T12:22:05+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/VR-Bianca-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Sensorama.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Sutherland.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/NASA.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/VR-porn-keyword.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/travel-safety-tips-digital-online-offline-security/</loc>
		<lastmod>2022-06-20T12:23:32+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Miriam-Travel-1030x360.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cybersecurity-drones/</loc>
		<lastmod>2022-06-20T12:24:15+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Bianca-Drones-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/geofences.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/radar.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/acoustic-sensors.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/RF-scanners.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/thermal-imaging.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/is-adobe-flash-player-safe/</loc>
		<lastmod>2022-06-20T12:27:08+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Vladimir-Adobe-698-x-400-Blog.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/facial-recognition-software-debates-how-to-elude-it/</loc>
		<lastmod>2022-06-20T12:28:59+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Face-Recognition-Miriam-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/banksy.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/amazon-protest.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/two-examples-of-failed-retrievals-on-good-sketches-where-the-first-column-shows-the-probe-2-1558031035.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/anit-face.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/fresh-windows-installation-security-guide/</loc>
		<lastmod>2022-06-20T12:29:40+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hs-Banner-Fresh-Windows-Installation-Security-Guide_26699A.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Windows-updates-settings.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2014/08/system_restore.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2014/07/Comparison_OneDrive_Dropbox_Google_Drive_Box_Amazon_Cloud_Drive_Mega.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2014/08/Windows-account.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2014/08/UAC.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/gdpr-and-data-breach-risks-interview-with-bogdan-manolea/</loc>
		<lastmod>2022-06-20T12:35:07+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Miriam-GDPR-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/AA8A9798.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/AA8A0299.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/tips-to-keep-your-data-private-online/</loc>
		<lastmod>2022-06-20T12:35:29+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Miriam-Online-Privacy-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/passwords.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/app-permissions.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/open-network.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/keep-software-updated.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/suspicious-links.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/unnecessary-services.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/downloading-software.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Thor-Premium-Home-H-PNG.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/backup.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/uninstall.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/game-of-thrones-malware/</loc>
		<lastmod>2022-06-20T12:37:39+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Bianca-GOT-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Thor-Blocked-Domains-April0.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/image1-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/why-you-need-it-and-cybersecurity-training/</loc>
		<lastmod>2022-06-20T12:38:27+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Banner-Mirriam1030x360.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/internet-safety-for-kids-10-actionable-tips/</loc>
		<lastmod>2022-06-20T12:40:00+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hs-How-To-Protect-Your-Children-On-The-Internet_5B6D73.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/10-cyber-security-decisions-to-regret-in-the-future/</loc>
		<lastmod>2022-06-20T12:42:51+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Do-not-pospone-backing-up-your-sensitive-data.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/giphy-downsized.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/online-scams-sextortion/</loc>
		<lastmod>2022-06-20T12:44:29+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/How-yo-avoid-falling-for-this-scam.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/jpegbase6459dac5475d80ed0f.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/pngbase6476bc82bd3ccfdf39.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/the-malware-economy/</loc>
		<lastmod>2022-06-20T12:45:50+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hs-We-are-all-feeding-the-growth-of-the-malware-economy_1E455E.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/NEW-MALWARE-for-the-last-5-years-pic1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/new-malware-specimen-since-2007-until-2017-pic-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Gandrab-ransomware-attack-by-countries-pic3-.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/facebook-security-privacy-guide/</loc>
		<lastmod>2022-06-20T12:47:59+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hs-The-complete-guide-to-Facebook-security_4A5B80.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Facebook-News-Feed.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/General_Account_Settings.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Deactivate-orDelete-Account-General-Account-Settings.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Security-and-Login-recommended.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Location_Security_and_Login.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Change-Password_Security_and_Login.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Picture-to-Log-In.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Picture-to-log-in_Security-and-Login.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Extra_Security_and_Login.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Login-alert-Gmail.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Two-factor-authentication-feature_Security_and_Login.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Two-factor-authentication-is-on-Gmail.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Advanced-Security-and-Login.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Privacy-Settings-and-Tools.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Timeline-and-Tagging-Settings.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Keep-out.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Mobile_Settings.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Public_Post_Filters_and_Tools.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/App-Settings.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/iPhone-5s.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/how-to-stop-and-prevent-cyberbullying/</loc>
		<lastmod>2022-06-20T12:51:56+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hs-Cyberbullying-can-lead-to-depression-and-isolation_777577.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Question-Have-you-witnessed-n-act.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/The-main-causes-of-cyberbullying.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/school-bully.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/cyber-bullying-image.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/How-About-No-Bear.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/password-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/smartphone-security-guide-keep-your-phone-data-safe/</loc>
		<lastmod>2022-06-20T12:52:34+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/smartphone-security_F57C26.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/pexels-photo-618544.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Permanently-connected-online.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Office-coffee-and-mobile-phones.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/iPhone-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/How-to-set-up-fingerprint-unlock-screenshot-Nexus.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Iris-scan.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/iPhone.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Allow-apps-from-unknown-sources-screenshot-Nexus.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/How-to-check-apps-permissions-screenshot-2-Nexus.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/How-to-check-apps-permissions-screenshot-Nexus.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/copycat-by-the-numbers-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Smartphone.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/GDATA_Infographic_MMWR_H2_16_New_Android_Malware_per_year_EN_RGB_78410w1280h744.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Phishing.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Android-Device-Manager-Nexus-5X-test.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/How-to-backup-my-data-screenshot-Nexus.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Cloud-backup.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2014/07/google_two_step_authentication.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Mobile-phone.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/server-room.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/dont-share-photos-of-kids-facebook/</loc>
		<lastmod>2022-06-20T12:54:27+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Do-not-share-private-information-on-social-media.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/life-milestone-on-FB-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Infographic-consumer-complains-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Location-Settings-FB.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/tweet-location-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Facebook-check-in-meme.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/tumblr_mink8yyMXk1qgejwno1_500.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Do-not-share-on-SM.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/social-media-news-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/deadbolt-and-ech0raix-ransomware-are-attacking-qnap-devices/</loc>
		<lastmod>2022-06-20T14:46:30+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-06-20T172036.962.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/software-asset-management/</loc>
		<lastmod>2022-06-20T14:52:26+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Vladimir-Asset-Management-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/1-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/sam.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/black-friday-cryptomining/</loc>
		<lastmod>2022-06-20T15:02:37+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-10-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/artificial-intelligence-in-cybersecurity/</loc>
		<lastmod>2022-06-20T15:04:14+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/ai-in-cybersecurity-for-blog.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/data-integrity/</loc>
		<lastmod>2022-06-20T15:08:21+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Bianca-Data-Integrity-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/How-to-Preserve-Data-Integrity-3-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/How-to-Preserve-Data-Integrity-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/byod-bring-your-own-device/</loc>
		<lastmod>2022-06-20T15:08:56+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_3329831962.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/BYOD-Statistics-for-2021.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/smurf-attack-ddos/</loc>
		<lastmod>2022-06-20T15:10:52+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Elena-Smurf-Attack-1030x360-blog.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/smurf.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/mark-wrighton-appointed-as-cro-for-heimdal-security/</loc>
		<lastmod>2022-06-21T07:14:11+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_4572340621-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/For-free-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/rob-bolton-and-jed-butcher-are-joining-heimdal-securitys-executive-team/</loc>
		<lastmod>2022-06-21T09:11:02+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_4572340621.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/rob-bolton.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Jed-LinkedIn.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/heimdal-threat-hunting-journal/</loc>
		<lastmod>2022-06-21T09:15:47+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-16-5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/security-breach-at-flagstar-bank-affects-1-5-million-clients/</loc>
		<lastmod>2022-06-21T09:38:14+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/flagstar.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/microsoft-optional-quality-updates/</loc>
		<lastmod>2022-06-21T11:10:01+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Vladimir-Microsoft-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Dashboard.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/free-unofficial-micropatches-for-windows-remotepotato0-now-available/</loc>
		<lastmod>2022-06-21T11:17:27+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/RemotePotato0-cover-image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/nefilim-ransomware/</loc>
		<lastmod>2022-06-21T11:20:18+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-37.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/ransom-note-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/screenshot-2021-06-07-at-13-43-32.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/asset-management-system-faq/</loc>
		<lastmod>2022-06-21T13:38:07+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Vladimir-Asset-Management-System-2-1030x360.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/malicious-app-definition/</loc>
		<lastmod>2022-06-21T14:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Vladimir-Malicious-App-1030x360.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/dch-ransomware-attack/</loc>
		<lastmod>2022-06-21T15:13:53+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Alina-DCH-Ransomware-Attack-1030x360.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-epdr-endpoint-prevention-detection-and-response/</loc>
		<lastmod>2022-06-21T15:16:29+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Miriam-E-PDR-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/threats.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/operation-tovar/</loc>
		<lastmod>2022-06-21T15:18:14+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Bianca-Operation-Tovar-1030x360.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/donald-trump-campaign-hack/</loc>
		<lastmod>2022-06-21T15:19:00+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Vladimir-Trump-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/ElXvXqBUwAAWFjr-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cybersecurity-in-non-profit-and-non-governmental-organizations/</loc>
		<lastmod>2022-06-21T15:21:32+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Alina-Cyberattacks-1030x360.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/emma-nordstrom-joining-heimdal-security/</loc>
		<lastmod>2022-06-21T15:21:51+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Bianca-Emma-Nordstrom1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/EmmaNordstrom1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/christian-h-von-hoesslin-is-joining-heimdal-security/</loc>
		<lastmod>2022-06-22T07:17:00+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Miriam-Christian-1030x360.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/ivana-marisol-silva-is-joining-heimdal-security/</loc>
		<lastmod>2022-06-22T07:17:23+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Miriam-Ivana-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/ivana.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/ruth-schofield-is-joining-heimdal-security/</loc>
		<lastmod>2022-06-22T07:17:48+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Miriam-Ruth-S-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Ruth-Schofield-headshot.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/ralph-renna-is-joining-heimdal-security/</loc>
		<lastmod>2022-06-22T07:18:14+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Miriam-Ralph-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/ralph.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/heimdal-security-in-2021-market/</loc>
		<lastmod>2022-06-22T07:20:22+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Miriam-1030x360.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/twitter-data-cache-on-firefox/</loc>
		<lastmod>2022-06-22T07:28:00+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Bianca-Firefox-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Twitter.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Mozilla-options.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Mozilla-options2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/mozilla-cached-web-content.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Mozilla-options3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/clear-history-when-firefox-closes.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Mozilla-options5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/covid-19-and-cybersecurity-parallel/</loc>
		<lastmod>2022-06-22T07:28:59+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Bianca-Decision-Making-in-Cybersecurity-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/China-mobility-graph-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/China-mobility-graph-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/challenges-security-for-iot/</loc>
		<lastmod>2022-06-22T07:30:38+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Miriam-Software-Security-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/nathan.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/how-to-prevent-a-botnet-attack-from-compromising-your-business/</loc>
		<lastmod>2022-06-22T07:31:26+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Bianca-Botnet-Attacks-1030x360.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/security-alert-trickbot-launches-bec-attacks-metoo/</loc>
		<lastmod>2022-06-22T08:24:50+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Miriam-Malicious-email-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Sample-phishing-email1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/security-alert-fake-subpoena-phishing-campaign-predator/</loc>
		<lastmod>2022-06-22T08:26:00+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Miriam-Info-Stealer-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Sample-phishing-email.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-microsoft-phishing-campaign-targets-office365-users/</loc>
		<lastmod>2022-06-22T08:27:29+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Miriam-Microsoft-Phishing-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Capture.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Screenshot_1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Screenshot_2-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cybersecurity-and-biology-biomimicry-and-innovation-inspired-by-nature/</loc>
		<lastmod>2022-06-22T08:29:29+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Miriam-Biology-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/pic-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/pic-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/germanwiper-ransomware-erases-your-data/</loc>
		<lastmod>2022-06-22T08:33:29+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Miriam-GermanWiper-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/spam-email.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/wiped-file.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/is-paypal-safe/</loc>
		<lastmod>2022-06-22T08:38:28+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/PayPal-Vladimir-1030x360-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/paypal-tight-security.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/maxresdefault.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/yodel-confirms-cyberattack/</loc>
		<lastmod>2022-06-22T11:20:21+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-06-22T131532.888.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/yodel.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/employee-spotlight-caroline-stenstrup/</loc>
		<lastmod>2022-06-22T11:53:53+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Miriam-Caroline-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Caroline-min-4.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/is-coinbase-safe/</loc>
		<lastmod>2022-06-22T11:57:24+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Elena-Cryptocurrency-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/0.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/interface.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/levels.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/threat-hunting-journal-march-2022/</loc>
		<lastmod>2022-06-22T12:10:06+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Vladimir-Mlaware1030x360.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/group-policy-objects-gpo/</loc>
		<lastmod>2022-06-22T12:25:59+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Group-Policy-Objects-cover-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/GPOs-Processing-Order.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/rmm-software/</loc>
		<lastmod>2022-06-22T12:40:31+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Bianca-RMM-1030x360.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/ai-neural-network/</loc>
		<lastmod>2022-06-22T12:50:14+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-17.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/ai-and-co.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/complete-neuron-cell-diagram.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/ai-artificial-neural-network-alex-castrounis.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/nasa-pic.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/asset-tracking-software/</loc>
		<lastmod>2022-06-22T12:55:44+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Alina-Asset-Tracking-Software-1030x360.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-pgp-encryption-and-how-does-it-work/</loc>
		<lastmod>2022-06-22T14:07:21+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Vladimir-PGP-Encryption-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/3-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/1-4.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2-4.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/threat-hunting-journal-february-2022/</loc>
		<lastmod>2022-06-22T14:17:09+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-4-10.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/ryuk-ransomware/</loc>
		<lastmod>2022-06-22T14:31:04+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Vladimir-Ryuk-Ransomware-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/emotetryuktrickbot.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/ryuk-phishing.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/call-flow-ryuk-hermes.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/diavol-ransomware-receives-free-decryptor/</loc>
		<lastmod>2022-06-22T14:36:17+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/free-decryptor-for-Diavol-ransomware-now-available-cover-image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/chinese-hackers-are-now-using-the-nimbda-loader-and-a-new-form-of-the-yahoyah-trojan/</loc>
		<lastmod>2022-06-23T09:57:25+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-06-23T113437.146.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/zero-day-microsoft-support-diagnostic-tool-vulnerability/</loc>
		<lastmod>2022-06-23T15:26:22+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Vladimir-CVE-2022-30190-1030x360.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/most-dangerous-hardware-vulnerabilities-in-2021/</loc>
		<lastmod>2022-06-23T15:35:26+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_15_7719043651.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/a-new-zero-day-vulnerability-is-impacting-all-windows-versions/</loc>
		<lastmod>2022-06-23T15:36:09+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Windows-Zero-day-Vulnerabilty-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/on-average-it-takes-205-days-to-patch-up-severe-cybersecurity-vulnerabilities/</loc>
		<lastmod>2022-06-23T15:40:16+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_3092610644.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/adobe-flash-vulnerabilities-security-risks/</loc>
		<lastmod>2022-06-23T15:49:56+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hs-Adobe-Flash-is-exposing-you-to-cyber-attacks_412E3B.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Adobe_Flash_Player_v10_icon.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/cp-flash.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/chartoftheday_3796_websites_using_flash_n.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/flash-vulnerabilities-types.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/YOmDuDV-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/how-an-exploit-works-600-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/zero-day-vulnerability-trustwave-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/FlashUX.0-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/java-biggest-security-hole-your-computer/</loc>
		<lastmod>2022-06-23T15:50:43+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hs-First-Flash-now-Java.-What-should-you-do_8F4603.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/java-and-flash-patches-heimdal-security-2015.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/how-a-java-exploit-kit-works.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/JAVA-vulnerabilities-by-year-and-by-type.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/vendor-highest-CVSS-scores.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/days-since-the-last-java-zero-day.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-a-hotfix/</loc>
		<lastmod>2022-06-24T12:54:49+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_3798748112.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/1-9.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/fake-copyright-emails-used-to-deploy-lockbit-ransomware/</loc>
		<lastmod>2022-06-27T09:58:12+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/LockBit.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/petya-ransomware-history-m-o-targets/</loc>
		<lastmod>2022-06-27T15:09:10+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Elena-Ransomaware-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Petya_Top-20-countries.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/anaf-spearphishing-campaign/</loc>
		<lastmod>2022-06-28T09:50:15+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_3619574167.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Screenshot-2022-06-28-at-09.55.15.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/evilnum-hackers-return/</loc>
		<lastmod>2022-06-29T11:04:07+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_3_8594346480.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/the-darkwatchman-malware-was-found-hidden-in-windows-registry/</loc>
		<lastmod>2022-06-30T15:01:55+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Your-paragraph-text.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/excel-xll-add-ins-are-pushing-a-password-stealing-malware/</loc>
		<lastmod>2022-06-30T15:03:03+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Excel-XLL-add-ins-are-pushing-a-password-stealing-malware.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/sidecopy-pakistani-threat-actor-group-targets-afghan-governments/</loc>
		<lastmod>2022-06-30T15:04:47+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Details-about-SideCopy-threat-actor-group-cover-image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cronrat-the-new-linux-rat-that-web-stores-are-targeted/</loc>
		<lastmod>2022-06-30T15:05:47+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/CronRAT-cover-image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/the-trojan-source-attack-method-allows-the-injection-of-vulnerabilities-into-open-source-code/</loc>
		<lastmod>2022-06-30T15:08:52+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Trojan-Source.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-rat-malware-south-korea/</loc>
		<lastmod>2022-06-30T15:11:00+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/new-RAT-malware-South-Korea-cover-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/gameexe.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-pegasus-scanner-used-to-infect-windows/</loc>
		<lastmod>2022-06-30T15:12:35+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Pegasus.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/hse-to-pay-a-huge-cost-after-major-2021-ransomware-attack/</loc>
		<lastmod>2022-07-01T08:26:32+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-89.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Conti-HSE.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Conti-HSE-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/raccoon-malware-updated-to-extract-cryptocurrency-from-its-victims-computer/</loc>
		<lastmod>2022-07-01T08:35:08+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_8_4720516645.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cisa-and-fbi-share-guidance-for-the-victims-of-kaseya-ransomware-attack/</loc>
		<lastmod>2022-07-01T08:35:48+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/162556659497016554.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/fatalrat-targets-telegram/</loc>
		<lastmod>2022-07-01T09:01:02+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_3_5960005461.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/is-venmo-safe/</loc>
		<lastmod>2022-07-01T09:04:25+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Vladimir-Venmo-1030x360.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/rik-schoonis-is-joining-heimdal-security/</loc>
		<lastmod>2022-07-01T09:04:48+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Miriam-Rik-Schoonis-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Rik.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/patch-vs-hotfix-vs-coldfix-vs-bugfix/</loc>
		<lastmod>2022-07-01T14:40:30+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_9520161080.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/macmillan-attacked-with-ransomware/</loc>
		<lastmod>2022-07-01T15:52:02+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-07-01T164254.528.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/privacy-protection-agency-seizes-hacked-travel-companys-servers/</loc>
		<lastmod>2022-07-04T11:19:25+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-07-04T133603.181.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/astralocker-ransomware-goes-offline-and-makes-decryptors-available/</loc>
		<lastmod>2022-07-05T12:18:05+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-48-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/AstraLocker-decryptors.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/AstraLocker-ransom-note.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/maze-egregor-and-sekhmet-master-decryption-keys-provided-by-their-developer/</loc>
		<lastmod>2022-07-05T14:06:54+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Maze-Egregor-and-Sekhmet-decryptors-released-cover-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/topleak-forum-post.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/archive.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/heimdal-threat-hunting-journal-2022/</loc>
		<lastmod>2022-07-05T14:07:54+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-18-6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/emotet-malware-history/</loc>
		<lastmod>2022-07-05T15:34:39+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Alina-Emotet-1030x360.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/malicious-npm-packages-snatch-data-from-apps-and-website-forms-researchers-say/</loc>
		<lastmod>2022-07-06T09:25:21+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-50-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/List-of-malicious-NPM-modules.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/shi-international-corp-confirms-cyberattack/</loc>
		<lastmod>2022-07-07T14:34:14+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-52-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/SHI-maintenance-message.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/v8-vulnerability-hits-chrome-and-edge/</loc>
		<lastmod>2022-07-08T15:09:51+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/V8-vulnerability-cover-image-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/mangatoon-sufferes-major-data-breach/</loc>
		<lastmod>2022-07-11T11:01:37+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_7236916963.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Mangatoon-data-breach.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/companies-are-targeted-in-double-extortion-attacks-launched-by-0mega-ransomware/</loc>
		<lastmod>2022-07-11T12:55:13+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-54-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/0mega-ransom-negotiation-site.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/0mega-data-leak-site.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/hackers-are-able-to-unlock-honda-vehicles-remotely/</loc>
		<lastmod>2022-07-12T10:37:40+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-07-12T122959.176.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/luna-moth-is-a-new-tool-used-by-hackers-to-break-into-organizations/</loc>
		<lastmod>2022-07-13T11:09:17+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Luna-Moth.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-paypal-phishing-kit-hijacks-wordpress-sites/</loc>
		<lastmod>2022-07-15T09:46:27+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-3-16.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/android-and-ios-users-targeted-in-malware-phishing-attacks-conducted-by-roaming-mantis-threat-actor/</loc>
		<lastmod>2022-07-19T10:50:48+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-54-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/phishing-sms-sent-to-French-users.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MoqHao%E2%80%99s-infection-chain.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/types-of-online-financial-frauds/</loc>
		<lastmod>2022-07-25T12:40:35+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Elena-Malicious-Actors-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Capture-6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/ceo-fraud-emails/</loc>
		<lastmod>2022-07-25T12:41:54+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Elena-Fraud-Emails-1030x360.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/email-account-has-been-hacked/</loc>
		<lastmod>2022-07-25T12:42:40+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-13-11.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/osi-layers/</loc>
		<lastmod>2022-07-25T12:52:18+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_4601673494.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/lilith-a-new-ransomware-has-claimed-its-first-victim/</loc>
		<lastmod>2022-07-26T13:12:09+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-75.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/threat-hunting-journal-july-2022/</loc>
		<lastmod>2022-07-27T13:08:59+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Vladimir-Threat-Hunting-1030x360.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/patch-compliance/</loc>
		<lastmod>2022-07-28T13:42:29+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Vladimir-CYBER-Essential-1030x360.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/private-information-of-almost-100k-healthcare-providers-exposed-by-platformq/</loc>
		<lastmod>2022-08-08T14:45:25+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-59-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/PlatformQ-data-breach.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/platformq.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cisco-confirms-cyberattack/</loc>
		<lastmod>2022-08-11T15:07:43+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-08-11T180227.648.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/image-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Screenshot-2022-08-11-175224.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/here-comes-blackbyte-ransomware-2-0/</loc>
		<lastmod>2022-08-18T10:22:56+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-64-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/A-tweet-promoting-the-new-BlackByte-data-leak-site.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/New-BlackByte-data-extortion-options.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/entrust-allegedly-hit-with-lockbit-ransomware/</loc>
		<lastmod>2022-08-19T10:26:10+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-66-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Entrust-page-on-the-LockBit-data-leak-site.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/zero-day-vulnerability-abused-by-cybercriminals-to-steal-crypto-from-bitcoin-atms/</loc>
		<lastmod>2022-08-22T11:40:11+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-68-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/hotel-and-travel-businesses-attacked-by-cybercriminals/</loc>
		<lastmod>2022-08-22T14:50:34+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-08-22T171459.168.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/desfa-suffers-cyberattack-ragnar-locker-ransomware-claims-responsibility/</loc>
		<lastmod>2022-08-23T11:59:10+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-70-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/DESFA-listed-on-the-Ragnar-Locker-extortion-page.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/sova-android-banking-trojan-becomes-even-more-powerful/</loc>
		<lastmod>2022-08-23T13:42:39+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-43.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/massive-0ktapus-phishing-attack-hits-over-130-organizations/</loc>
		<lastmod>2022-08-29T11:21:16+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-55.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/lockbit-malware-group-threatens-with-triple-extortion/</loc>
		<lastmod>2022-08-29T12:12:29+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-3-12.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/2-5m-people-had-their-student-loan-accounts-data-stolen/</loc>
		<lastmod>2022-08-30T15:16:00+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-08-30T181529.960.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/start-confirms-data-breach/</loc>
		<lastmod>2022-09-01T07:27:22+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-59.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/telegram-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/security-breach-allegations-hover-over-tiktok/</loc>
		<lastmod>2022-09-06T10:51:54+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-2-15.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/lausd-one-of-the-largest-school-districts-in-the-u-s-suffers-ransomware-attack/</loc>
		<lastmod>2022-09-07T09:26:36+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_3083555271.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cyberattack-launched-upon-intercontinental-hotels-group/</loc>
		<lastmod>2022-09-07T10:33:05+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-4-13.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/the-tyler-technology-ransomware-attack-overview/</loc>
		<lastmod>2022-09-09T13:29:44+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/tylertech-security-incident.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Tyler-technologies-Ransomware.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/virustotal-tt.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-a-software-patch/</loc>
		<lastmod>2022-09-09T21:01:55+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Cezarina-Software-Patch-1030x360.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/yanluowang-ransomware-gang-leaked-cisco-stolen-data/</loc>
		<lastmod>2022-09-13T11:16:56+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-3-17.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/major-cyberattack-hits-english-company-eurocell/</loc>
		<lastmod>2022-09-14T11:58:52+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-5-15.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/indonesian-government-pressures-private-sector-to-implement-better-cybersecurity-measures/</loc>
		<lastmod>2022-09-15T10:27:31+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-63.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/empress-ems-discloses-data-breach-following-ransomware-attack/</loc>
		<lastmod>2022-09-19T09:17:07+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-6-12.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/starbucks-singapore-customer-data-accessed-illegally-in-data-leak/</loc>
		<lastmod>2022-09-19T09:18:05+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-3-19.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Starbucks-Singapore.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/revolut-suffers-data-breach/</loc>
		<lastmod>2022-09-19T13:38:11+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-09-19T162845.844.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/american-airlines-suffers-data-breach-after-email-compromise/</loc>
		<lastmod>2022-09-20T09:00:56+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-9-11.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/rockstar-games-confirms-gta-vi-footage-leak/</loc>
		<lastmod>2022-09-20T10:59:45+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-11-9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Rockstar-Statement-.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/indonesia-passes-personal-data-protection-law/</loc>
		<lastmod>2022-09-20T14:46:08+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-13-5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/the-european-union-prepares-new-cybersecurity-regulations-for-iot-devices/</loc>
		<lastmod>2022-09-21T07:38:15+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-7-8.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/why-cybersecurity-is-important-for-companies/</loc>
		<lastmod>2022-09-21T07:41:38+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-7-9.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/2k-games-help-deck-platform-hacked/</loc>
		<lastmod>2022-09-21T09:38:55+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-18-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/fake-2k-support-emails.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/fake-zoom-sites-deploying-vidar-malware/</loc>
		<lastmod>2022-09-21T11:11:56+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-12-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Zoom.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/lockbit-ransomware-builder-leaks-online/</loc>
		<lastmod>2022-09-22T08:53:48+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-84.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/lockbit-builder-leaked.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/phishing-campaign-abuses-linkedin-smart-link/</loc>
		<lastmod>2022-09-22T09:31:43+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-1-34.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Featured-Image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/optus-falls-victim-to-security-breach/</loc>
		<lastmod>2022-09-23T08:13:14+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-8-14.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/morgan-stanley-sanctioned-for-exposing-information-of-15-million-customers/</loc>
		<lastmod>2022-09-23T09:54:24+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-4-9.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/vss-fix-seriossam-ransomware/</loc>
		<lastmod>2022-09-23T12:14:31+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Vladimir-SeriousSAM-1030x360.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/ako-ransomware/</loc>
		<lastmod>2022-09-23T14:08:42+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Alina-Ako-Ransomware-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/ako_encryption.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/nsa-and-cisa-what-to-do-when-hackers-target-critical-systems/</loc>
		<lastmod>2022-09-26T09:28:04+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-12-12.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/adware-found-in-75-apps-on-google-play-and-app-store/</loc>
		<lastmod>2022-09-27T08:43:22+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-15-16.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/c2-response.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/JobScheduler-Code.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/erbium-a-new-infostealer-malware-on-the-market/</loc>
		<lastmod>2022-09-27T09:25:05+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-93.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/control_panel-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/australia-thinking-about-tougher-cybersecurity-laws/</loc>
		<lastmod>2022-09-27T13:05:38+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-17-15.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-malware-nullmixer-infects-your-pc-through-cracks/</loc>
		<lastmod>2022-09-28T09:07:46+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-20-14.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/dropped-malware.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/data-corruption-a-potential-new-trend-in-ransomware-attacks/</loc>
		<lastmod>2022-09-28T14:37:44+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-8-15.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Exmatter-Data-Corruption-Process.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/military-and-weapons-contractors-targeted-in-recent-cyberattack/</loc>
		<lastmod>2022-09-29T09:36:32+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-23-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/infection-chain_5_.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/tiktok-influencer-accounts-targeted-in-major-phishing-campaign/</loc>
		<lastmod>2022-09-29T10:57:55+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_10_7763921275.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Tiktok-phishing_message.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/tiktok-verified-badge.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/scammer.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/lazarus-group-uses-fudmodule-rootkit-to-abuse-dell-driver-bug/</loc>
		<lastmod>2022-10-03T09:32:14+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-35-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/lazarus-byovd-dell-attack.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/russian-retailer-dns-confirms-data-breach/</loc>
		<lastmod>2022-10-04T08:36:40+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-37-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/dns-russia-breach.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/bloomberg-technology-summit-2022-lessons-learned/</loc>
		<lastmod>2022-10-04T09:49:22+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-10-04T124355.213.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Tech-Summit-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cheerscrypt-ransomware-strain-attributed-to-chinese-hacking-group/</loc>
		<lastmod>2022-10-04T10:01:21+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-1-36.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Nightsky-Figure-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/ferrari-targeted-by-ransomware-attack/</loc>
		<lastmod>2022-10-04T11:06:27+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2-14.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Ferrari-Ransomexx-Leaksite2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/russian-cyberespionage-will-highly-increase-this-winter-warns-finnish-intelligence/</loc>
		<lastmod>2022-10-04T12:31:21+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-11-13.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-6-8.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/xss-vulnerabilities-in-canon-medicals-vitrea-view-could-disclose-patient-data/</loc>
		<lastmod>2022-10-05T07:32:32+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-13-17.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Capture-11.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/hackers-use-customized-malware-to-steal-u-s-defense-data/</loc>
		<lastmod>2022-10-05T10:14:38+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-3-22.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/download-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/your-manager-forwarded-you-a-new-email-always-double-check-it/</loc>
		<lastmod>2022-10-05T12:56:56+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-19-14.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/FBI-BEC.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-18-20.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/indian-retailer-highrich-compromises-customer-data/</loc>
		<lastmod>2022-10-05T12:59:08+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-1..9-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-65.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/blackbyte-ransomware-disables-security-products-through-byovd-method/</loc>
		<lastmod>2022-10-06T08:16:07+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-44-7.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/19-year-old-arrested-for-allegedly-using-leaked-optus-customer-data-for-extortion/</loc>
		<lastmod>2022-10-06T14:07:14+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-26-9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/arrested-19yo-hacker.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Charges-19yo-hacker.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/hackers-are-using-app-mode-in-chromium-browsers-for-phishing/</loc>
		<lastmod>2022-10-07T14:39:54+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-35-9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/mrdox.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/fake-ransomware-widespreaded-by-malicious-adult-websites/</loc>
		<lastmod>2022-10-10T09:00:37+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-107.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Screenshot-2022-10-10-113544.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/intel-alder-lake-leak/</loc>
		<lastmod>2022-10-10T12:16:08+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-53-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/intel-code-leak.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/hacktivist-groups-get-involved-in-iranian-protests/</loc>
		<lastmod>2022-10-10T13:55:23+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-18-21.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/data.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/meta-published-a-list-of-400-malicious-apps-that-steal-log-in-information/</loc>
		<lastmod>2022-10-11T07:10:34+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-42-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MetaMaliciousApps.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/400malicious-apps-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/toyota-suffers-from-data-leak/</loc>
		<lastmod>2022-10-11T09:13:54+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-56-7.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/zimbra-collaboration-suite-vulnerable-due-to-unpatched-rce-flaw/</loc>
		<lastmod>2022-10-11T09:14:53+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-21-11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-22-12.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/this-thermal-attack-can-crack-your-password-in-just-a-few-seconds/</loc>
		<lastmod>2022-10-11T09:23:38+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2-16.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/everest-gang-puts-200k-price-tag-on-eskom-stolen-data/</loc>
		<lastmod>2022-10-11T13:25:44+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-26-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/FOF11PlVsAEOoXf.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/are-deepfakes-a-new-cybercrime-business-niche/</loc>
		<lastmod>2022-10-12T07:21:14+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-50-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/deepfake.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/polonium-hacking-group-targets-israel-with-malware/</loc>
		<lastmod>2022-10-12T09:06:30+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-58-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/microsoft-implements-brute-force-attack-protection-for-all-windows-versions/</loc>
		<lastmod>2022-10-12T12:48:38+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-51-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/foto-microsoft.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/whatsapp-clone-caught-stealing-users-accounts/</loc>
		<lastmod>2022-10-13T08:36:37+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-61-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/siemens-simatic-flaw-allows-theft-of-cryptographic-keys/</loc>
		<lastmod>2022-10-13T09:09:18+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-7-17.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Screenshot-2022-10-13-114235.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/project-ddosia-pays-contributors-for-ddos-hacktivist-attacks/</loc>
		<lastmod>2022-10-14T09:34:13+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-9-25.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/alchimist-attack-framework-targeting-windows-linux-and-macos-systems/</loc>
		<lastmod>2022-10-14T09:39:45+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-62-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/fake-windows-defender-alerts-used-in-recent-tech-support-scam/</loc>
		<lastmod>2022-10-14T10:03:58+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-12-16.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/ER-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/ER-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/ER-3-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/over-21000-zoom-users-targeted-in-a-phishing-attack/</loc>
		<lastmod>2022-10-17T09:19:05+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-13-19.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/fig-1-email-attack.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/chinese-cyberespionage-group-going-after-telcos-and-it-service-providers/</loc>
		<lastmod>2022-10-17T11:05:33+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-14-20.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/WIP19_5.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/WIP19_8.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/ransomware-gang-tricked-by-dutch-national-police/</loc>
		<lastmod>2022-10-17T13:50:48+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-20-17.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/mydeal-announces-stolen-data-from-a-recent-data-breach/</loc>
		<lastmod>2022-10-18T09:08:49+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-1-43.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MyDeal.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/german-newspapers-targeted-by-ransomware-attack/</loc>
		<lastmod>2022-10-18T09:20:27+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-28-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Screenshot-2022-10-18-103321.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/prestige-ransomware-targets-organizations-in-ukraine-and-poland/</loc>
		<lastmod>2022-10-18T10:08:42+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-71-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/prestige-ransom-note.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/british-company-kingfisher-insurance-confirms-lockbit-attack/</loc>
		<lastmod>2022-10-19T13:20:03+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-37-12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Kingfisher-leak-announcement.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/microsoft-data-breach-exposes-customers-sensitive-information/</loc>
		<lastmod>2022-10-20T09:11:05+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-77-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/alleged-member-of-lapsus-hacking-group-is-arrested-in-brazil/</loc>
		<lastmod>2022-10-20T09:31:31+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-4-17.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/researchers-warn-about-powershell-backdoor-exploited-by-hackers/</loc>
		<lastmod>2022-10-20T09:34:53+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-40-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Screenshot-2022-10-20-102411.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/millions-of-git-folders-from-us-china-and-germany-exposed-to-the-public/</loc>
		<lastmod>2022-10-20T10:24:48+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-77-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/gitmap.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/gitcredentials.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/agenda-a-new-golang-ransomware-is-on-the-loose/</loc>
		<lastmod>2022-10-20T13:32:21+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-3-13.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Agenda-Ransomware-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-php-malware-targets-business-and-regular-facebook-accounts/</loc>
		<lastmod>2022-10-20T14:02:42+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-64-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/php-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/php2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/php3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-android-banking-malware-deployed-using-vishing/</loc>
		<lastmod>2022-10-20T14:03:12+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-54-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Copybara.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Istallation.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Control-panel.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/solana-phantom-targeted-by-password-stealing-malware/</loc>
		<lastmod>2022-10-20T14:05:31+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-13-18.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Screenshot-2022-10-10-103753-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/lilithbot-new-malware-as-a-service-made-available-on-telegram/</loc>
		<lastmod>2022-10-20T14:06:07+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-7-16.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Screenshot-2022-10-07-115708.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-mobile-email-management-mem/</loc>
		<lastmod>2022-10-20T14:08:03+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-42-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/calls-to-banks-customer-support-intercepted-by-fakecalls-mobile-banking-trojan/</loc>
		<lastmod>2022-10-20T14:09:16+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-17-12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Fakecalls-mobile-banking-malware-call-interface.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Code-in-Fakecalls-for-playing-pre-recorded-audio.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/victims-of-the-t-mobile-2021-data-leak-are-in-danger-of-identity-theft/</loc>
		<lastmod>2022-10-20T14:09:52+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_4_4452155842.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/us-canadian-android-mobile-users-targeted-by-tanglebot-malware/</loc>
		<lastmod>2022-10-20T14:11:00+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_3_8580326959.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/tanglebot-malware.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/android.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/t-mobile-data-breach/</loc>
		<lastmod>2022-10-20T14:12:05+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_6329719102.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/mint-mobile-was-hit-by-a-data-breach/</loc>
		<lastmod>2022-10-20T14:12:32+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Mint-Mobile-data-breach-cover.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/mint-mobile-data-breach-notification.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/oldgremlin-attacks-russian-organizations-via-linux-ransomware/</loc>
		<lastmod>2022-10-21T08:51:55+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-45-9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Screenshot-2022-10-21-110720.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-variant-of-ursnif-malware-shifts-focus-from-bank-account-theft-to-initial-access/</loc>
		<lastmod>2022-10-21T09:31:53+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-82-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/3-million-patients-exposed-over-incorrect-usage-of-meta-pixel/</loc>
		<lastmod>2022-10-21T10:05:58+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-78-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/AAH.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-adware-from-nuisance-to-threat/</loc>
		<lastmod>2022-10-21T13:28:00+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-49-9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-66.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-malvertising-and-how-to-protect/</loc>
		<lastmod>2022-10-21T13:29:20+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-2-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/malvertising-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cisa-daixin-team-is-targeting-u-s-healthcare-in-ransomware-attacks/</loc>
		<lastmod>2022-10-24T10:33:46+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-80-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Daxin-Team-Ransom-Note.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/metro-confirms-cyberattack-caused-it-outage/</loc>
		<lastmod>2022-10-24T10:45:09+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-51-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/metro-store-broadview.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-windows-zero-day-vulnerability-lets-javascript-files-bypass-security-warnings/</loc>
		<lastmod>2022-10-24T11:30:12+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-85-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/ukrainian-agencies-targeted-by-ransomware/</loc>
		<lastmod>2022-10-25T08:28:52+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-87-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/CERT-UA-Cuba-Ransomware.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/emotet-botnet-drops-malware-via-self-unlocking-password-protected-rar-files/</loc>
		<lastmod>2022-10-25T09:02:58+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-3-27.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Screenshot-2022-10-25-113104.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/the-interpol-metaverse-was-launched-to-help-the-fight-against-cybercrime/</loc>
		<lastmod>2022-10-25T09:29:21+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2-20.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/automotive-retailer-pendragon-refuses-to-pay-60-million-ransom/</loc>
		<lastmod>2022-10-25T12:52:46+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-84-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Pendragon.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/traffic-filtering-secure-your-pc-cyber-threats/</loc>
		<lastmod>2022-10-25T13:27:22+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hs-Minimize-your-exposure-to-cyber-attacks_2D71A3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/how-your-PC-connects-to-the-Internet.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/simple-ransomware-infection-chain.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/browser-vulnerabilities.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/irans-atomic-energy-agency-confirms-hack/</loc>
		<lastmod>2022-10-26T08:16:32+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-92-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/linux-systems-are-a-more-common-target-as-the-attack-surface-expands/</loc>
		<lastmod>2022-10-26T08:30:28+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-3-14.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/microsoft-brute-force-blocking/</loc>
		<lastmod>2022-10-26T08:32:10+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/cyber-attack-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Water-Closeup-Style-Presentation.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Water-Closeup-Style-Presentation-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Water-Closeup-Style-Presentation-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Water-Closeup-Style-Presentation-3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/how-honeypots-help-it-teams-defend-against-cyber-attacks/</loc>
		<lastmod>2022-10-26T08:35:10+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/honeypots-blog.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/honeypots-infographic-g2-osi-model.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Sagar-Joshi-G2-Guest-Post-on-Honeypots.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/apt-naikon/</loc>
		<lastmod>2022-10-26T08:40:13+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Vladimir-Cybersecurity-advice-1030x360.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/two-pos-malware-used-by-hackers-to-steal-card-details/</loc>
		<lastmod>2022-10-26T08:45:20+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-5-24.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Screenshot-2022-10-26-101818-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Screenshot-2022-10-26-101840.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/howard-university-hit-with-ransomware/</loc>
		<lastmod>2022-10-26T08:46:40+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_2557415368.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/ransomware-group-launches-search-site-for-stolen-data/</loc>
		<lastmod>2022-10-26T08:48:12+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-06-15T140511.101.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/a-2-5-years-long-data-breach-discovered-on-see-tickets-website/</loc>
		<lastmod>2022-10-26T09:13:26+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-114.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/26-year-old-charged-for-involvement-in-raccoon-infostealer-malware-service/</loc>
		<lastmod>2022-10-26T11:06:54+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-88-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-86-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cyberespionage/</loc>
		<lastmod>2022-10-26T13:58:35+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-94-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-europol-report-high-profile-targets-the-focus-of-ransomware-gangs/</loc>
		<lastmod>2022-10-26T15:10:33+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Europol-report-cover-image-news.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/groove-ransomware-extortion-groups-call-to-action/</loc>
		<lastmod>2022-10-26T15:13:26+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Groove-ransomware-gang-cover-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/forum-post-2-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/6-ransomware-gangs-impacted-more-than-290-companies-2021/</loc>
		<lastmod>2022-10-26T15:18:27+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Security-News-and-Updates-1030x360-6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/massive-freejacking-campaign-abuses-cloud-dev-resources/</loc>
		<lastmod>2022-10-27T09:08:54+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-96-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/the-u-k-company-interserve-fined-for-lack-of-cybersecurity-measures/</loc>
		<lastmod>2022-10-27T09:42:26+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2-21.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/thomson-reuters-leaks-at-least-3tb-of-personal-data/</loc>
		<lastmod>2022-10-27T14:02:25+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-97-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/us-education-sector-attacked-by-vice-society-ransomware/</loc>
		<lastmod>2022-10-27T14:36:30+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-90-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-york-post-website-and-twitter-account-hacked/</loc>
		<lastmod>2022-10-28T08:01:02+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-99-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/18-indian-banks-targeted-by-new-version-of-drinik-android-malware/</loc>
		<lastmod>2022-10-28T11:17:22+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-92-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Loading-tax-site-screen-recording.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Drinik-blocking-incoming-calss.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Driniks-evolution.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/raspberry-robin-linked-to-clop-ransomware-attacks/</loc>
		<lastmod>2022-10-28T13:15:44+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-18-23.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/eu-copper-giant-aurubis-hit-by-cyberattack/</loc>
		<lastmod>2022-10-31T10:36:43+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-20-18.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/german-student-behind-one-of-the-countrys-biggest-dark-web-markets/</loc>
		<lastmod>2022-10-31T12:42:51+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-94-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/DiDW-platform.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/who-is-responsible-for-developing-a-cybersecurity-culture/</loc>
		<lastmod>2022-10-31T15:58:37+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/who-is-responsible-for-developing-a-cybersecurity-culture-concept-image-for-blog.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/EmailSec-Detections.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/instagram-bug-causes-users-accounts-suspension/</loc>
		<lastmod>2022-11-01T10:20:36+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-11-01T115940.688.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/multiple-vulnerabilities-discovered-in-juniper-junos-os/</loc>
		<lastmod>2022-11-01T10:46:14+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-23-13.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/4-million-for-access-to-576-corporate-networks/</loc>
		<lastmod>2022-11-01T15:53:43+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-98-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Q3-numbers-Kela.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Countries-IABS-KELA.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Sectors-IABs-KELA.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/sandstrike-spyware-uses-vpn-app-to-infect-android-devices/</loc>
		<lastmod>2022-11-02T10:24:08+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-11-02T113503.257.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/royal-mails-website-suspended-due-to-a-data-breach/</loc>
		<lastmod>2022-11-03T11:43:03+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2-22.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/experts-make-out-a-list-of-vulnerabilities-abused-by-ransomware-groups/</loc>
		<lastmod>2022-11-03T12:40:28+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/A-List-of-Vulnerabilities-Abused-by-Ransomware-Groups-cover.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Vulnerabilities-targeted-by-ransomware-groups-list.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/List-of-Vulnerabilities-Abused-by-Ransomware-Groups.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/cert-lifecycle-of-a-ransomware-incident-business-version.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/the-top-exploited-vulnerabilities-in-2021-revealed-by-cybersecurity-firms/</loc>
		<lastmod>2022-11-03T12:56:55+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Top-Exploited-Vulnerabilities-in-2021-cover-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/top-vulnerabilities-in-2021-CISA.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/vodafone-italy-confirms-september-data-breach/</loc>
		<lastmod>2022-11-03T12:58:54+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-11-03T144249.202.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Vodafone-Italy-Notice.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Vodafone-KelvinSecurity.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/a-list-of-vulnerable-products-to-the-log4j-vulnerability/</loc>
		<lastmod>2022-11-03T13:16:40+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Log4j-vulnerability-list-of-impacted-products-cover-image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/supply-chain-attack-compromises-hundreds-of-u-s-news-websites/</loc>
		<lastmod>2022-11-04T10:16:08+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-32-12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-29-7.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/opera1er-gang-stole-11m-from-african-banks-and-telecom-companies/</loc>
		<lastmod>2022-11-04T11:19:52+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-11-04T125027.475.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/11-million-stolen-from-African-banks.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-romcom-rat-campaign-abusing-well-known-software-brands/</loc>
		<lastmod>2022-11-04T11:25:25+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-4-20.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/zz-romcom-fig02.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/twitter-8-fee-exploited-by-cybercriminals/</loc>
		<lastmod>2022-11-07T10:41:35+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-36-12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Twitter-phishing-site-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/all-uk-hosted-internet-devices-will-be-scanned-by-the-british-government/</loc>
		<lastmod>2022-11-07T11:01:07+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-11-07T122948.698.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/the-role-of-cybersecurity-in-accounting/</loc>
		<lastmod>2022-11-07T12:42:38+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-11-07T124231.110.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/1664362544385.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/1664362544123.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/continental-lockbit-ransomware/</loc>
		<lastmod>2022-11-07T14:36:25+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-11-07T163008.958.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cyberattack-causes-outage-on-maple-leaf-foods/</loc>
		<lastmod>2022-11-08T09:16:51+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-11-08T102935.420.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/the-new-malware-called-azov-ransomware-is-a-wiper-in-disguise/</loc>
		<lastmod>2022-11-08T10:08:43+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-116.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/justice-blade-cybercrime-gang-targets-saudi-arabia/</loc>
		<lastmod>2022-11-08T10:56:53+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-38-9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/dataleak-justiceblade.png</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->