<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//heimdalsecurity.com/blog/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://heimdalsecurity.com/blog/laplas-clipper-malware-aimed-at-cryptocurrency-users/</loc>
		<lastmod>2022-11-09T09:47:03+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-40-9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/massivemalwaredeployment.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/50k-bitcoin-from-the-silk-road-hack-found-and-seized-by-u-s-authorities/</loc>
		<lastmod>2022-11-09T10:01:31+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-6-17.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/lockbit-affiliate-uses-amadey-bot-in-phishing-campaign/</loc>
		<lastmod>2022-11-09T10:49:04+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-11-09T123829.238.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/malicious-extension-grants-threat-actors-remote-access-to-google-chrome/</loc>
		<lastmod>2022-11-09T12:20:29+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-11-09T134652.324.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Installed-extension-on-GC.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Clipper-Cloud9.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/thousands-of-sites-hacked-in-massive-google-seo-poisoning-campaign/</loc>
		<lastmod>2022-11-10T09:14:29+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-11-10T110710.330.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/social-media-influencer-sentenced-to-11-years-in-prison-for-cyber-fraud/</loc>
		<lastmod>2022-11-10T10:46:00+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-11-10T122627.481.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/worok-threat-group-uses-malicious-png-images-to-spread-malware/</loc>
		<lastmod>2022-11-11T10:41:48+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-12-18.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/phishing-attacks-abuse-microsoft-dynamics-365-customers/</loc>
		<lastmod>2022-11-11T10:54:09+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/phising-cover.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/future-of-women-in-cybersecurity/</loc>
		<lastmod>2022-11-11T13:43:34+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-61-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/french-furnishing-retail-giant-allegedly-hit-with-ransomware/</loc>
		<lastmod>2022-11-11T15:35:48+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/ransomware-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/chinese-cyberspies-responsible-for-badbazaar-android-malware/</loc>
		<lastmod>2022-11-14T08:56:41+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-44-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/1st-campaign-apps.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-extortion-scam-threatens-victims-with-data-leak/</loc>
		<lastmod>2022-11-14T09:11:31+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-3-32.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/ukrainian-organizations-infected-by-russian-hacktivists/</loc>
		<lastmod>2022-11-14T10:08:17+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-11-14T115346.889.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/fake-website-frwl.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/worok-abuses-dropbox-to-leak-data-via-backdoor-hidden-in-images/</loc>
		<lastmod>2022-11-14T10:53:40+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/worok-cover.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/australia-is-forming-a-squad-for-combating-cyber-threat-groups/</loc>
		<lastmod>2022-11-14T13:15:19+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-11-14T145017.325.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/giant-canadian-food-retailer-sobeys-a-victim-of-ransomware/</loc>
		<lastmod>2022-11-14T13:30:45+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-11-14T145804.004.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Sobeys-internauts-reddit.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Sobeys-ransom-message.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/turkey-restricts-social-media-channels-after-blast-in-taksim-istanbul/</loc>
		<lastmod>2022-11-14T15:40:09+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/turkey-social-media-ban.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/social-media-ban-in-turkey.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/us-health-department-venus-ransomware-is-targeting-healthcare-organizations/</loc>
		<lastmod>2022-11-15T08:57:57+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-11-11T115407.521.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Venus-Submissions-ID-Ransomware.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/microsoft-kerberos-authentication-fail/</loc>
		<lastmod>2022-11-15T09:32:05+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-11-15T112829.269.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/whoosh-confirms-breach-as-hackers-put-data-on-sale/</loc>
		<lastmod>2022-11-15T10:21:28+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-46-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Whooshhacker.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/billbug-threat-group-ongoing-campaign-unveiled/</loc>
		<lastmod>2022-11-16T10:55:06+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-6-18.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/thales-global-tech-company-data-released-by-lockbit-ransomware-gang/</loc>
		<lastmod>2022-11-16T11:38:41+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-11-16T132456.573.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Thales-LockBit-Ransomware.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Thales-Lockbit-Ransom-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/mfa-fatigue-attacks-are-on-the-rise/</loc>
		<lastmod>2022-11-17T10:06:38+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-11-17T105041.886.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/emotet-targets-amazon-dhl-and-the-ukrainian-war/</loc>
		<lastmod>2022-11-17T11:45:25+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/trojan-2-.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Emotetlures.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/suspected-leader-of-zeus-cybercrime-gang-arrested-in-switzerland/</loc>
		<lastmod>2022-11-17T12:57:58+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-11-17T143149.964.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Wanted-FBI-Tank.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/mobile-ransomware-the-next-step-for-cybercriminals/</loc>
		<lastmod>2022-11-17T15:07:59+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-6-6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/telemedicine-companies-jeopardize-patient-data/</loc>
		<lastmod>2022-11-18T08:39:54+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/health-data-privacy-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-shopping-phishing-scam-uses-uri-fragmentation-to-target-u-s-and-canadian-users/</loc>
		<lastmod>2022-11-18T10:25:50+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-12-19.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Screenshot-2022-11-18-120143.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/thanksgiving-con-artists-lurking-in-consumer-inboxes/</loc>
		<lastmod>2022-11-18T14:36:28+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/phishing.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/BlackFridayPhishingAvanan.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/zeppelin-ransomware-decryption-tool-secretly-deployed-to-aid-victims/</loc>
		<lastmod>2022-11-21T09:34:40+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-54-9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Screen-Shot-2020-03-13-at-6.16.01-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/digital-personal-data-protection-bill-2022-is-under-discussion-in-india/</loc>
		<lastmod>2022-11-21T10:24:38+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-18-24.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/chinese-group-mustang-pandas-spear-phishing-attack-targets-multiple-organizations-worldwide/</loc>
		<lastmod>2022-11-21T11:19:13+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-11-21T130308.666.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/australian-insurer-medibank-confirms-ransomware-attack/</loc>
		<lastmod>2022-11-21T12:02:18+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-70-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Notice-Email.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/10-suspects-charged-for-bec-scams-targeting-federal-funding-programs/</loc>
		<lastmod>2022-11-21T12:06:46+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-11-21T135339.038.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-ransomware-trick-encrypting-files-then-stealing-discord-accounts/</loc>
		<lastmod>2022-11-21T15:48:57+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/ransomware-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/a-google-chrome-extension-is-helping-hackers-steal-cryptocurrency-passwords/</loc>
		<lastmod>2022-11-22T09:24:59+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/venom-social.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/heatmap7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/google-sheets.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/venom-hijack.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Screenshot-2022-11-22-095844.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/ss2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/airasia-falls-victim-to-daixin-ransomware-gang/</loc>
		<lastmod>2022-11-22T09:33:30+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-56-9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Daixin-Ransomware.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/pii-breach-discovered-on-bahmni-hospital-management-system/</loc>
		<lastmod>2022-11-22T10:02:03+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2-27.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/1-11.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/apps-with-over-3-million-downloads-leak-algolia-api-keys/</loc>
		<lastmod>2022-11-22T10:56:43+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-11-22T124040.811.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/nuclear-facilities-data-leaked-dark-web/</loc>
		<lastmod>2022-11-22T12:28:59+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2-28.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/mfa-fatigue/</loc>
		<lastmod>2022-11-22T18:08:29+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-64-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/donut-extortion-group-targets-victims-with-double-extortion-ransomware-attacks/</loc>
		<lastmod>2022-11-23T09:41:01+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-11-23T112637.281.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/donut-ransomware-encrypted-files.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/donut-negotiation-site.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/discontinued-server-flaws-used-by-hackers-to-target-energy-orgs/</loc>
		<lastmod>2022-11-23T10:13:15+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-122.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/sharkbot-infects-thousands-of-android-users-with-a-hidden-file-manager-app/</loc>
		<lastmod>2022-11-23T10:21:33+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/sharkbot.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/x-file.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/targeted-banks.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/hackers-are-increasingly-using-aurora-infostealer-malware/</loc>
		<lastmod>2022-11-23T13:25:40+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-11-23T151913.208.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Cybergang-bragging-about-Aurora-infostealer.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Aurora-malware-advertisement.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/The-payload-loader-function-SEKOIA.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/heimdal-cybersecurity-strategy/</loc>
		<lastmod>2022-11-23T13:46:20+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/heimdal-cybersecurity-strategy-blog.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/vanuatu-systems-taken-offline-hackers/</loc>
		<lastmod>2022-11-23T15:36:28+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/government-cyberattack-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/eu-parliament-site-attacked-by-russian-hacktivists/</loc>
		<lastmod>2022-11-24T09:37:25+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2-29.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/the-ducktail-malware-operation-gains-new-capabilities/</loc>
		<lastmod>2022-11-24T11:21:14+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-11-24T121624.451.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/487-million-whatsapp-mobile-numbers-hacking-forum/</loc>
		<lastmod>2022-11-24T11:29:07+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-7-25.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/mali-gpu-patch-gap-leaves-android-users-vulnerable-to-attacks/</loc>
		<lastmod>2022-11-24T13:59:49+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/android-.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/over-1600-docker-hub-repositories-were-found-to-hide-malware/</loc>
		<lastmod>2022-11-25T10:44:09+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-11-25T121945.539.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/docker-hub-statistics.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/the-pig-butchery-scams-that-the-u-s-department-of-justice-just-busted/</loc>
		<lastmod>2022-11-25T12:13:44+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/pig-butchering-scams-.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/simexbiz_com-seizure-banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/interpol-130-million-seized-and-1000-suspects-arrested-in-operation-haechi-iii/</loc>
		<lastmod>2022-11-25T12:19:26+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-11-25T141025.515.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Arrest-in-Korea-Haechi-III.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/ransomexx2-linux-users-new-ransomware/</loc>
		<lastmod>2022-11-25T15:37:52+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/ransomware-1-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/fc-barcelonas-website-used-by-scammers-for-fraud/</loc>
		<lastmod>2022-11-28T10:38:26+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-11-28T120818.180.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/fc-barca-gambling-platform-scam.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/vice-society-ransomware-gang-strikes-again/</loc>
		<lastmod>2022-11-28T11:14:24+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-1-58.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/FiVcRyeXgAIRCRC-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/IKEA-Vice-Society.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/chinese-manufactured-cameras-to-be-removed-from-uk-sensitive-government-sites/</loc>
		<lastmod>2022-11-28T11:59:46+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-4-24.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/threat-actors-giveaway-5-4-million-twitter-user-data/</loc>
		<lastmod>2022-11-28T12:47:08+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/twitter-leakage.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/ransomware-gang-in-belgium-attacks-police-instead-of-belgian-municipality/</loc>
		<lastmod>2022-11-28T13:55:25+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/belgian-ransomware.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/ragnar-leak.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/ragnar.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/trending-tiktok-challenge-used-to-deploy-malware/</loc>
		<lastmod>2022-11-29T09:46:37+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-3-37.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/tiktokunfilter.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/1_u7o2IeSBiEcIlgjq_cT8Bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/the-u-s-bans-the-sale-of-huawei-zte-and-other-chinese-manufacturers-equipment/</loc>
		<lastmod>2022-11-29T11:06:39+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-11-29T123930.824.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/malicious-android-app-powering-a-spam-service/</loc>
		<lastmod>2022-11-29T13:05:34+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/android.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/symoo-complete.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Fip6YPMWQAEo_r7.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/meta-received-a-275-million-fine-following-the-2021-massive-data-leak/</loc>
		<lastmod>2022-11-29T13:36:28+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-11-29T151216.834-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/zero-day-exploit-prices-signal-skyrocket/</loc>
		<lastmod>2022-11-29T13:37:33+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/zero-day-exploit-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/ransomware-scam-in-cuba-raked-in-60-million-from-over-100-victims/</loc>
		<lastmod>2022-12-02T11:13:18+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-126.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Cuba-ransomware-sample-submissions-ID-Ransomware.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/schoolyard-bully-trojan-facebook-accounts/</loc>
		<lastmod>2022-12-02T12:20:26+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-12-20.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/spanish-authorities-bust-e12m-investment-scam-operation/</loc>
		<lastmod>2022-12-02T13:10:13+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-12-02T144552.110.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/no-customer-data-or-encrypted-password-vaults-were-breached-in-lastpass-incident/</loc>
		<lastmod>2022-12-02T15:14:44+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-9-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-22-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/malicious-apps-with-over-2-million-installs-found-on-google-play/</loc>
		<lastmod>2022-12-05T10:18:03+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-12-05T112903.908.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/tunebox-google-play.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/lazarus-hacking-group-uses-new-fake-crypto-app-to-spread-malware/</loc>
		<lastmod>2022-12-05T11:12:45+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-1-60.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Volexity_AppleJeus-Lazarus_Figure-05-1024x195.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/phishing-attack-strikes-apple-users-during-black-friday-sales/</loc>
		<lastmod>2022-12-05T12:17:54+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-13-23.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/a-new-malware-exploits-a-critical-vulnerability-on-redis-servers/</loc>
		<lastmod>2022-12-05T13:43:56+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-12-05T152833.818.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/redis-malware.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-siriusxm-vulnerability-allows-hackers-to-unlock-and-start-connected-cars-remotely/</loc>
		<lastmod>2022-12-05T15:36:43+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-12-05T171424.764.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/freebsd-systems-exposed-to-compromise-due-to-ping-vulnerability/</loc>
		<lastmod>2022-12-06T09:15:26+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-7-26.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/french-hospital-forced-to-transfer-patients-after-ransomware-attack/</loc>
		<lastmod>2022-12-06T09:42:55+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-12-06T112413.017.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cryptonite-ransomware-toolkit-unintentionally-transforms-into-a-wiper/</loc>
		<lastmod>2022-12-06T10:58:10+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2-33.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/threat-actors-hijack-linux-devices/</loc>
		<lastmod>2022-12-06T11:34:22+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-15-22.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cisa-urges-agencies-to-patch-a-google-chrome-bug-by-december-26th/</loc>
		<lastmod>2022-12-06T11:36:51+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-12-06T130826.613.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/blackproxies-service-gains-notoriety-in-the-cybercrime-world/</loc>
		<lastmod>2022-12-06T13:07:26+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-9-31.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/BL-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/BL-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/microsoft-warns-of-russian-cyberattacks-throughout-the-winter/</loc>
		<lastmod>2022-12-06T13:46:39+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/russian-cyberattack.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/iranian-state-backed-hackers-attack-independent-groups-in-the-middle-east/</loc>
		<lastmod>2022-12-07T12:06:51+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-4-26.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/china-may-be-behind-the-latest-cyber-attack-on-middle-eastern-telecoms/</loc>
		<lastmod>2022-12-07T12:11:29+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/china-cyber-attack.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hackers.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/russian-bank-vtb-is-currently-under-the-largest-cyber-attack-in-its-history/</loc>
		<lastmod>2022-12-07T12:50:27+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-12-07T140441.231.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/IT-Army-of-Ukraine-Claims-Attack-Against-VTB.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/a-u-s-federal-agency-was-the-victim-of-iranian-government-sponsored-hackers/</loc>
		<lastmod>2022-12-07T16:20:30+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-8-26.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/winnti-threat-group-attacks-government-organizations-in-hong-kong-and-siri-lanka/</loc>
		<lastmod>2022-12-07T16:22:31+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2-18.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/backdoor-malware-hidden-inside-windows-logo-image/</loc>
		<lastmod>2022-12-07T16:26:00+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-32-10.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/check-out-these-new-details-on-the-costa-rica-government-attack-by-conti-ransomware/</loc>
		<lastmod>2022-12-07T16:28:23+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_7531813068.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Conti-scanning-the-network-of-Costa-Rica-govt.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/nvidia-code-signing-certificates-leveraged-to-sign-malware/</loc>
		<lastmod>2022-12-07T16:30:32+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/NVIDIA-Code-Signing-Certificates-used-to-sign-malware-cover-image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/fbi-reveals-hive-ransomware-extorted-100m-from-1300-companies/</loc>
		<lastmod>2022-12-07T16:32:55+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-11-18T134657.929.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/IOCs-FBI-Hive.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/tata-powers-it-infrastructure-hit-by-cyberattack/</loc>
		<lastmod>2022-12-07T16:33:26+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-69-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hive-tata-leaks.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/hive-ransomware-claims-responsibility-for-nyra-attack/</loc>
		<lastmod>2022-12-07T16:33:50+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-15-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/NYRA-Hive-Attack.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/hive-ransomware-group-hits-bell-canada-subsidiary/</loc>
		<lastmod>2022-12-07T16:34:17+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-2-17.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hive-leak-confirmation.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/french-brand-intersport-hit-by-ransomware-group-hive/</loc>
		<lastmod>2022-12-08T08:53:57+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-12-08T102650.377.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/microsoft-warns-new-threat-actors-after-cryptocurrency-companies/</loc>
		<lastmod>2022-12-08T12:22:28+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-19-18.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/diamond-industry-attacked-by-iranian-hackers-with-data-wiping-malware/</loc>
		<lastmod>2022-12-09T10:45:53+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-12-09T115033.253.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/commonspirit-health-breached-over-623000-patients-data-exposed/</loc>
		<lastmod>2022-12-09T12:22:12+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-12-09T140917.074.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/successful-phishing-attack-causes-dropbox-data-breach/</loc>
		<lastmod>2022-12-09T13:26:01+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-115.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/muddywater-threat-group-phishing-attacks/</loc>
		<lastmod>2022-12-09T14:49:07+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-25-10.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/clop-ransomware-uses-viral-truebot-malware-to-access-networks/</loc>
		<lastmod>2022-12-12T10:08:07+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/truebot-social-cover.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/botnets.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/truebot-diagram.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/teleport-modes.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/truebot-post.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/toolstimeline.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/unpatched-vulnerabilities-cause-pulse-connect-secure-hosts-to-be-at-risk/</loc>
		<lastmod>2022-12-12T11:03:22+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-15-23.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/cve.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/cve1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/by-country.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/man-arrested-for-hacking-ny-hair-salons-pos-provider-and-stealing-400k/</loc>
		<lastmod>2022-12-12T12:54:53+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-12-12T141337.414.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/antwerp-goes-offline-following-ransomware-attack/</loc>
		<lastmod>2022-12-13T07:50:30+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-11-22.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/amazon-shoppers-warned-to-watch-out-for-holiday-scams/</loc>
		<lastmod>2022-12-13T10:40:44+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/amazon-cover.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Colorful-Circle-Infographic-Chart-Instagram-Post.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/linux-users-hit-with-chaos-malware-in-cybersecurity-mining-campaign/</loc>
		<lastmod>2022-12-13T11:01:16+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-12-13T122830.311.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-uber-data-breach-exposes-information-employees/</loc>
		<lastmod>2022-12-13T11:17:53+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-30-10.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/python-and-javascript-developers-exposed-to-malware/</loc>
		<lastmod>2022-12-13T11:25:12+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-17-22.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Screen-Shot-2022-12-09-at-11.47.45.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/github.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/indian-ministry-of-external-affairs-platform-leaked-expats-passport-information/</loc>
		<lastmod>2022-12-13T16:20:34+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-12-13T173541.137.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Cybernews-Indian-Portal-Exposes-Expats-Info.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-actively-exploited-zero-day-vulnerability-discovered-in-apple-products/</loc>
		<lastmod>2022-12-14T09:15:36+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-132.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/gotrim-botnet-goes-after-wordpress-admin-accounts/</loc>
		<lastmod>2022-12-14T11:01:04+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-21-15.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/gotrim-botnet.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/response.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/citrix-adc-and-gateway-zero-day-exploited-by-hackers/</loc>
		<lastmod>2022-12-14T11:08:05+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-12-14T125128.854.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/the-new-deepfake-regulations-in-china-raise-multiple-issues/</loc>
		<lastmod>2022-12-14T11:49:55+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-3-40.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/malicious-windows-drivers-ransomware-attacks/</loc>
		<lastmod>2022-12-14T13:52:03+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-31-8.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/california-state-finance-department-lockbit-ransomwares-latest-victim/</loc>
		<lastmod>2022-12-15T08:39:29+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-12-14T115937.435.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Ransom-Note-Lockbit-California-Department-of-Finance.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Tweet-IAB-California-Finance-Department.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/the-fbi-just-seized-48-domain-names-linked-to-ddos-for-hire-platforms/</loc>
		<lastmod>2022-12-15T10:51:59+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/ddos.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/stressor-test.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/booter-ad.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-attack-vector-144k-phishing-packages-found-on-open-source-repositories/</loc>
		<lastmod>2022-12-15T11:03:26+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-4-28.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/image_06.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/mozilla-fixes-firefox-vulnerabilities-that-could-have-lead-to-system-takeover/</loc>
		<lastmod>2022-12-15T11:43:18+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-12-15T122900.150.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/social-blade-suffers-data-breach/</loc>
		<lastmod>2022-12-15T14:39:59+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-12-15T140525.725.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/social-blade-email.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/hackers-use-svg-files-to-spread-qbot-malware-onto-windows-systems/</loc>
		<lastmod>2022-12-15T14:45:03+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-12-15T163304.836.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/SVG-base64-encoded.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/SVG-infection-chain.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/windows-zero-day-exploited-ransomware-fixed/</loc>
		<lastmod>2022-12-16T10:34:26+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-35-12.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/8-social-media-influencers-accused-of-securities-fraud-in-the-us/</loc>
		<lastmod>2022-12-16T10:36:21+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-6-23.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/ukrainian-government-hacked-malicious-iso-files/</loc>
		<lastmod>2022-12-16T12:00:48+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-36-13.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/phishing-attack-uses-facebook-posts-to-evade-email-security/</loc>
		<lastmod>2022-12-16T12:17:04+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2-36.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/phishing-email5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/fbpost.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/drettgtret.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2fa-page1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/fake-accounts.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/microsoft-minecraft-servers-are-being-attacked-by-a-cross-platform-ddos-botnet/</loc>
		<lastmod>2022-12-16T14:00:22+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-12-16T152730.603.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/DDos-Botnet-Mincraft.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Minecraft-DDos-Botnet-Attack-Flow.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/fbi-info-sharing-platform-infragard-was-hacked/</loc>
		<lastmod>2022-12-19T09:58:07+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-29-9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/breachedige.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/infraletter.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/glupteba-malware-is-back-again-heres-what-you-need-to-know/</loc>
		<lastmod>2022-12-19T10:47:18+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/glupteba-cover.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/discover-function.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/campaigns1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/blackcat-ransomware-targets-colombian-energy-supplier-epm/</loc>
		<lastmod>2022-12-19T12:54:15+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-12-19T133811.266.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/balckcat-epm-ransomware.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/spnego-vulnerability-lets-attackers-execute-code-remotely/</loc>
		<lastmod>2022-12-19T13:41:21+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-41-10.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/sevenrooms-restaurant-platform-sufferes-a-data-breach/</loc>
		<lastmod>2022-12-19T14:22:13+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2-37.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Screenshot-2022-12-19-160519.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/australian-fire-and-rescue-service-confirms-cyber-attack/</loc>
		<lastmod>2022-12-20T10:20:12+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-12-23.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/threat-actors-target-ukraines-delta-military-system-with-info-stealing-malware/</loc>
		<lastmod>2022-12-20T10:30:28+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/malware-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/play-ransomware-gang-hits-german-hotel-chain/</loc>
		<lastmod>2022-12-20T11:14:54+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-1-67.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/play-ransomware.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/all-github-users-will-need-to-enable-2fa-by-the-end-of-2023/</loc>
		<lastmod>2022-12-20T11:56:35+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-12-20T134519.124.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/GitHub-2FA-process-2023.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/67k-customers-had-their-data-leaked-in-a-credential-stuffing-attack-over-draftkings/</loc>
		<lastmod>2022-12-20T11:57:47+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-137.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Screenshot-2022-12-20-133335.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/ring-digital-cameras-used-in-a-widespread-police-prank/</loc>
		<lastmod>2022-12-21T09:48:51+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2-38.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-microsoft-exchange-exploit-used-by-ransomware-gang-to-breach-servers/</loc>
		<lastmod>2022-12-21T10:09:30+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-12-21T115711.134.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/play-poc.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/raspberry-robin-fake-malware-avoid-detection/</loc>
		<lastmod>2022-12-21T11:28:27+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-46-9.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/agenda-ransomware-steals-sensitive-data-from-critical-infrastructure/</loc>
		<lastmod>2022-12-21T12:53:04+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/dd.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/image2-1-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/recently-discovered-risepro-malware-is-a-vidar-stealer-derivative/</loc>
		<lastmod>2022-12-21T12:56:33+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-12-21T142529.111.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/risepro-is-the-new-vidar-stealer.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/corsair-bug-in-keyboard-causes-typing-without-users-consent/</loc>
		<lastmod>2022-12-22T10:05:56+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-1-70.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/forum-posts.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/british-newspaper-the-guardian-targeted-by-cyberattack/</loc>
		<lastmod>2022-12-22T14:43:34+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-71.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/The-Guardian-Headquarters.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/vulnerabilities-discovered-in-passwordstate-credential-management-solution/</loc>
		<lastmod>2022-12-23T09:28:07+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-6-24.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/fin7-hackers-use-checkmarks-to-exploit-exchange-servers/</loc>
		<lastmod>2022-12-23T10:25:52+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-18-27.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/FIN7-victims.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/threat-actors-hacked-lastpass-cloud-storage-and-stole-customers-data/</loc>
		<lastmod>2022-12-23T10:32:40+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/cloud-storage.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/sports-betting-company-betmgm-suffered-a-data-breach/</loc>
		<lastmod>2022-12-23T11:54:23+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-12-23T134240.427.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/BetMGM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/facebook-to-pay-725-million-to-settle-lawsuit-over-data-leak/</loc>
		<lastmod>2022-12-27T10:49:20+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-5-38.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cryptocurrency-exchange-btc-com-suffers-massive-cyber-attack/</loc>
		<lastmod>2022-12-28T08:22:15+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-5-39.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/telecom-company-intrado-hit-by-royal-ransomware-cyberattack/</loc>
		<lastmod>2022-12-29T10:56:39+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-12-29T124841.626.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/royal-ransomware-intrado.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/louisiana-hospital-suffered-a-ransomware-attack/</loc>
		<lastmod>2022-12-29T13:22:42+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-12-29T145558.534.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Louisiana-hospital-ransomware-attack.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/google-ads-exploited-to-spread-malware/</loc>
		<lastmod>2022-12-29T13:23:38+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-5-41.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Screenshot-2022-12-29-144403.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/r-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cisa-adds-new-active-exploitation-of-jasperreports-vulnerabilities/</loc>
		<lastmod>2022-12-30T09:58:49+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-12-30T112624.043.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/ciso-jasperreports-flaws.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/top-cyberattacks-of-2022/</loc>
		<lastmod>2022-12-30T17:37:23+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-12-30T183607.587.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/the-kronos-ransomware-attack-heres-what-you-need-to-know/</loc>
		<lastmod>2023-01-03T09:39:23+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-5-40.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Colorful-Minimalist-Linear-Steps-Circular-Diagram-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/pytorch-dependency-compromised/</loc>
		<lastmod>2023-01-03T09:47:15+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Pytorch-attack.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/chinese-students-in-the-u-k-are-victims-of-redzei-scam-calls/</loc>
		<lastmod>2023-01-03T09:47:38+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-11-25.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Screenshot-2023-01-03-113244.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/ransomware-gang-clones-website-to-leak-stolen-data/</loc>
		<lastmod>2023-01-03T09:47:58+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-22-16.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/clonesite.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/canadian-mining-company-targeted-by-ransomware/</loc>
		<lastmod>2023-01-03T09:48:03+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-01-03T112810.102.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/lockbit-ransomware-gives-free-decryptor-to-sickkids-hospital/</loc>
		<lastmod>2023-01-03T09:48:04+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/fth.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/lockbit-site.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/vulnerability-in-google-home-speaker-allowed-eavesdropping/</loc>
		<lastmod>2023-01-03T11:33:06+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-01-03T130002.437.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-01-03T122914.349.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/financial-and-insurance-sectors-in-europe-targeted-by-raspberry-robin-worm/</loc>
		<lastmod>2023-01-03T15:57:09+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-01-03T174344.649.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/poland-warns-of-cyberattacks-by-the-russia-linked-ghostwriter-group/</loc>
		<lastmod>2023-01-04T09:53:34+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/1-11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/dec-tax.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/critical-vulnerabilities-expose-automotive-giants-to-cyberthreats/</loc>
		<lastmod>2023-01-04T10:28:25+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-26-15.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/growing-interest-in-flipper-zero-capitalized-by-cybercriminals-in-phishing-campaign/</loc>
		<lastmod>2023-01-04T10:34:21+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-01-04T114901.649.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/flipper-zero-fake-twitter-account.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/fake-flipper-zero-shop.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/flipper-zero-fake-crypto-payment.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/bitrat-malware-campaign/</loc>
		<lastmod>2023-01-04T11:08:45+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/bitrat-phishing.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/wabtec-u-s-rail-company-under-a-ransomware-attack/</loc>
		<lastmod>2023-01-04T11:15:36+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-1-71.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/queensland-university-of-technology-royal-ransomwares-newest-target/</loc>
		<lastmod>2023-01-04T11:54:59+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-01-04T132258.116.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Royal-Ransomware-QUT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/meta-fined-414-million-by-irish-regulators-for-using-personal-data-for-advertising/</loc>
		<lastmod>2023-01-05T10:00:43+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-01-05T114325.333.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/200-million-twitter-profiles-database-giveaway-on-hacker-forum/</loc>
		<lastmod>2023-01-05T10:08:35+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-52-8.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/arnold-clark-auto-retail-giant-was-victim-of-a-cyberattack-on-christmas-eve/</loc>
		<lastmod>2023-01-05T10:29:17+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-3-44.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/attention-developers-circleci-security-breach-heres-what-you-need-to-know/</loc>
		<lastmod>2023-01-05T11:57:31+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-5-44.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/circleci-email-notification.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/fake-message.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cricket-platform-exposed-over-100k-customer-data-entries/</loc>
		<lastmod>2023-01-05T16:00:52+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-01-05T133909.388.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/rackspace-has-fallen-victim-to-ransomware-heres-what-you-need-to-know/</loc>
		<lastmod>2023-01-06T09:33:27+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-7-30.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/bluebottle-cybercrime-group-is-targeting-banks-in-african-countries/</loc>
		<lastmod>2023-01-06T09:45:50+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-30-11.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/warning-spyware-attacks-targeting-banks-are-on-the-rise/</loc>
		<lastmod>2023-01-06T10:24:56+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-53-7.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/whatsapp-adds-proxy-support-to-bypass-internet-shutdowns/</loc>
		<lastmod>2023-01-06T10:45:28+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-01-06T124421.048.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/whatsapp-proxy-settings.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/apple-fined-8-0m-in-france-for-data-collecting-issues/</loc>
		<lastmod>2023-01-06T10:56:35+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-5-45.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/blind-eagle-is-back-with-new-tools-and-a-complex-infection-chain/</loc>
		<lastmod>2023-01-06T11:42:31+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-01-06T132358.700.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Infection-chain-blind-eagle.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/confidential-computing-what-is-it-and-what-are-its-benefits/</loc>
		<lastmod>2023-01-06T11:53:26+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-14-25.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/cybernews-logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/british-schools-data-leaked-by-vice-society-ransomware-gang/</loc>
		<lastmod>2023-01-06T12:05:40+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-32-14.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/ransomware-5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/reflections-on-the-cloudstar-ransomware-attack/</loc>
		<lastmod>2023-01-06T15:49:33+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-9-35.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Colorful-Product-Category-Diagram.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/air-france-and-klm-alert-customers-of-account-security-breach/</loc>
		<lastmod>2023-01-09T09:36:43+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-11-26.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Air-France%E2%80%93KLM-breach-notification.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/fake-pokemon-nft-website-distributes-netsupport-rat-malware/</loc>
		<lastmod>2023-01-09T10:21:30+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-139.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Screenshot-2023-01-09-115153.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/turla-uses-old-malware-attack-ukrainians/</loc>
		<lastmod>2023-01-09T10:55:12+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-55-11.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/threat-actors-abuse-visual-studio-marketplace-to-target-developers/</loc>
		<lastmod>2023-01-09T11:02:27+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-01-09T124100.890.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/chick-fil-a-is-investigating-suspicious-activity-on-customer-accounts/</loc>
		<lastmod>2023-01-09T12:02:36+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-01-09T132614.167.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Chick-fil-A.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Account-hacked-chik-fil-a.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/altered-zoom-app-found-delivering-banking-malware/</loc>
		<lastmod>2023-01-10T10:10:25+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-36-14.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/ZE-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/chatgtp-used-by-threat-actors-to-create-deployable-malware/</loc>
		<lastmod>2023-01-10T10:11:22+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-01-10T112525.674.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/u-k-agency-the-victim-of-a-redirect-attack-that-sent-users-to-fake-porn-sites/</loc>
		<lastmod>2023-01-10T16:26:53+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2-41.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cisa-adds-two-more-security-vulnerabilities-to-its-kev-catalog/</loc>
		<lastmod>2023-01-11T10:50:54+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-01-11T122021.967.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/apt-group-dark-pink-doubles-down-on-government-and-military-targets-with-custom-malware/</loc>
		<lastmod>2023-01-11T12:28:22+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-14-26.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/overview.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/attack-chain-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/cucky.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/kakabot.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/vidar-malware-impersonating-anydesk/</loc>
		<lastmod>2023-01-11T13:21:49+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-57-9.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-network-segmentation/</loc>
		<lastmod>2023-01-11T14:18:33+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-01-06T170447.715.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/lorenz-backdoor-how-ransomware-gangs-are-exploiting-old-vulnerabilities-to-plant-malware/</loc>
		<lastmod>2023-01-11T14:45:53+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-15-25.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cyberattack-cancels-classes-iowa/</loc>
		<lastmod>2023-01-11T15:28:35+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-58-7.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/high-severity-vulnerability-discovered-in-the-jsonwebtoken-library/</loc>
		<lastmod>2023-01-12T09:17:16+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-40-11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/image2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/JWT-Figure-6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/twitter-rejects-responsibility-leakage-january/</loc>
		<lastmod>2023-01-12T12:26:20+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-60-6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/microsoft-vall-e-ai-realistically-imitates-voice/</loc>
		<lastmod>2023-01-13T08:31:20+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-43-9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-42-12.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/europol-takes-down-crypto-scams-related-call-centers-across-europe/</loc>
		<lastmod>2023-01-13T11:05:15+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2-42.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/how-the-lockbit-ransomware-group-brought-royal-mail-to-its-knees/</loc>
		<lastmod>2023-01-13T12:24:29+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-20-20.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/royal-mail-lockbit-ransom-note.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-address-poisoning-cryptocurrency-scam-is-targeting-metamask-users/</loc>
		<lastmod>2023-01-13T14:05:43+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-01-13T155429.906.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-research-shows-raspberry-robin-can-be-repurposed-by-other-threat-actors/</loc>
		<lastmod>2023-01-13T14:33:49+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-01-13T162308.842.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Capture-decran-de-2023-01-04-14-40-28-1024x578.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Raspberry-Robin-Map.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/malicious-vpn-installers-used-to-infect-devices-with-spyware/</loc>
		<lastmod>2023-01-16T09:46:17+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-46-10.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/tiktok-fined-5-4-million-by-french-authorities-over-cookie-opt-out-feature/</loc>
		<lastmod>2023-01-16T10:59:53+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-01-16T124355.560.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/credit-card-skimmer-canada-alcohol-retailers-site/</loc>
		<lastmod>2023-01-16T11:05:56+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-64-6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cybercriminals-are-using-malicious-jars-and-polyglot-files-to-distribute-malware/</loc>
		<lastmod>2023-01-16T13:53:43+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-1-74.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/fig6-html-jar-polyglot-with-html-extension-properly-rendered-in-the-browser-and-properly-executed-by-jre.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/danish-danskespil-dk-smishing/</loc>
		<lastmod>2023-01-16T14:17:02+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Cover-Danish-100.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-15-26.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-17-25.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/europol-dismantled-a-cybercrime-ring-involved-in-cryptocurrency-scams/</loc>
		<lastmod>2023-01-16T15:51:31+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-01-16T173707.815.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/proof-of-concept-exploit-code-to-be-released-for-critical-zoho-rce-bug/</loc>
		<lastmod>2023-01-17T08:45:49+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-01-17T102615.888.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/horizon3-exploit.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cias-hive-attack-kit-has-been-pirated-by-hackers/</loc>
		<lastmod>2023-01-17T08:50:16+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-3-46.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cisa-warns-vulnerabilities-industrial-control-systems/</loc>
		<lastmod>2023-01-17T11:05:44+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-68-5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/how-vice-societys-ransomware-attack-impacted-university-of-duisburg-essen/</loc>
		<lastmod>2023-01-17T13:53:55+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-24-17.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/huge-network-of-fake-cracked-software-distributes-raccoon-and-vidar-malware/</loc>
		<lastmod>2023-01-17T15:04:13+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-01-17T163703.425.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Racoon-and-Vidar-Download-via-SEO-Poisoning-Technique-.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/malicious-download-links-impersonating-popular-software-pushed-by-hackers-through-google-ads/</loc>
		<lastmod>2023-01-18T09:46:21+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-01-18T112109.356.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/rufus-malicious-downloader.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/malicious-downloader-notepad.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/malicious-downloader-ccleaner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/1000-vessels-affected-by-ransomware-attack-on-marine-software-provider-dnv/</loc>
		<lastmod>2023-01-18T10:21:10+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-01-18T120131.511.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/data-leaks-how-an-hr-platform-left-employees-private-data-exposed/</loc>
		<lastmod>2023-01-18T12:04:15+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-28-15.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Tax_payer_number_1.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Banking_info.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/bitzlato-crypto-exchange-seized-in-major-money-laundering-and-ransomware/</loc>
		<lastmod>2023-01-19T09:31:31+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-30-12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Bitzlato-seizure-banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Blitzlato-hack-warning.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/russian-hackers-attack-ukraines-news-agency-with-a-data-wiper/</loc>
		<lastmod>2023-01-19T10:09:24+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2-44.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/mailchimp-data-breach-social-engineering/</loc>
		<lastmod>2023-01-19T10:57:38+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-74-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/ny-man-admits-to-leading-massive-credit-card-scam-that-impacted-thousands/</loc>
		<lastmod>2023-01-19T11:35:10+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-01-19T132900.289.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/backdoordiplomacy-attacks-iranian-government-entities/</loc>
		<lastmod>2023-01-19T13:07:58+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-51-9.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cybersecurity-flaw-at-baby-shark-app-developer-pinkfong-causes-data-leak/</loc>
		<lastmod>2023-01-19T14:28:48+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-7-15.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/how-ransomware-spreads/</loc>
		<lastmod>2023-01-19T16:45:28+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-26-16.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Navy-White-Simple-Good-Order-Process-Infographic.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Yellow-Illustrated-Path-Design-Process-Timeline-Infographic.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Yellow-Minimalist-and-Simple-Corporate-Business-Plan-Process-Data-Graph.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/russian-hackers-attack-samsung/</loc>
		<lastmod>2023-01-20T09:33:35+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-53-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/EDsamsung-sample-data.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/t-mobile-api-data-breach-affects-37-million-customers/</loc>
		<lastmod>2023-01-20T12:31:30+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-01-20T141759.996.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/app-spoofing-ad-fraud-affects-11-million-devices/</loc>
		<lastmod>2023-01-23T11:54:14+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-01-23T134131.147.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/google-sued-for-monopolizing-the-online-ad-market/</loc>
		<lastmod>2023-01-25T10:59:18+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-1-76.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/ddos-attacks-in-2022-exceeded-all-records-says-russias-largest-isp/</loc>
		<lastmod>2023-01-25T11:50:24+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-01-25T132804.906.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/DDoS-Attacks-Russia-2022.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Attack-Distribution-Russia-2022.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/lazarus-group-confirmed-responsible/</loc>
		<lastmod>2023-01-26T09:15:06+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-55-12.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/how-hackers-used-legitimate-software-to-breach-u-s-federal-agencies/</loc>
		<lastmod>2023-01-26T09:49:46+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-35-14.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/killnet-russian-hacking-group-ddos-attacks-german-websites/</loc>
		<lastmod>2023-01-26T10:26:27+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/russian-cyberespionage.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/dns-propagation/</loc>
		<lastmod>2023-01-27T09:25:41+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-21-14.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/fbi-closes-down-hives-ransomware-gang/</loc>
		<lastmod>2023-01-27T10:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-37-16.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/1674765608360.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/security-flaws-samsungs-galaxy-store-android/</loc>
		<lastmod>2023-01-27T11:23:53+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/cybercriminal-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/samsung-galaxy-store-flaws.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-linux-botnet-discovered/</loc>
		<lastmod>2023-01-27T11:42:58+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-03-16T140603.552.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/aurora-stealer-malware-shapeshifting-tactics/</loc>
		<lastmod>2023-01-27T12:12:16+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-65-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Aurora-malware-advertisement-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/image2-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/threat-actor-exposed-golden-chicken-malware/</loc>
		<lastmod>2023-01-30T09:52:04+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-67-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/VenomSpider_Picture11.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/swiftslicer-new-data-wiping-attacks-windows/</loc>
		<lastmod>2023-01-30T10:02:54+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/cybercriminal-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-mimic-ransomware-uses-windows-search-engine-to-find-and-encrypt-files/</loc>
		<lastmod>2023-01-30T12:12:17+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-39-15.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/mimic-ransomware-abuses-windows-search-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/mimic-ransomware-abuses-windows-search-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/mimic-ransomware-abuses-windows-search-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/mimic-ransomware-abuses-windows-search-3-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/10-million-jd-sports-customers-had-their-data-exposed-in-a-data-breach/</loc>
		<lastmod>2023-01-31T09:50:31+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-1-77.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Screenshot-2023-01-31-113129.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cybersecurity-risk-management/</loc>
		<lastmod>2023-01-31T13:10:28+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-01-20T121922.062.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Step-by-step-design-process-infographics.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/tsa-u-s-no-fly-list-gets-leaked-on-hacking-forum/</loc>
		<lastmod>2023-01-31T14:19:36+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-01-31T135147.769.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/tsa-nofly-post.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/hackers-stole-github-desktop-and-atom-code-signing-certificates/</loc>
		<lastmod>2023-01-31T15:35:13+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Hackers-Stole-GitHub-Desktop-and-Atom-Code.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/threat-actors-gained-access-to-google-fi-customers-information/</loc>
		<lastmod>2023-02-01T09:59:57+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-02-01T112707.711.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-versions-of-prilex-pos-malware-can-block-contactless-transactions/</loc>
		<lastmod>2023-02-01T13:00:54+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-4-39.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Prilex_blocks_NFC_02-1024x125.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/russian-hacktivists-target-us-and-dutch-hospitals/</loc>
		<lastmod>2023-02-01T13:36:37+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Russian-Hacktivists-Target-US-and-Dutch-Hospitals.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/pro-russian-hackers-target-european-hospitals/</loc>
		<lastmod>2023-02-02T09:55:35+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-02-02T112439.554.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/inthebox-threat-actor-sells-over-1800-web-injects-on-cybercrime-forums/</loc>
		<lastmod>2023-02-02T10:16:42+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-6-28.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Screenshot-2023-02-02-120106.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-oauth/</loc>
		<lastmod>2023-02-02T11:11:10+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/OAuth.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/What-is-OAuth.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/data-breach-gives-threat-actors-information-vevor-clients/</loc>
		<lastmod>2023-02-02T14:19:21+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-26-13.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/godfather-a-new-android-banking-trojan/</loc>
		<lastmod>2023-02-02T16:46:34+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-4-29.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Screenshot-2022-12-22-113133.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/riot-games-receives-a-10-million-ransom-demand/</loc>
		<lastmod>2023-02-02T16:50:17+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-01-25T122809.791.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/lockbit-uses-conti-based-encryptor/</loc>
		<lastmod>2023-02-03T13:02:20+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/lockbit-ransomware-goes-green.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/ransom-note.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/seo-poisoning-attack/</loc>
		<lastmod>2023-02-03T14:43:38+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-18-29.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/SEO-poisoning-indicators-Heimdal.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/how-to-protect-your-esxi-servers-from-the-nevada-ransomware-attacks/</loc>
		<lastmod>2023-02-06T09:54:04+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-41-12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/note.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/pixpirate-malware-stealing-banking-passwords/</loc>
		<lastmod>2023-02-07T10:50:41+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-69-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/pixpirate.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/iranian-threat-group-charlie-hebdo-breach/</loc>
		<lastmod>2023-02-07T14:40:42+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hacker-iran-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/how-hackers-backdoor-windows-devices-in-sliver-and-byovd-attacks/</loc>
		<lastmod>2023-02-07T15:06:06+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-43-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/commands.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/security-prods.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/obf-backdoor.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/microsoft-azure-vulnerable-server-side-request-forgery/</loc>
		<lastmod>2023-02-08T08:37:47+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-70-5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/emojideploy-a-new-microsoft-azure-vulnerability-for-rce-attacks/</loc>
		<lastmod>2023-02-08T08:38:55+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-31-10.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/lego-tackles-security-flaws-avoids-bricklink-compromise/</loc>
		<lastmod>2023-02-08T08:39:56+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-27-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/flawed-field.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/xxe1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/russian-citizen-accused-of-laundering-money-from-u-s-targeted-ransomware-attacks/</loc>
		<lastmod>2023-02-08T10:02:40+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2-48.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/us-grocery-delivery-platform-weee-suffers-massive-data-leak/</loc>
		<lastmod>2023-02-08T11:25:23+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-02-08T125933.526.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/weee-leak-announcement.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/mirai-based-medusa-botnet-is-back-with-ransomware-capabilities/</loc>
		<lastmod>2023-02-08T15:03:39+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Medusa-Botnet-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Medusa-for-sale.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Ransom-Message-Medusa.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Data-exfiltration-Medusa.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/The-Telnet-Attack-Function.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/container-security-best-practices/</loc>
		<lastmod>2023-02-09T08:45:26+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/container-security-best-practices-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/dota-2-game-mods-use-backdoor-to-infect-players-with-malware/</loc>
		<lastmod>2023-02-09T09:21:06+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-02-09T110146.609.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/lua-backdoor-code.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/list-of-proxy-ips-used-by-killnet-released/</loc>
		<lastmod>2023-02-09T11:19:44+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/List-of-Proxy-IPs-Used-by-Killnet-Released-Today.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Killnet-announcement.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-api-security/</loc>
		<lastmod>2023-02-09T15:53:29+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-02-09T170057.357.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/reddit-breached-threat-actors-steal-source-code-and-internal-data/</loc>
		<lastmod>2023-02-10T09:19:38+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-02-10T104439.847.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/distributed-denial-of-service-attacks-against-russia-have-tripled/</loc>
		<lastmod>2023-02-10T12:13:41+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/DDoS-Attack-Distributed-Denial-of-Service-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/ddos-attack-distributed-denial-of-service/</loc>
		<lastmod>2023-02-10T12:14:27+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-22.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/DDoS-Attack-Distributed-Denial-of-Service.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/osi-layers-model.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/DDoS-Infographic-min.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/mirai-botnet-phenomenon/</loc>
		<lastmod>2023-02-10T12:16:28+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Vladimir-Botnet-Attack-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/timeline-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Phylogenic-graph.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-an-it-asset/</loc>
		<lastmod>2023-02-10T13:07:08+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-02-10T141249.313.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-screenshotter-malware-performs-surveillance-before-stealing-data/</loc>
		<lastmod>2023-02-10T13:16:48+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-4-40.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Screen-Shot-2023-02-06-at-2.09.58-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-threat-group-hits-israel-institute-ransomware/</loc>
		<lastmod>2023-02-13T10:41:54+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/technion-darkbit-ransomware-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/oakland-in-crisis-how-the-city-is-dealing-with-a-ransomware-attack/</loc>
		<lastmod>2023-02-13T14:49:10+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-50-12.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/phishing-gang-disrupted-by-spanish-national-police-us-secret-service/</loc>
		<lastmod>2023-02-14T09:35:23+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-53-9.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/pepsi-data-breach-malware-attack/</loc>
		<lastmod>2023-02-14T10:08:52+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/pepsi-data-breach-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/lazarus-hackers-use-mixer-to-hide-cryptocurrency/</loc>
		<lastmod>2023-02-14T10:12:39+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-73-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/screenshot-2023-02-10-at-13-09-52.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/1-million-downloads-later-how-an-android-game-leaked-private-data/</loc>
		<lastmod>2023-02-15T09:05:25+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/android-malware-featured.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/leaky-android-apps.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/chinese-hackers-shadowpad-diplomatic-entities/</loc>
		<lastmod>2023-02-15T09:36:34+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-75-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/chs-goanywhere-data-breach/</loc>
		<lastmod>2023-02-15T11:02:14+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/healthcare-zero-day-attack-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/critical-event-management/</loc>
		<lastmod>2023-02-16T08:06:52+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Cover_1@4x-100-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Most-Common-Critical-Events-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Most-Common-Critical-Events.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/hyundai-and-kia-offer-free-software-update-to-patch-a-vulnerability-allowing-car-thefts/</loc>
		<lastmod>2023-02-16T10:41:58+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-02-16T123534.366.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/russian-cyberexpert-convicted-in-the-u-s-for-a-90-million-hack-to-trade-scheme/</loc>
		<lastmod>2023-02-16T12:40:09+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-1-81.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/oakland-issues-state-of-emergency-after-ransomware-attack/</loc>
		<lastmod>2023-02-16T15:01:47+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Oakland-Issues-State-of-Emergency-After-Ransomware-Attack.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/fake-customs-invoicing-smishing-campaign/</loc>
		<lastmod>2023-02-16T15:04:28+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Asset-12@2x-100-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-27.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/PR-6.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Group-20472.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/4-3.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/PR-4.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/PR-5.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/burton-snowboards-online-orders-canceled/</loc>
		<lastmod>2023-02-17T10:25:31+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-3-52.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Screenshot-2023-02-17-121330.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cisa-warns-about-four-new-vulnerabilities-exploited-as-zero-days/</loc>
		<lastmod>2023-02-17T10:49:27+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-02-17T122918.008.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/seven-german-airports-hit-by-suspected-cyber-attack/</loc>
		<lastmod>2023-02-17T11:19:09+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Seven-German-Airports-Hit-by-Suspected-Cyber-Attack.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Albrecht-Duerer-airport-in-Nuremberg-Germany.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-deepfake/</loc>
		<lastmod>2023-02-17T16:23:21+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Asset-21@2x.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-sso-single-sign-on-explained/</loc>
		<lastmod>2023-02-20T07:59:31+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Asset-18@2x.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Asset-2@2x.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Asset-3@2x.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/canadian-bookstore-indigo-hit-by-cyberattack/</loc>
		<lastmod>2023-02-20T10:07:36+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Indigo-cyberattack.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/fbi-investigates-nyc-network-security-incident/</loc>
		<lastmod>2023-02-20T11:53:37+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/The-FBI-Is-Looking-into-a-Security-Breach-on-its-NY-Network.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/scandinavian-airlines-suffer-major-data-breach-after-cyberattack/</loc>
		<lastmod>2023-02-20T12:41:36+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/scandinavian-airlines-down-due-to-cyberattack-featured-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/scandinavian-airlines-down-due-to-cyberattack.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/europol-shuts-down-a-franco-israeli-ceo-fraud-group/</loc>
		<lastmod>2023-02-20T13:04:55+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-5-50.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/fbi-lessons-on-fighting-cybercrime/</loc>
		<lastmod>2023-02-21T07:21:50+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-09-20T130518.351.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/IMG_0712_cleanup-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Leading-the-fight-against-cybercryme.-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/hardbit-disclose-insurance-details-ransom-demand/</loc>
		<lastmod>2023-02-21T09:50:10+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hardbit-ransomware.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/indian-government-agencies-targeted-by-reverserat/</loc>
		<lastmod>2023-02-21T09:56:30+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-78-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/google-confirms-increase-in-russian-cyber-attacks-against-ukraine/</loc>
		<lastmod>2023-02-21T10:47:48+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-52-12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/russia1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/russia2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/railyatri-data-breach/</loc>
		<lastmod>2023-02-22T08:54:49+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/railyatri-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/chatgpt-the-dark-side-of-artificial-intelligence-crafting-custom-malware/</loc>
		<lastmod>2023-02-22T10:10:14+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-55-13.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/chatgpt-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/chatgpt-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/chatgpt-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/chatgpt-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/chatgpt-5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/five-million-downloads-oyetalk-android-app-leaks-private-user-conversations/</loc>
		<lastmod>2023-02-22T10:10:14+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/oyetalk-data-leakage.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cybercriminals-targeting-data-center-providers/</loc>
		<lastmod>2023-02-23T10:02:22+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-80-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/PT-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/s1deload-stealer-malware-youtube-facebook-accounts/</loc>
		<lastmod>2023-02-23T11:22:48+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/S1deload-Stealer-Malware.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/activision-breached-here-is-what-happened/</loc>
		<lastmod>2023-02-24T09:49:57+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-02-24T112918.541.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/rackspace-ransomware-attack-update-what-you-need-to-know/</loc>
		<lastmod>2023-02-24T10:34:03+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/rackspace-ransomware-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/play-ransomware-encrypted-files.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/play-ransomware-infection-process.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/hackers-claim-they-breached-telus-canadas-second-largest-telecom-company/</loc>
		<lastmod>2023-02-24T12:52:23+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2-50.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Screenshot-2023-02-24-130512.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/stanford-university-is-facing-a-data-breach/</loc>
		<lastmod>2023-02-27T12:53:37+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-4-42.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/purecrypter-malware-is-targeting-government-entities/</loc>
		<lastmod>2023-02-27T13:32:48+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/PureCrypter-Malware-Is-Targeting-Government-Agencies.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/PureCrypter-Malware-Infection-Chain.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/exfiltrator-22-a-new-post-exploitation-kit-for-sale/</loc>
		<lastmod>2023-02-28T11:36:41+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-151.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/exfiltrator-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/zero-trust-endpoint-security/</loc>
		<lastmod>2023-02-28T13:04:29+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/zero-trust-endpoint-security-blog.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/major-ransomware-attack-on-u-s-marshals-service-compromises-sensitive-information/</loc>
		<lastmod>2023-02-28T13:43:33+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-02-28T142158.203.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/15m-allegedly-peruvian-tax-authority-records-leaked-on-forum/</loc>
		<lastmod>2023-02-28T15:11:38+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/15M-Peruvian-Tax-Authority-Records-Allegedly-Leaked-on-Forum.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/15M-Allegedly-Peruvian-Tax-Authority-Records-Leaked-on-Forum.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/saas-security/</loc>
		<lastmod>2023-02-28T17:42:47+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Alina-SaaS-1030x360.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/lastpass-confirms-second-data-breach-of-encrypted-password-vaults/</loc>
		<lastmod>2023-03-01T08:52:36+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-56-12.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/scarleteel-cloud-attack-used-kubernetes-aws-steal-source-code/</loc>
		<lastmod>2023-03-01T11:25:24+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Scarleteel-cloud-cyberattack.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/chromeloader-malware-is-targeting-gamers/</loc>
		<lastmod>2023-03-01T11:34:35+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-38-15.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/CD-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/malware-campaign-targets-law-firms/</loc>
		<lastmod>2023-03-02T09:16:07+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-40-13.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Screen-Shot-2023-02-27-at-12.11.05-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/stay-vigilant-trezor-reports-a-massive-crypto-wallet-phishing-scam/</loc>
		<lastmod>2023-03-02T09:29:03+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-58-9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/sms-phishing-text-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/trezor-phishing-site.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/whatsapp-banned-in-russian-government/</loc>
		<lastmod>2023-03-02T10:18:47+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/russia-bans-whatsapp.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cyberattack-wh-smith-employees-data/</loc>
		<lastmod>2023-03-03T10:13:35+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/wh-smith-data-breach.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/chinese-hackers-use-new-backdoor-to-deploy-malware/</loc>
		<lastmod>2023-03-03T10:33:43+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-42-14.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Figure-3-Execution-graph-showing-the-subprocesses-and-executed-tasks.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/how-royal-ransomware-could-wreak-havoc-on-the-u-s-digital-economy/</loc>
		<lastmod>2023-03-03T11:57:46+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-61-6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/bidencash-leaks-database-with-over-2-million-stolen-credit-cards/</loc>
		<lastmod>2023-03-06T10:17:38+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-03-06T120243.950.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/bidencash-leak.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/betterhelp-accused-of-sharing-mental-health-data-with-advertisers/</loc>
		<lastmod>2023-03-06T11:17:57+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-152.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cloud-access-security-broker-casb/</loc>
		<lastmod>2023-03-06T13:36:06+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Vladimir-Cloud-1030x360.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/aged-domains-the-silent-danger-to-cybersecurity-new-report/</loc>
		<lastmod>2023-03-06T13:37:32+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/aged-domains-report-cover-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/pie.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/traffic.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/play-ransomware-starts-leaking-oakland-city-data/</loc>
		<lastmod>2023-03-06T14:17:27+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Play-Ransomware-Starts-Leaking-Oakland-City-Data.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Play-Ransomware-Oakland-files.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-tcp/</loc>
		<lastmod>2023-03-07T08:20:19+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Understanding-Transmission-Control-Protocol-TCP-What-It-Is-How-It-Works-and-How-To-Keep-It-Secure.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/TCPs-place-in-the-OSI-and-TCPIP-suite.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/TCP-3-way-handshake-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/How-to-prevent-attacks-that-target-TCP-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/best-remote-desktop-software-for-mac/</loc>
		<lastmod>2023-03-07T08:23:54+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Best-Remote-Desktop-Software-for-Mac-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Microsoft-Remote-Desktop-for-Mac-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/zoho-assist-logo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/logo-supremo-2x.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/anydesk-logo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/TeamViewer-Logo-768x480.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/remotepc.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/gotomypc-logo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/logo_logmein.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Chrome-Remote-Desktop.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/find-out-more-about-the-new-hiatusrat-router-malware/</loc>
		<lastmod>2023-03-07T09:56:18+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2-52.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Screenshot-2023-03-07-113629.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/core-members-of-the-doppelpaymer-ransomware-gang-detained-by-the-europol/</loc>
		<lastmod>2023-03-07T10:42:26+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-03-07T123252.647.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/acer-discloses-data-breach-160gb-of-sensitive-information-for-sale/</loc>
		<lastmod>2023-03-08T08:17:42+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-03-08T094624.061.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/acer-leak-announcement.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/a-new-emotet-campaign-is-ongoing-after-a-three-month-break/</loc>
		<lastmod>2023-03-08T12:21:29+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-153.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Screenshot-2023-03-08-115541.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-info-stealer-sys01-targets-key-government-infrastructure/</loc>
		<lastmod>2023-03-08T14:56:28+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/New-Info-Stealer-SYS01-Targets-Key-Government-Infrastructure.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/New-Info-Stealer-SYS01-Infection-Chain.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-tsa-cybersecurity-measures-for-airlines/</loc>
		<lastmod>2023-03-09T09:25:25+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-63-7.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/lazarus-group-hacks-south-korean-financial-entity-via-zero-day-vulnerability/</loc>
		<lastmod>2023-03-09T09:42:06+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-44-13.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/putins-deepfake-campaign-a-new-weapon-in-the-war-against-dissent/</loc>
		<lastmod>2023-03-09T12:39:30+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-65-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Screen-Shot-2023-03-01-at-8.18.58-AM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/TA499-impostor-call.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/red-team-vs-blue-team/</loc>
		<lastmod>2023-03-09T15:04:04+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-03-09T153313.791.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Add-a-subheading-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Purple-Modern-Gradient-Starting-Business-Step-By-Step-List-Instagram-Post.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/bmw-security-flaw-clients-data/</loc>
		<lastmod>2023-03-10T10:25:58+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/bmw-data-at-risk-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/the-intersection-of-gender-politics-and-cybersecurity-iranian-hackers-target-women-advocating-for-human-rights/</loc>
		<lastmod>2023-03-10T11:05:52+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-66-8.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/netwire-rat-malware-infrastructure-seized/</loc>
		<lastmod>2023-03-10T11:13:32+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-47-13.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/fake-job-proposals-used-to-deploy-malware/</loc>
		<lastmod>2023-03-13T10:07:12+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-49-14.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/luredocument.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/air-gapped-computers-vulnerable-data-stealing-internal-speakers/</loc>
		<lastmod>2023-03-13T13:31:23+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/casper-air-gapped.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/the-dark-side-of-eurovision-2023-how-scammers-are-targeting-fans/</loc>
		<lastmod>2023-03-13T13:39:56+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-69-6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/197-million-in-cryptocurrency-stolen-in-euler-finance-attack/</loc>
		<lastmod>2023-03-14T09:38:20+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-03-14T102956.505.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/euler-finance-flaw.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/fbis-report-shows-investment-fraud-caused-loses-of-over-3-billion-in-2022/</loc>
		<lastmod>2023-03-14T13:50:07+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2-55.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/FBI.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/kamikakabot-malware-used-to-attack-southeast-asian-government-agencies/</loc>
		<lastmod>2023-03-14T13:56:38+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/KamikakaBot-Malware-Used-to-Attack-South-Asian-Government-Agencies.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/KamikakaBot-Malware-Infection-Technique.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Dark-Pink-APT-Infection-Chain-.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/security-organization-rubrik-affected-by-the-goanywhere-zero-day-attacks/</loc>
		<lastmod>2023-03-15T09:59:00+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-3-56.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/rub.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/sap-fixes-five-critical-vulnerabilities-with-newly-released-security-update/</loc>
		<lastmod>2023-03-15T11:18:35+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-03-15T125509.763.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/lockbit-ransomware-claims-to-have-stolen-spacex-data-from-one-of-its-contractors/</loc>
		<lastmod>2023-03-15T11:23:59+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/LockBit-Ransomware-Claims-to-Have-Stolen-Space-X-Manufacturing-Data-from-one-of-its-Contractors.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Lockbits-Message-for-Space-X-and-Maximum-Industries.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cisa-warns-of-adobe-coldfusion-vulnerability-exploited-in-the-wild/</loc>
		<lastmod>2023-03-16T10:36:33+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-03-16T121509.901.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/for-sale-data-supposedly-coming-from-the-us-marshals-service-hack/</loc>
		<lastmod>2023-03-16T11:02:26+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-5-53.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/usms.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/australias-latitude-financial-hit-by-cyberattack-exposing-328k-client-data/</loc>
		<lastmod>2023-03-16T11:20:48+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Australia%E2%80%99s-Latitude-Financial-Suffered-a-Cyberattack-Exposing-328K-Client-Records.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/microsoft-outlook-vulnerability/</loc>
		<lastmod>2023-03-17T09:32:08+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Asset-34@2x-100.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/makop-ransomware/</loc>
		<lastmod>2023-03-17T09:57:40+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-50-13.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Makop-Ransomware.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/View-of-the-ARestore-tool.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/YDArk-process-hiding-feature.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/bianlian-ransomware-the-dangerous-shift-toward-pure-data-extortion/</loc>
		<lastmod>2023-03-17T10:29:09+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-70-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/map.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/ai-youtube-videos-spread-raccoon-redline-and-vidar/</loc>
		<lastmod>2023-03-17T10:44:16+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/youtube-info-stealing-malware-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/hinatabot-the-latest-go-based-threat/</loc>
		<lastmod>2023-03-20T09:25:09+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-52-13.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/emotet-malware-microsoft-onenote-attachments/</loc>
		<lastmod>2023-03-20T12:17:03+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/emotet-malware-onenote-attachments.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-encrypted-dns-traffic/</loc>
		<lastmod>2023-03-20T12:24:06+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-11-07T122249.435.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Unecrypted-DNS-traffic.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/pharming/</loc>
		<lastmod>2023-03-20T12:32:24+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-12-22T110855.706.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/a-cancer-patients-fight-for-justice-against-a-hospital-ransomware-attack/</loc>
		<lastmod>2023-03-20T13:48:36+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-73-6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/dish-network-goes-offline-a-cyberattack-might-be-the-cause/</loc>
		<lastmod>2023-03-21T09:03:37+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-02-27T122913.452.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/dish-network-email-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/malicious-websites-work-from-home/</loc>
		<lastmod>2023-03-21T09:34:03+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Vladimir-Defenses-while-Working-from-Home1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/malicious-attacks.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/AV-detection.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/5-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/4-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/3-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/70-of-wifi-networks-cracked-by-researcher-in-a-wifi-network-cracking-experiment/</loc>
		<lastmod>2023-03-21T09:34:59+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/WiFi-network-cracking-cover-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/wireshark-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/smart-home-vulnerable-hacking/</loc>
		<lastmod>2023-03-21T09:36:56+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Bianca-Smart-House-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/image1-6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/researchers-reveal-insights-into-catb-ransomwares-advanced-evasion-methods/</loc>
		<lastmod>2023-03-21T13:19:46+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-75-5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-powermagic-and-commonmagic-malware-used-by-threat-actors-to-steal-data/</loc>
		<lastmod>2023-03-22T08:23:42+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-03-22T095235.498.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/another-goanywhere-attack-affects-japanese-giant-hitachi-energy/</loc>
		<lastmod>2023-03-22T08:33:38+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-3-57.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/clop.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/shellbot-ddos-malware-targets-poorly-managed-linux-servers/</loc>
		<lastmod>2023-03-22T09:56:34+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/ShellBot-Malware-Targets-Poorly-Managed-Linux-Servers.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/threat-actors-use-the-magecart-malware-in-new-credit-card-data-stealing-campaign/</loc>
		<lastmod>2023-03-23T09:40:48+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-03-23T110316.775.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/malware-code-magecart-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/magecart-code-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/ferrari-data-breach-customers-risk-data-leakage/</loc>
		<lastmod>2023-03-23T13:09:56+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/ferrari-data-breach.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/37m-subscribers-streaming-platform-lionsgate-exposes-user-data/</loc>
		<lastmod>2023-03-23T15:40:30+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/37M-Subscriber-Streaming-Platform-Lionsgate-Exposes-User-Data.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/uk-ncsc-releases-nmap-nse-scripts-to-discover-unpatched-flaws/</loc>
		<lastmod>2023-03-24T09:13:30+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-14-12.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/port-scan-attack/</loc>
		<lastmod>2023-03-24T09:19:40+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/port-scan-attack.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/DNS-and-News-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/port-scan-attack-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/another-fake-chatgpt-extension-found-in-google-chrome-store/</loc>
		<lastmod>2023-03-24T10:17:16+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-5-54.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/gpt.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/most-common-types-of-ransomware/</loc>
		<lastmod>2023-03-24T11:40:52+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/types-of-ransomware.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/five-most-common-ransomware-types.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/asset-management-system/</loc>
		<lastmod>2023-03-24T12:06:14+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Vladimir-Asset-Management-System-1030x360.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/chinese-hackers-infiltrate-middle-eastern-telecom-companies/</loc>
		<lastmod>2023-03-24T12:48:57+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Chinese-Hackers-Infiltrate-Middle-Eastern-Telecom-Companies.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-can-malicious-code-do/</loc>
		<lastmod>2023-03-24T12:59:44+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Alina-Common-Cyberattacks-1030x360.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/quishing/</loc>
		<lastmod>2023-03-24T14:13:02+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-03-24T152444.562.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/food-giant-dole-victim-of-a-ransomware-attack/</loc>
		<lastmod>2023-03-24T16:01:14+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Food-Giant-Dole-Hit-by-Ransomware.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Doles-Cyber-Incident-Announcement-to-its-partners.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/the-city-of-toronto-among-this-weeks-victims-of-goanywhere-attacks/</loc>
		<lastmod>2023-03-27T08:07:46+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-6-32.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/clop-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/philadelphia-warns-against-sophisticated-phishing-attacks/</loc>
		<lastmod>2023-03-27T09:05:36+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-76-6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/twitter-source-code-leaked-on-github/</loc>
		<lastmod>2023-03-27T09:42:11+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/cybercriminal.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/microsoft-takes-measures-against-password-spray-attacks/</loc>
		<lastmod>2023-03-28T12:06:31+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-6-9.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-are-mobile-device-threats-and-how-to-avoid-them/</loc>
		<lastmod>2023-03-28T12:07:30+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-123.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/external-penetration-testing-what-it-is-and-why-you-should-care/</loc>
		<lastmod>2023-03-28T12:08:14+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/pentest.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/External-VS-Internal-Network-Penetration-Tests.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/critical-sonicwall-rce-bug-actively-targeted-by-threat-actors/</loc>
		<lastmod>2023-03-28T12:10:02+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Critical-SonicWall-RCE-Bug-cover-image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/billions-of-passwords-leaked-online/</loc>
		<lastmod>2023-03-28T12:10:54+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Security-News-and-Updates-1030x360-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/password-screenshot-2-leak.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/the-us-government-restricts-the-use-of-spyware-white-house-says/</loc>
		<lastmod>2023-03-28T13:32:28+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-03-28T160158.484.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/14-million-customers-latitude-data-breach/</loc>
		<lastmod>2023-03-29T08:00:22+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/14-million-customers-latitude-data-breach.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/intermittent-encryption/</loc>
		<lastmod>2023-03-29T10:19:23+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Intermittent-Encryption-Ransomware-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Screenshot-2022-09-22-185949.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/clop-ransomware-exploits-zero-day-vulnerability-data-breach-crown-resorts/</loc>
		<lastmod>2023-03-29T11:13:24+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-84-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/command-and-control-servers-explained/</loc>
		<lastmod>2023-03-29T11:27:33+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/command-and-control-server.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/how-a-command-and-control-server-works.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/all-about-botnets/</loc>
		<lastmod>2023-03-29T13:46:15+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hs-Is-your-computer-being-used-to-attack-other-users_001021.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Security-what-is-a-botnet.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/how-botnets-are-created-and-operated.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/8-software-apps-make-99-percent-of-computer-vulnerable-heimdal-security.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Cloud-backup.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/bot-attacks/</loc>
		<lastmod>2023-03-29T13:47:44+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Alina-Bot-Attack-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Botnet-Mechanics.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/banking-trojan-mispadu/</loc>
		<lastmod>2023-03-29T13:49:20+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-56-13.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Mispadu-Banking-Trojan-Fig-05.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/the-u-k-police-hunts-cybercriminals-with-fake-ddos-as-a-service-sites/</loc>
		<lastmod>2023-03-30T09:27:59+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-1-91.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/outage_splash_page.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/apt43-a-new-cyberthreat-from-north-korea/</loc>
		<lastmod>2023-03-30T10:36:16+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-03-30T124256.546.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/smart-grid-fragility-a-constant-threat-for-the-european-and-american-way-of-living/</loc>
		<lastmod>2023-03-31T10:41:14+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-3-59.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Asset-3-100-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Asset-20-100-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Asset-21-100-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/nato-and-diplomats-email-portals-targeted-by-russian-apt-winter-vivern/</loc>
		<lastmod>2023-03-31T15:06:04+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/NATO-and-Diplomats-Email-Portals-Targeted-by-Russian-APT-Winter-Vivern.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Winter-Vivern-Infection-Chain.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Email-APT-Winter-Vivern.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/money-message-the-newest-ransomware-gang-that-threatens-organizations/</loc>
		<lastmod>2023-04-03T09:35:23+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-158.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/money.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/elementor-pro-vulnerability-actively-exploited-by-threat-actors/</loc>
		<lastmod>2023-04-03T09:37:00+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-04-03T121719.058.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/indicators-of-compromise-ioc/</loc>
		<lastmod>2023-04-03T11:44:12+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_4746348250.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/information-security-infosec/</loc>
		<lastmod>2023-04-03T12:16:51+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hs-Discover-the-tactics-cyber-criminals-use_D95225.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/microsoft-addresses-a-new-azure-ad-vulnerability-affecting-bing-search-key-apps/</loc>
		<lastmod>2023-04-03T12:30:52+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Microsoft-Addresses-a-New-Azure-AD-Vulnerability-Affecting-Bing-Search-Key-Applications-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/XSS-Payload-Bing.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Bing-Search-Exploitation-2023.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/threat-intelligence-platform-tip/</loc>
		<lastmod>2023-04-03T14:29:08+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/threat-intelligence-platform-tip-blog-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/my-cloud-goes-off-network-breach/</loc>
		<lastmod>2023-04-04T08:57:56+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/my-cloud-down-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/my-cloud-down-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/15-million-systems-vulnerable-to-cisa-kev-flaws/</loc>
		<lastmod>2023-04-04T09:25:54+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-87-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/rorschach-ransomware/</loc>
		<lastmod>2023-04-05T08:44:02+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-91-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Attack-chain.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/international-cyber-operation-shuts-down-genesis-market/</loc>
		<lastmod>2023-04-06T08:32:45+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-98-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Genesis_Market_1_1eb68d018b.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Genesis-Market-message.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/typhon-info-stealing-malware-harder-to-detect/</loc>
		<lastmod>2023-04-06T09:30:07+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/typhon-info-stealer.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/msi-breach-claimed-by-money-message-ransomware-gang/</loc>
		<lastmod>2023-04-07T11:09:56+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-04-07T134546.907.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/scareware/</loc>
		<lastmod>2023-04-07T15:13:05+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-04-06T105710.142.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-rilide-malware-steal-cryptocurrency/</loc>
		<lastmod>2023-04-10T09:07:45+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/rilide-malware-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/dutch-government-to-adopt-rpki-on-all-its-networks-for-safety-reasons/</loc>
		<lastmod>2023-04-10T09:35:37+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2-60.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/f1-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/five-new-actively-exploited-vulnerabilities-added-by-cisa-to-its-kev-catalog/</loc>
		<lastmod>2023-04-10T10:04:17+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-04-10T123800.657.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/oldest-law-practice-in-nyc-hacked-over-90000-clients-impacted/</loc>
		<lastmod>2023-04-10T14:52:54+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/90000-clients-personal-information-was-compromised-in-the-cyberattack-on-the-prestigious-law-firm-Cadwalader-Wickersham-Taft.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/fast-flux/</loc>
		<lastmod>2023-04-11T06:06:53+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-12-30T184801.804.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/massive-typosquatting-campaign-uses-over-200-fake-domains/</loc>
		<lastmod>2023-04-11T06:46:27+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-112.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/squirrelwaffle-is-using-typosquatting-in-latest-campaign/</loc>
		<lastmod>2023-04-11T06:47:19+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_7694983106.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/python-developers-targeted-by-w4sp-stealer-in-an-ongoing-supply-chain-attack/</loc>
		<lastmod>2023-04-11T06:51:25+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-11-18T114843.042.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/crimson-kingsnake-gang-uses-bec-attacks-to-impersonate-law-firms/</loc>
		<lastmod>2023-04-11T06:55:19+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-11-04T114439.340.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/threat-hunting-journal-april-2022/</loc>
		<lastmod>2023-04-11T06:57:21+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Vladimir-Malware-1030x360-1-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/lateral-movement/</loc>
		<lastmod>2023-04-11T06:57:59+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_22_9802190509.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/oil-gas-sector-targeted-by-global-spear-phishing-campaign/</loc>
		<lastmod>2023-04-11T06:58:26+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_8585258564.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Phishin-Campaign-attack-flow.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Phishing-Email.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/malicious-websites/</loc>
		<lastmod>2023-04-11T07:00:49+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Malicious-websites-are-a-big-sources-of-malware.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/website-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/website-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/website-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/zero-day.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/java-script.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/real-ebay-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/fake-ebay-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/https.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/virus-total-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/typosquatting-explained-definition-threats-and-safety-tips/</loc>
		<lastmod>2023-04-11T07:33:02+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-3-39.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/sd-worx-shuts-down-its-uk-ireland-it-systems-following-cyberattack/</loc>
		<lastmod>2023-04-11T11:47:58+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-04-11T143132.305.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/sd-worx-customer-portal-uk.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/two-new-emergency-patches-from-apple/</loc>
		<lastmod>2023-04-11T13:43:58+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-4-46.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/balada-injector-infects-nearly-1-million-wordpress-sites/</loc>
		<lastmod>2023-04-11T14:50:07+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Balada-Injector-Infects-Nearly-1-Million-WordPress-Sites-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-domain-generation-algorithm-definition-and-role-in-malware-attacks/</loc>
		<lastmod>2023-04-12T11:15:32+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/domain-generation-algorithm.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/The-three-elements-structure-of-DGAs.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Domain-Generation-Algorithm-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://support.heimdalsecurity.com/hc/article_attachments/4410238129809/blockpage.JPG</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/warning-threat-actors-compromise-3cx-desktop-app-in-a-supply-chain-attack/</loc>
		<lastmod>2023-04-12T11:42:53+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-03-31T120915.114.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/godaddy-discloses-data-breach-spanning-multiple-years/</loc>
		<lastmod>2023-04-12T11:54:37+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-02-20T130452.354.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/enhanced-version-of-the-blackguard-stealer-spotted-in-the-wild/</loc>
		<lastmod>2023-04-12T14:16:28+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-03-24T123405.316.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/anonymous-declares-cyberwar-on-russia-and-pledges-support-for-ukraine/</loc>
		<lastmod>2023-04-13T12:55:00+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-8-7.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/ransomware-attack-kfc-pizza-hut/</loc>
		<lastmod>2023-04-13T12:59:22+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-75-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/windows-admins-warned-about-a-critical-msmq-queuejumper-vulnerability/</loc>
		<lastmod>2023-04-13T14:40:04+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_2_7864040005.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-domino-malware-strain/</loc>
		<lastmod>2023-04-18T12:41:42+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/domino-malware-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/apt28-routers-jaguar-tooth-malware/</loc>
		<lastmod>2023-04-19T10:32:17+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/jaguar-tooth-malware-routers-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/commscope-hit-by-ransomware/</loc>
		<lastmod>2023-04-19T10:38:28+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-04-19T131749.621.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/ViceSocietyCommScope1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Fr_T_Kd_N_Ww_AI_7_Ou_D_858f883c50.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/trigona-ransomware-deployed-through-vulnerable-microsoft-sql-servers/</loc>
		<lastmod>2023-04-20T09:52:24+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-04-20T123728.508.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/trigona-ransomware-notes.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/russian-hacktivists-shifting-interest-to-business-sector-uk-cyber-agency-warns/</loc>
		<lastmod>2023-04-20T10:49:06+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-1-94.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/iranian-hackers-target-u-s-energy-and-transit-systems/</loc>
		<lastmod>2023-04-20T13:08:28+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Iranian-Hackers-Target-U.S.-Energy-and-Transit-Systems.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Mint-Sandstorm-attack-chain.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/millions-of-records-with-sensitive-data-leaked-by-icici-bank/</loc>
		<lastmod>2023-04-21T09:07:19+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_2_3381103733.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/icici_bank_leak_statement.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cybercriminals-abusing-an-abandoned-wordpress-plugin-for-malicious-code-injection/</loc>
		<lastmod>2023-04-21T10:08:03+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-4-48.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/downloads_per_day.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/us-medical-service-data-breach-impacts-2-3m-people/</loc>
		<lastmod>2023-04-21T11:56:32+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/US-Medical-Service-Data-Breach-Impacts-2.3M-People.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/threat-actors-can-use-old-routers-data-to-breach-corporate-networks/</loc>
		<lastmod>2023-04-24T10:51:25+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-6-34.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/the-incidence-of-evilextractor-malware-rises-across-europe-and-the-u-s/</loc>
		<lastmod>2023-04-24T14:20:48+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-1-95.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/malwe.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/malwe-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/nslookup-command/</loc>
		<lastmod>2023-04-25T07:46:11+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/nslookup.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/papercut-flaw-exploited-to-hijack-servers-fix-released/</loc>
		<lastmod>2023-04-25T10:58:08+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/PaperCut-Flaw-Exploited-to-Hijack-Servers-Fix-Released-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Internet_exposed_PaperCut_servers-Bleeping-C.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/yellow-pages-canada-suffered-a-cyberattack/</loc>
		<lastmod>2023-04-25T14:39:10+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Yellow-Pages-Canada-Suffered-a-Cyberattack.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Black-Basta-Yellow-Pages.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-type-of-side-channel-attack-impacts-intel-cpus-and-allows-data-leakage/</loc>
		<lastmod>2023-04-26T08:44:31+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Intel-CPU-vulnerable.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/alaska-railroad-data-breach/</loc>
		<lastmod>2023-04-26T10:31:41+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Alaska-Railroad-Data-Breach.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/ima-financial-data-breach/</loc>
		<lastmod>2023-04-26T14:34:02+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/IMA-financial-data-breach.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/chinese-apt-alloy-taurus-is-back-linux-variant-pingpull-malware-active/</loc>
		<lastmod>2023-04-27T10:32:44+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-04-27T120646.362.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/word-image-127879-3-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-lobshot-malware-deployed-via-google-ads/</loc>
		<lastmod>2023-04-27T10:55:27+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-04-27T134407.228.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/LOBSHOT-infection-chain.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/tp-link-high-severity-flaw-added-to-mirai-botnet-arsenal/</loc>
		<lastmod>2023-04-27T13:04:29+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-04-27T155829.076.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/mirai-post-request.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/threat-hunting-journal-may-2022/</loc>
		<lastmod>2023-04-27T14:41:46+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/THJ-May-cover.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/rtm-locker-ransomware-gang-targets-vmware-esxi-servers/</loc>
		<lastmod>2023-04-28T11:14:29+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_8488794618.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/managed-threat-hunting/</loc>
		<lastmod>2023-04-28T11:19:15+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-04-28T140131.899.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Managed-Threat-Hunting.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Traditional-Cybersecurityvs-Managed-Threat-Hunting.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/active-phishing-campaign/</loc>
		<lastmod>2023-04-28T14:09:09+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Asset-49-100.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-30.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Asset-33@0.5x-50.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/security-operations-center-soc/</loc>
		<lastmod>2023-05-02T15:05:50+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Vladimir-Security-Operations-Center-1030x360.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-decoy-dog-malware-toolkit-targets-enterprise-networks/</loc>
		<lastmod>2023-05-02T17:29:28+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/New-Decoy-Dog-Malware-Toolkit-Targets-Enterprise-Networks.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Decoy-Dog-C2-Domains.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/reconshark-kimsukys-newest-recon-tool/</loc>
		<lastmod>2023-05-05T10:37:24+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-05-05T131058.396.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/royal-ransomware-targets-the-city-of-dallas-in-ransomware-attack/</loc>
		<lastmod>2023-05-05T14:00:02+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-1-45.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/a-new-ransomware-operation-threatens-your-business-akira/</loc>
		<lastmod>2023-05-08T11:10:17+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-5-57.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/akira-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/akira-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/iranian-threat-groups-mango-sandstorm-and-mint-sandstorm-join-the-papercut-attack-spree/</loc>
		<lastmod>2023-05-09T11:08:21+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-05-09T132611.372.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/sysco-breached-data-stolen/</loc>
		<lastmod>2023-05-10T08:33:23+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/sysco-data-breach.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/fake-windows-update-used-to-push-aurora-info-stealer/</loc>
		<lastmod>2023-05-11T08:08:38+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-05-11T101941.497.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/easset_upload_file94573_265978_e.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/linux-kernel-vulnerability-gives-root-privileges/</loc>
		<lastmod>2023-05-11T09:58:16+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-05-11T115156.353.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/operation-medusa-brings-down-snake/</loc>
		<lastmod>2023-05-11T12:31:58+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-05-11T135054.242.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/snake-boot-cycle.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/remote-code-execution/</loc>
		<lastmod>2023-05-15T06:46:50+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Asset-6-100-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/foss-software/</loc>
		<lastmod>2023-05-15T06:53:15+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Vladimir-Open-Source-Software-1030x360.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/toyota-disclosed-a-ten-year-long-data-breach/</loc>
		<lastmod>2023-05-15T11:17:27+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-5-58.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/capita-recommends-its-customers-to-assume-their-data-was-stolen/</loc>
		<lastmod>2023-05-17T08:48:21+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Capita-Recommends-Customers-to-Assume-Their-Data-Was-Stolen.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Capita-Black-Basta-message.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/ransomware-malaslocker-targets-zimbra/</loc>
		<lastmod>2023-05-18T08:27:06+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-05-18T105412.855.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heartbeat.jsp-webshell-found-on-hacked-Zimbra-Server.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/ransom-note-4.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/three-new-zero-day-vulnerabilities-fixed-by-apple/</loc>
		<lastmod>2023-05-19T15:05:51+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-05-19T175432.581.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-type-of-attack-bruteprint-can-breach-your-smartphones-fingerprint-security/</loc>
		<lastmod>2023-05-22T14:11:26+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-9-36.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/stire.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/stire-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/iam-driven-biometrics/</loc>
		<lastmod>2023-05-23T07:14:58+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Bianca-IAM-Driven-Biometrics-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/types-of-biometrics.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/the-royal-gang-is-developing-its-own-malware-loader/</loc>
		<lastmod>2023-05-23T14:22:55+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/The-Royal-Gang-Is-Developing-Its-Own-Malware-Loader-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/over-300k-people-affected-by-ransomware-attack-on-dish-network/</loc>
		<lastmod>2023-05-24T06:09:26+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Over-300k-People-Impacted-by-Dish-Network-Ransomware-Attack.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/apria-data-breach-two-million-customers/</loc>
		<lastmod>2023-05-24T15:30:52+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/apria-data-breach-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/buhti-ransomware-blacktails-newest-operation-affects-multiple-countries/</loc>
		<lastmod>2023-05-26T10:04:57+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-05-26T121546.351.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/buhti-ransom-note.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cosmicenergy-the-new-russian-linked-malware-targets-industrial-system/</loc>
		<lastmod>2023-05-26T12:28:44+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-05-26T151659.635.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/CosmicEnergy.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/raidforums-members-data-leaked-on-new-hacking-forum/</loc>
		<lastmod>2023-05-30T09:47:52+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-05-30T124150.578.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/raidforums-leak.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/warning-lazarus-targets-windows-iis-web-servers-for-initial-access/</loc>
		<lastmod>2023-05-30T14:22:41+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-05-30T170922.453.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/IIS-Lazarus-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/IIS-Lazarus-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/IIS-Lazarus-3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/security-service-edge-sse-explained/</loc>
		<lastmod>2023-05-31T11:17:23+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-08-22T185408.290.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-08-22T185713.374-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/wordpress-plugin-gravity-forms-vulnerable/</loc>
		<lastmod>2023-05-31T13:22:02+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Gravity-Forms-Vulnerability.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-qbot-malware-campaign-exploits-wordpad-for-infection/</loc>
		<lastmod>2023-06-02T15:51:46+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/New-QBot-Malware-Campaign-Exploits-WordPad-for-Infection.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-scim-provisioning/</loc>
		<lastmod>2023-06-06T07:48:04+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Asset-69-100.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/SCIM-Benefits.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cloud-migration/</loc>
		<lastmod>2023-06-06T14:28:24+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Vladimir-Clou-Migration1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/asd.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/ASDASD.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/download.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/container-security/</loc>
		<lastmod>2023-06-06T14:29:40+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/container-security.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cloud-computing-security-risks/</loc>
		<lastmod>2023-06-06T14:34:47+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/cloud-computing-security-risks-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/cloud-computing-security-risks.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/the-moveit-hack-affected-bbc-british-airways-and-boots/</loc>
		<lastmod>2023-06-06T18:21:44+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/The-BBC-British-Airways-and-Boots-Are-Among-the-Victims-of-the-MOVEit-Hack.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/spinok-malware-discovered-in-193-apps-with-over-451m-installs/</loc>
		<lastmod>2023-06-06T19:20:26+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/SpinOk-Malware-Discovered-in-193-Apps-with-Over-451M-Installs.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-powerdrop-malware/</loc>
		<lastmod>2023-06-07T08:26:36+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/powerdrop-malware-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/zyxel-firewalls-flaws/</loc>
		<lastmod>2023-06-07T10:06:53+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Zyxel-Firewalls-flaw-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/kimsuky-strikes-again-new-campaign-targets-credentials-and-intelligence/</loc>
		<lastmod>2023-06-08T13:00:18+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-06-08T134329.484.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/royal-ransomware-gang-bolsters-arsenal-with-blacksuit-encryptor/</loc>
		<lastmod>2023-06-08T13:27:42+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-06-08T161401.411.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/clop-ransomware-is-likely-behind-the-moveit-zero-day-vulnerability-attacks/</loc>
		<lastmod>2023-06-09T13:39:51+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-06-09T162410.439.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/clop-moveit-information-collecting.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/manchester-university-cyberattack/</loc>
		<lastmod>2023-06-12T13:26:55+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/manchester-university-data-breach.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/fake-security-researchers-deliver-malicious-zero-day-exploits/</loc>
		<lastmod>2023-06-14T13:15:20+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-3-63.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/sanderson.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/ghidra.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/private-data-compromised-in-healthcare-breach/</loc>
		<lastmod>2023-06-15T08:08:00+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-06-15T104116.193.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-russian-apt-group-responsible-for-wiper-attacks-in-ukraine-exposed/</loc>
		<lastmod>2023-06-15T12:48:46+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-06-15T141737.809.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/more-3cx-data-exposed-third-party-vendor-to-blame-for-the-leak/</loc>
		<lastmod>2023-06-16T11:30:02+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-06-16T135514.798.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/remodel-vulnerability-management/</loc>
		<lastmod>2023-06-16T12:33:36+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Asset-80-100.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Asset-43-100.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Asset-40-100.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-40.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Asset-44-100.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-stealer-malware-on-the-rise-mystic-stealer/</loc>
		<lastmod>2023-06-19T13:50:45+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-5-59.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/pasted-image-0-43.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Screenshot-2023-06-19-162201.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/info-stealing-malware-dropped-via-only-fans/</loc>
		<lastmod>2023-06-20T13:36:57+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Info-Stealing-Malware-Dropped-via-Only-Fans-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/obfuscated-shellcode-onlyfans.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/blackcat-ransomware-group-claims-to-have-stolen-80gb-of-data-from-reddit/</loc>
		<lastmod>2023-06-21T06:11:17+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/BlackCat-Ransomware-Group-Claims-to-Have-Stolen-80GB-of-Data-from-Reddit.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Blackcat-Ransomware-Demand-Reddit.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cyber-assessment-framework/</loc>
		<lastmod>2023-06-21T09:35:48+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-06-21T104158.463.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-10.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/flaw-discovered-zyxel-nas-devices/</loc>
		<lastmod>2023-06-21T11:57:24+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/critical-zyxel-nas-flaw.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/apt15-graphican-backdoor-malware/</loc>
		<lastmod>2023-06-21T14:34:54+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/apt15-graphican.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/redclouds-apt-deploys-rdstealer-against-remote-desktop/</loc>
		<lastmod>2023-06-22T09:22:07+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-06-22T120346.646.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/north-korean-apt37-exploits-new-fadestealer-malware/</loc>
		<lastmod>2023-06-22T12:57:11+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-06-22T154344.645.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/attack-procedure.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/governmental-agencies-ordered-by-cisa-to-patch-vulnerabilities-exploited-by-russian-apt-groups/</loc>
		<lastmod>2023-06-23T09:16:54+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-06-23T115358.465.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/ups-discloses-data-breach-caused-by-an-sms-phishing-campaign/</loc>
		<lastmod>2023-06-23T11:38:51+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-06-23T141807.633.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/ups-phishing-notification.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/ups-phishing-messages.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/american-airlines-southwest-airlines-affected-by-a-data-breach/</loc>
		<lastmod>2023-06-26T09:54:44+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-170.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/managed-edr-benefits/</loc>
		<lastmod>2023-06-26T14:55:48+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/managed-edr.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/managed-edr-services.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/45000-nyc-public-school-students-data-stolen-in-moveit-breach/</loc>
		<lastmod>2023-06-27T13:06:55+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/45000-NYC-Public-School-Students%E2%80%99-Data-Stolen-in-MOVEit-Breach.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/suncor-energy-cyberattack-impacts-petro-canada-gas-station-payment-operations/</loc>
		<lastmod>2023-06-27T20:27:00+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Petro-Canada-Gas-Station-Payment-Operations-Affected-Following-Cyber-Attack-on-Suncor.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-mockingjay-process-injection-method-enables-malware-evade-edr-tools/</loc>
		<lastmod>2023-06-28T12:34:47+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Mockingjay-process-injection.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-pindos-javascript-dropper/</loc>
		<lastmod>2023-06-28T14:59:36+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/PindOS-Javascript-Dropper.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/dark-power-ransomware/</loc>
		<lastmod>2023-06-29T08:47:57+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Asset-81-2-100.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Asset-1@3x.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/pic.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/8base-ransomware-surge-in-activity/</loc>
		<lastmod>2023-06-29T09:11:03+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-06-29T115915.020-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-proxyjacking-campaign-cybercriminals-hijack-vulnerable-ssh-servers/</loc>
		<lastmod>2023-07-03T14:27:30+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-06-30T124657.656.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/proxyjacking-campaign.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-malware-alert-earlyrat-linked-to-north-korean-hacking-group/</loc>
		<lastmod>2023-07-03T14:37:16+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-07-03T173419.031.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/ukrainian-authorities-stop-a-phishing-scam-worth-4-3-million/</loc>
		<lastmod>2023-07-04T10:47:42+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-5-55.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Screenshot-2023-03-31-145347.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/email-spam/</loc>
		<lastmod>2023-07-04T10:50:19+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-8-12.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/business-email-compromise-bec/</loc>
		<lastmod>2023-07-04T10:54:32+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-20-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/8-actively-exploited-flaws-in-samsung/</loc>
		<lastmod>2023-07-05T08:40:29+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/flaws-affecting-Samsung.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/charming-kittens-powerstar-malware-boosts-its-techniques/</loc>
		<lastmod>2023-07-05T13:50:35+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Charming-Kitten-Powerstar-Malware.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/internal-threats/</loc>
		<lastmod>2023-07-06T08:57:43+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Elena-Internal-Threats-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/prevention-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/redenergy-stealer-ransomware-a-new-threat-targeting-critical-infrastructure/</loc>
		<lastmod>2023-07-06T12:45:00+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-07-06T140942.613.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/infection-chain.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cisa-fbi-a-new-version-of-the-truebot-malware-is-actively-used-in-attacks/</loc>
		<lastmod>2023-07-07T10:38:23+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-07-07T131218.941.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/stackrot-a-new-linux-kernel-flaw-allows-privilege-escalation/</loc>
		<lastmod>2023-07-07T13:04:11+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-07-07T151913.964.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/linux-kernel-flaw-stackrot.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/microsoft-teams-allows-malware-delivery-researchers-found/</loc>
		<lastmod>2023-07-10T08:56:34+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2-67.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/request_clean.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-vendor-risk-management-vrm/</loc>
		<lastmod>2023-07-10T09:15:18+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Vendor-Risk-Management-VRM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Key-Indicators-of-Vendor-Risks.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-XDR-Platform.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/is-bluestacks-safe/</loc>
		<lastmod>2023-07-10T10:13:22+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/143607272_1104908823293034_8741532473728277873_n.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/6m-sky-routers-vulnerable-to-cyberattacks-for-near-18-months/</loc>
		<lastmod>2023-07-10T10:17:12+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/6M-Sky-Routers-cover-image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/a-new-banking-trojan-on-the-rise-toitoin-banking-trojan/</loc>
		<lastmod>2023-07-10T14:19:41+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2-69.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/stire-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/deutsche-bank-ing-customers-data-breach/</loc>
		<lastmod>2023-07-12T10:36:48+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/deutsche-bank-breach.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/international-diplomats-targeted-by-russian-hacking-group/</loc>
		<lastmod>2023-07-13T14:22:32+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/apt.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/5-ways-heimdal-protects-your-endpoints/</loc>
		<lastmod>2023-07-13T14:37:17+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2-53.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-unified-endpoint-security-ues/</loc>
		<lastmod>2023-07-13T14:40:30+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-10-8.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/zoom-vulnerabilities/</loc>
		<lastmod>2023-07-14T06:22:39+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-07-14T091829.879.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-39.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/chinese-hackers-breach-government-email/</loc>
		<lastmod>2023-07-14T06:52:27+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-Design-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-cloud-credential-stealing-campaign-targets-microsoft-azure-and-google-cloud/</loc>
		<lastmod>2023-07-14T14:58:50+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-07-14T175200.733.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cisco-sd-wan-vmanage-impacted-by-rest-api-vulnerability/</loc>
		<lastmod>2023-07-16T20:05:16+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-07-14T114616.187.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cyber-essentials/</loc>
		<lastmod>2023-07-20T08:43:13+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/cyber-essentials-compliance-uk-public-sector.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/heimdals-coverage-of-cyber-essentials-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/p2pinfect-a-new-worm-targets-redis-servers-on-linux-and-windows/</loc>
		<lastmod>2023-07-20T14:53:22+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-07-20T172703.097.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/redis.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-ami-megarac-bmc-vulnerabilities/</loc>
		<lastmod>2023-07-21T08:43:31+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/new-AMI-MegaRAC-BMC-vulnerabilities.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/stolen-microsoft-key-the-impact-is-higher-than-expected/</loc>
		<lastmod>2023-07-24T15:03:10+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-07-24T173746.011.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/wiz-compromised-microsoft-keys.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/wiz-research-how-users-are-affected.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/blackcat-alphv-ransomware/</loc>
		<lastmod>2023-07-25T09:13:53+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-Design-4-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/abc.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/filewave-mdm-vulnerabilities/</loc>
		<lastmod>2023-07-25T11:52:12+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Vladimir-Remote-Cyberattacks-1030x360.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/mdm-app/</loc>
		<lastmod>2023-07-25T11:53:33+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_8_6723332663.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MDM-pic-what-happens.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/mobile-device-management/</loc>
		<lastmod>2023-07-25T12:19:40+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/mobile-device-management.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/open-source-software-supply-chain-attacks-spotted-targeting-the-banking-sector/</loc>
		<lastmod>2023-07-25T13:19:00+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/OSS-Supply-Chain-Attacks-Banking-Industry-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/HVOC-Framework.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Malicious-Payload-OSS-Supply-Chain-Attack.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/lazarus-apt-group-targets-windows-iis-web-servers-to-distribute-malware/</loc>
		<lastmod>2023-07-25T16:42:11+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Lazarus-APT-Group-Targets-Windows-IIS-Web-Servers-to-Distribute-Malware.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/mikrotik-vulnerability-926000-routers-at-risk/</loc>
		<lastmod>2023-07-26T09:33:46+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/mikrotik-vulnerability.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/yamaha-confirms-cyber-attack-on-its-canadian-division/</loc>
		<lastmod>2023-07-26T09:40:00+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Yamaha-Confirms-Cyberattack.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/norway-government-breached-ivanti-zero-day/</loc>
		<lastmod>2023-07-26T12:08:37+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/ivanti-zero-day-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/tetra-burst-vulnerabilities/</loc>
		<lastmod>2023-07-26T14:51:54+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/tetra-burst-vulnerabilities.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/massive-data-breach-affects-uk-hospital-group/</loc>
		<lastmod>2023-07-27T08:57:45+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2-68.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/eu-healthcare-enisa-reports-54-of-cyber-threats-are-ransomware/</loc>
		<lastmod>2023-07-27T09:53:04+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/ENISA-Reports-that-54-of-Cyber-Threats-Are-Ransomware-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/11-million-hca-healthcare-data-breach/</loc>
		<lastmod>2023-07-27T09:56:11+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/HCA-Healthcare-Data-breach.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/tampa-general-hospital-reports-cybercriminals-stole-1-2m-patient-data/</loc>
		<lastmod>2023-07-27T10:00:31+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Tampa-General-Hospital-Reports-Cybercriminals-Stole-1.2M-Patient-Data-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-gootkit-malware-attacks-target-australias-healthcare-industry/</loc>
		<lastmod>2023-07-27T10:03:17+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-01-12T130220.773.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Gootkit.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/amerisourcebergen-healthcare-company-has-been-breached/</loc>
		<lastmod>2023-07-27T10:04:06+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-1-79.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Screenshot-2023-02-09-112434.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/pharmerica-cyber-incident-exposes-5-8-m-peoples-data/</loc>
		<lastmod>2023-07-27T10:05:17+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/A-PharMerica-Cyber-Incident-Exposes-the-Data-of-5.8M-People-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/PharMerica-Data-Breach-Ransomware-Message.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/healthcare-data-breach-us-house-members/</loc>
		<lastmod>2023-07-27T10:09:19+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/US-House-members-data-leakage.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/north-korean-hackers-target-healthcare/</loc>
		<lastmod>2023-07-27T10:11:28+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-71-8.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/hospital-clinic-de-barcelona-suffered-a-ransomware-attack/</loc>
		<lastmod>2023-07-27T10:13:49+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Hospital-Clinic-de-Barcelona-Suffered-a-Ransomware-Attack.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/florida-hospitals-system-shut-down-suspected-ransomware-attack/</loc>
		<lastmod>2023-07-27T10:15:07+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/1-13.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/how-to-mitigate-ransomware/</loc>
		<lastmod>2023-07-27T10:18:53+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_5114921669.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/ransomware-payouts/</loc>
		<lastmod>2023-07-27T10:21:10+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Bianca-Ransome1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/CWT-global-ransomware.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/avg-cost-per-incident.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/avg-downtime-cost.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/cumulative-ransomware-cost.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Screenshot-2023-01-20-161443.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/ransomware-attack-on-harvard-pilgrim-health-care-exposes-2-5m-patients-data/</loc>
		<lastmod>2023-07-27T10:26:38+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Ransomware-Attack-on-Harvard-Pilgrim-Health-Care-Exposes-2.5M-Patients-Data.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cyberattack-investigation-shuts-down-ambulance-patient-records-system/</loc>
		<lastmod>2023-07-27T11:58:19+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Cyber-attack-Investigation-Shuts-Down-Ambulance-Patient-Records-System.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/u-s-government-contractor-maximus-hit-by-massive-data-breach/</loc>
		<lastmod>2023-07-28T11:03:40+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-07-28T140143.345.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-secure-remote-access/</loc>
		<lastmod>2023-07-28T14:25:12+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-29.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/secure-remote-access.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/bazan-group-israels-largest-oil-refinery-had-its-website-hit-by-a-ddos-attack/</loc>
		<lastmod>2023-07-31T12:47:08+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-1-103.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/stire-3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/nato-microsoft-zero-day/</loc>
		<lastmod>2023-07-31T14:14:47+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Nato-Microsoft-zero-day-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/canon-advises-users-to-reset-wi-fi-settings-when-discarding-inkjet-printers/</loc>
		<lastmod>2023-08-01T16:20:55+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Canon-Advises-Users-to-Reset-WiFi-Settings-When-Discarding-Inkjet-Printers.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/latest-supply-chain-attack-targeting-popular-live-chat-app/</loc>
		<lastmod>2023-08-01T20:35:01+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-1-44.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/bbb.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/hades-ransomware-gang-claims-more-victims/</loc>
		<lastmod>2023-08-01T20:36:28+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_3_7260565757.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Ransomeware-targets-724x342-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/us-nuclear-research-labs-hit-by-russian-hackers/</loc>
		<lastmod>2023-08-01T20:39:50+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-34-17.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/tellyouthepass-ransomware-returns-as-a-cross-platform-golang-threat/</loc>
		<lastmod>2023-08-01T20:46:44+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_3686172285.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/hot-topic-data-breach/</loc>
		<lastmod>2023-08-02T09:26:18+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hot-topic-data-breach.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/nhs-lanarkshire-exposed-data-whatsapp-group/</loc>
		<lastmod>2023-08-02T12:26:45+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/NHS-whatsapp-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/microsoft-teams-users-targeted-by-russian-threat-group/</loc>
		<lastmod>2023-08-04T09:22:08+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-08-04T115414.557.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/microsoft-teams-phishing.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/microsoft-teams-prompt.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/defense-in-depth-layers/</loc>
		<lastmod>2023-08-04T14:57:05+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Alina-Defense-in-Depth-Layers-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/control-layers.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-a-one-time-password-otp/</loc>
		<lastmod>2023-08-05T11:26:08+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Asset-95-100.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/one-time-password.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Asset-50-100-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/exploit-kits/</loc>
		<lastmod>2023-08-07T06:44:45+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/exploit-kits.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/how-do-exploit-kits-work-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-ciam/</loc>
		<lastmod>2023-08-08T06:48:19+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Asset-83-100.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Asset-45-100.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-passwordless-authentication/</loc>
		<lastmod>2023-08-08T06:52:22+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-7-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-2-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-ztna-zero-trust-network-access-explained/</loc>
		<lastmod>2023-08-08T07:00:20+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Asset-63-100.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-deep-learning-model-decodes-keyboard-sounds-with-95-accuracy/</loc>
		<lastmod>2023-08-08T22:14:21+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/New-Deep-Learning-Model-Decodes-Keyboard-Sounds-with-95-Accuracy.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/the-fbi-is-investigating-a-ransomware-attack-that-disrupted-hospital-operations-in-4-states/</loc>
		<lastmod>2023-08-08T23:38:32+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/The-FBI-Is-Looking-Into-a-Ransomware-Attack-that-Disrupted-Hospitals-Operations-in-4-States.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/downfall-vulnerability-intel/</loc>
		<lastmod>2023-08-09T09:17:16+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Downfall-Intel-vulnerability.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-an-exploit/</loc>
		<lastmod>2023-08-10T15:04:38+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/what-is-an-exploit.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/how-does-an-exploit-work.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/raccoon-stealer-malware/</loc>
		<lastmod>2023-08-17T10:25:54+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-08-17T131815.667.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/egregor-ransomware/</loc>
		<lastmod>2023-08-18T07:57:56+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Elena-Egregor-Ransomware-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/egregor-decryptor.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/raas_midler_figure1_10052020.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/5fcdc68da6114994fe8ff875_Figure-3.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/QakBot-malware.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/EiOYNWkX0Acz4uj-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Password.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/zimbra-collaboration-email-servers-targeted/</loc>
		<lastmod>2023-08-18T10:19:56+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-08-18T130856.576.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/blackcat-sphynx-the-ransomware-operation-evolves-once-again/</loc>
		<lastmod>2023-08-18T14:25:54+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-08-18T170259.618.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/blackcat-ransomware-note.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/winrar-vulnerability-allows-remote-code-execution/</loc>
		<lastmod>2023-08-21T13:12:06+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/WinRAR-Releases-Version-6.23-to-Address-High-Severity-Vulnerabilities..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cuba-ransomware-exploits-veeam-flaw-targets-u-s-and-latin-american-entities/</loc>
		<lastmod>2023-08-21T15:08:22+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Cuba-Ransomware-Exploits-Veeam-Flaw-Targets-U.S.-and-Latin-American-Entities.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/dns-stager-query-blackberrry.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/duolingo-data-breach/</loc>
		<lastmod>2023-08-23T09:21:01+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/duolingo-data-breach.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-ivanti-zero-day-vulnerability/</loc>
		<lastmod>2023-08-23T11:56:50+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/ivanti-zero-day-vulnerability.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/xdr-vs-mdr-a-comparison-of-two-detection-and-response-solutions/</loc>
		<lastmod>2023-08-23T16:39:58+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-1-93.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-1-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/help-net-security-publishes-a-report-on-extended-detection-and-response-xdr/</loc>
		<lastmod>2023-08-23T17:20:40+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-5-7.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/heimdals-xdr-turkish-threat-group/</loc>
		<lastmod>2023-08-23T17:24:54+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_6875869652.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/danish-companies-ransomware-attacks/</loc>
		<lastmod>2023-08-24T07:38:05+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-08-24T093853.720.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/thousands-of-openfire-servers-at-risk-from-critical-cve/</loc>
		<lastmod>2023-08-24T13:26:00+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Openfire-servers-unpatched-vulnerability.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/host-intrusion-detection-system-hids/</loc>
		<lastmod>2023-08-25T15:00:52+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-25-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-XDR-request-a-demo-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/heimdal-xdr-nabil-nistar-interview/</loc>
		<lastmod>2023-08-28T12:04:36+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-84-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/1.HS_Full.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/moms-meals-warns-of-major-data-breach-affecting-over-1-2-million-individuals/</loc>
		<lastmod>2023-08-29T15:47:46+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Moms-Meals-Warns-of-Major-Data-Breach-Affecting-Over-1.2-Million-Individuals-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/dreambus-malware-rocketmq/</loc>
		<lastmod>2023-08-30T09:33:36+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/dreambus-malware-RocketMQ.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/national-danish-police-phishing-attack/</loc>
		<lastmod>2023-08-31T07:56:18+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Asset-102-100.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Screenshot-2023-08-29-160345.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Screenshot-2023-08-29-173706.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/qakbot-malware-dismantled/</loc>
		<lastmod>2023-08-31T09:05:35+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-08-31T113052.520.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/citrix-zero-day-exploited/</loc>
		<lastmod>2023-08-31T09:54:10+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Citrix-zero-day-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/weaknesses-in-cisco-asa-ssl-vpns-exploited-through-brute-force-attacks/</loc>
		<lastmod>2023-08-31T13:11:55+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-08-31T150925.449.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/sapphirestealer-malware/</loc>
		<lastmod>2023-09-01T09:42:39+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-09-01T115108.219.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/sourcegraph-website-security-breach/</loc>
		<lastmod>2023-09-01T12:16:18+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-09-01T145751.458.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/heimdal-expansion-india/</loc>
		<lastmod>2023-09-05T09:20:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/university-of-sydney-data-breach/</loc>
		<lastmod>2023-09-06T10:25:58+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/University-of-Sydney-Confirms-Data-Breach.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/7-key-mxdr-benefits/</loc>
		<lastmod>2023-09-07T10:18:24+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Asset-105-100.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-27-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/7-Key-MXDR-Benefits-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/minneapolis-school-district-data-breach/</loc>
		<lastmod>2023-09-07T11:24:16+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/School-District-Data-Breach.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/rocketmq-vulnerability/</loc>
		<lastmod>2023-09-08T14:37:40+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-09-08T153344.610.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cisco-broadworks-vulnerability/</loc>
		<lastmod>2023-09-08T14:45:38+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-09-08T172652.446.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-token-based-authentication/</loc>
		<lastmod>2023-09-11T12:01:01+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/token-based-authentication.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-27-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/mgm-resorts-cyber-incident/</loc>
		<lastmod>2023-09-13T08:05:27+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MGM-Resorts-Suspends-IT-Systems-Following-a-Cyber-Incident.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MGM-website-down.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/essential-features-of-advanced-endpoint-security-tools/</loc>
		<lastmod>2023-09-13T08:43:38+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/essential-features-of-advanced-endpoint-security-tools-blog-concept-image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-a-ping-flood-attack-and-how-to-prevent-it/</loc>
		<lastmod>2023-09-13T08:44:25+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/What-Is-a-Ping-Flood-and-How-to-Prevent-It-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/attack-vectors/</loc>
		<lastmod>2023-09-13T08:58:24+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Bianca-Organization-1030x360.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/aikido-wiperware/</loc>
		<lastmod>2023-09-13T08:59:42+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-13-25.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-cybercrime-as-a-service-caas/</loc>
		<lastmod>2023-09-13T09:04:29+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-6-30.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-72.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-data-erasure/</loc>
		<lastmod>2023-09-13T09:05:30+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-147.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/top-5-must-watch-xdr-videos-from-heimdal/</loc>
		<lastmod>2023-09-13T09:13:19+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Asset-28@2x-100-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-21-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-22-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-21-2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-21-4-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-21-3-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-21-5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/operational-threat-intelligence/</loc>
		<lastmod>2023-09-13T09:19:51+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_2_5209982071.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/advanced-threat-protection-atp/</loc>
		<lastmod>2023-09-13T09:20:41+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-18-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/brute-force-attack/</loc>
		<lastmod>2023-09-13T09:21:41+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Brute-Force-Attack-Cover-100.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Asset-13-100.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Asset-12-100.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-eradication-in-cybersecurity/</loc>
		<lastmod>2023-09-13T09:23:38+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Elena-Victim-of-a-Cyberattack-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Capture-8.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/advanced-persistent-threat-apt/</loc>
		<lastmod>2023-09-13T09:24:31+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-1-16.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/advanced-persistent-threat-apt-stages.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/advanced-persistent-threat-apt-concept-image.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/github-vulnerability-4000-repositories-repojacking/</loc>
		<lastmod>2023-09-13T15:10:11+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/GitHub-vulnerability-4000-repositories.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/lockbit-new-york-hospitals-breach/</loc>
		<lastmod>2023-09-15T14:28:10+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-09-15T170442.177.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/lockbit-hospital-new-york.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/dns-protection/</loc>
		<lastmod>2023-09-15T14:47:39+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Visuals-Maria-WP-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/DNS-Protection-Key-Benefits.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/DNS-Attacks-blocked-via-DNS-filtering.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/top-healthcare-data-breaches/</loc>
		<lastmod>2023-09-16T18:57:18+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Top-10-Largest-Healthcare-Data-Breaches-2022-2023.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/healthcare-breaches-with-with-500-or-more-records.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/healthcare-breaches-individuals-affected-.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/best-cyber-security-books/</loc>
		<lastmod>2023-09-18T08:49:04+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hs-These-are-the-best-educational-books-for-learning-cybersec_271A24.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/royal-mail-suffers-severe-social-disruption-following-cyberattack/</loc>
		<lastmod>2023-09-18T08:50:50+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-01-12T123801.342.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/jndi-vulnerability-in-h2-database-similar-to-log4shell/</loc>
		<lastmod>2023-09-18T08:52:38+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/JNDI-vulnerability-cover-image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/gitlab-pipeline-vulnerability/</loc>
		<lastmod>2023-09-20T10:33:19+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/gitlab-pipeline-vulnerability-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/international-criminal-court-icc-system-breach/</loc>
		<lastmod>2023-09-20T14:58:43+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/ICC-system-breach-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/sandman-luadream/</loc>
		<lastmod>2023-09-22T09:50:45+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-09-22T124021.722.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/apple-fixes-new-actively-exploited-zero-day-vulnerabilities/</loc>
		<lastmod>2023-09-22T13:05:40+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-09-22T154222.608.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/ny-college-spends-3-5m-on-cybersecurity-after-breach-affecting-200k-students/</loc>
		<lastmod>2023-09-26T15:05:43+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/NY-College-Must-Spend-3.5M-on-Cybersecurity-After-Breach-Affecting-200k-Students.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/sony-data-breach/</loc>
		<lastmod>2023-09-27T14:48:59+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/sony-data-breach.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/isae-3000-soc-2-type-ii-certification/</loc>
		<lastmod>2023-09-28T11:25:19+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-91-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/vulnerability-management-challenges/</loc>
		<lastmod>2023-09-28T12:08:35+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-09-27T101549.754.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/heres-why-you-need-another-layer-of-security-to-your-antivirus/</loc>
		<lastmod>2023-09-28T12:59:03+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Why-you-need-to-add-another-layer-of-security.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Vladimir-196.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Vladimir-296.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Virus-Total-results.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Vladimir-396.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Thor-Foresight_DLG.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Patch-Management96.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-the-best-antivirus/</loc>
		<lastmod>2023-09-28T12:59:55+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hs-How-Do-You-Choose-The-Best-Security-Solution_122631.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2015/03/3-circles_user.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/virus-bulletin.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/virus-bulletin-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Thor-Premium-Home.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/hackers-abuse-google-ads-antivirus-avoiding-malware/</loc>
		<lastmod>2023-09-28T13:00:23+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/cybercriminal-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/heimdal-threat-prevention-fully-compatible-antivirus/</loc>
		<lastmod>2023-09-28T13:01:26+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Bianca-Thor-Foresight-Compatible-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/image2-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/image3-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/image1-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/a-weakness-found-in-microsoft-defender-allows-hackers-to-avoid-malware-detection/</loc>
		<lastmod>2023-09-28T13:03:09+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_4_2111812902.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/virus-vs-worm/</loc>
		<lastmod>2023-09-28T13:06:09+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Bianca-Viruses-vs.-Worms-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/virus-vs-worm.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/av-test-malware.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/creeper-virus.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/zeus-gameover/</loc>
		<lastmod>2023-09-28T13:06:42+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hs-Zeus-gameover_D73637.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2014/07/zeus_p2p_communication.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cybersecurity-for-gamers-101-malware-risks/</loc>
		<lastmod>2023-09-28T13:09:12+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Miriam-Game-Malware-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/steam.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/apex-screenshot-world-overview.jpg.adapt_.crop16x9.818p-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/fortnite.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/fileless-malware-infections-guide/</loc>
		<lastmod>2023-09-28T13:09:39+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hs-Security-specialists-warn-users-about-this-type-of-attack_473E25.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/how-fileless-malware-infections-work.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/blocked-by-heimdal-security-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/best-internet-malware-forums/</loc>
		<lastmod>2023-09-28T13:10:10+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/security-forums-to-solve-your-malware-infection.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/circleci-security-incident-how-a-malware-attack-on-an-engineers-laptop-led-to-chaos/</loc>
		<lastmod>2023-09-28T13:11:17+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-21-17.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-malware-definition-types-and-protection/</loc>
		<lastmod>2023-09-28T13:11:42+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-4-36.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-headcrab-malware-hijacks-1200-redis-servers/</loc>
		<lastmod>2023-09-28T13:13:52+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/HeadCrab-Malware.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/HeadCrab-Malware-Slaveof.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/backdoor-malware-definition-risks-and-protection/</loc>
		<lastmod>2023-09-28T13:15:34+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-9-34.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/blackcat-ransomware-gang-to-launch-malicious-winscp-ads/</loc>
		<lastmod>2023-09-28T13:17:03+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-171.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/fig-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/fig-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/malicious-telegram-installers-used-to-spread-purple-fox-rootkit/</loc>
		<lastmod>2023-09-28T13:17:35+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_20_9559161454.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Screenshot-2022-01-04-145611.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/mosaicloader-malware-uses-seo-poisoning-to-infect-software-pirates-systems/</loc>
		<lastmod>2023-09-28T13:18:00+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_9765285560.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MosaicLoader-malware.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MosaicLoader-figure.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MosaicLoader.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/polymorphic-malware/</loc>
		<lastmod>2023-09-28T13:19:12+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/human-hand-touching-computer-keyboard.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/windows-defender-vulnerabilities-malware-can-disable/</loc>
		<lastmod>2023-09-28T13:20:23+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Miriam-Windows-Defender-1030x360.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/progress-software-releases-urgent-patches-to-fix-ws_ftp-server-vulnerabilities/</loc>
		<lastmod>2023-09-29T15:10:50+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-09-29T180205.717.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/logic-flaws-let-attackers-bypass-cloudflares-firewall-and-ddos-protection/</loc>
		<lastmod>2023-10-02T11:12:19+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-183.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/stire-6.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cactus-ransomware-exploiting-vpn-flaws/</loc>
		<lastmod>2023-10-02T11:26:22+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Cactus-ransomware.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/12-benefits-of-zero-trust-for-mid-sized-businesses/</loc>
		<lastmod>2023-10-02T11:40:33+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/zero-trust-for-mid-sized-businesses.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-1-49.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/vmware-fixes-severe-carbon-black-app-control-authentication-bypass-vulnerability/</loc>
		<lastmod>2023-10-02T13:35:58+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_9565746247.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/linux-servers-tsunami-ddos/</loc>
		<lastmod>2023-10-03T15:21:24+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/linux-servers-tsunami-ddos-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/johnson-controls-faces-ransomware-attack-risking-dhs-security-data/</loc>
		<lastmod>2023-10-04T07:11:19+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Johnson-Controls-Faces-Ransomware-Attack-Risking-DHS-Security-Data-.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/industrial-control-system-ics/</loc>
		<lastmod>2023-10-04T07:49:55+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-02-08T174309.754.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/top-10-reasons-mid-sized-businesses-need-zero-trust-security/</loc>
		<lastmod>2023-10-04T09:25:55+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-4-17.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-1-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-5-17.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/pytorch-models-shelltorch-vulnerabilities/</loc>
		<lastmod>2023-10-04T11:26:29+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/cybercriminal-5-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/11-security-steps-public-wi-fi-networks/</loc>
		<lastmod>2023-10-04T13:23:05+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hs-Public-Wifi-Security-Essential-Guide_0F1B27.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Public-Wi-Fi-sniffer-attack.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2015/02/file_sharing_off.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/public-wi-fi.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/website-statistics.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Windows-update.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/micro-segmentation/</loc>
		<lastmod>2023-10-04T13:25:24+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-07-14T113358.182.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Micro-segmentation.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/remote-browser-isolation/</loc>
		<lastmod>2023-10-04T13:28:53+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-08-09T104540.168.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/remote-browser-isolation-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/2fa-method-seucurity-keys-sole-method/</loc>
		<lastmod>2023-10-05T11:45:20+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_4989011499.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/usdot-data-breach/</loc>
		<lastmod>2023-10-05T11:47:10+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/USDOT-data-breach.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/git-patches-two-vulnerabilities-with-critical-security-level/</loc>
		<lastmod>2023-10-05T11:48:39+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-01-19T115051.841.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/most-common-u-s-security-issues-exploited-by-chinese-hackers-since-2020/</loc>
		<lastmod>2023-10-05T11:48:53+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-11-14.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Screenshot-.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/announcing-the-free-cyber-security-for-beginners-course/</loc>
		<lastmod>2023-10-05T11:49:05+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hs5-Weeks-of-FREE-Training_002540.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hs5-Weeks-of-FREE-Training_2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/mallox-ransomware-surge-in-activity/</loc>
		<lastmod>2023-10-05T11:49:20+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Mallox-Ransomware.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/attack.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/ransom-note-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-vulnerability-risk-management/</loc>
		<lastmod>2023-10-05T15:56:52+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Cezarina-Vulnerability-Risk-Management-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/the-difference-between-Legacy-Vulnerability-Management-and-Risk-Based-Vulnerability-Management-Heimdal%E2%84%A2-blog-.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/ethical-hacking/</loc>
		<lastmod>2023-10-06T10:25:23+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-02-01T154212.342.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/poc-exploits-released-for-major-linux-flaw/</loc>
		<lastmod>2023-10-06T13:36:08+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-10-06T161131.293.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/a-new-phishing-as-a-service-toolkit-was-discovered/</loc>
		<lastmod>2023-10-06T14:20:44+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Frappo-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/lyca-mobile-affected-by-cyberattack/</loc>
		<lastmod>2023-10-06T14:25:02+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-10-06T171722.180.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-phishing-kit-file-archivers-in-the-browser/</loc>
		<lastmod>2023-10-06T14:25:06+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-167.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Screenshot-2023-05-29-160354.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/microsoft-data-leakage/</loc>
		<lastmod>2023-10-09T10:20:24+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/microsoft-data-leakage.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cloroxs-profit-takes-major-hit-due-to-cyberattack/</loc>
		<lastmod>2023-10-10T15:42:09+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Cloroxs-Profit-Takes-Major-Hit-Due-to-Cyberattack.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/vulnerabilities-in-security-solutions-transform-them-in-data-wipers/</loc>
		<lastmod>2023-10-11T12:43:22+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-1-62.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Picture6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/ueba-user-entity-behavior-analytics/</loc>
		<lastmod>2023-10-11T12:44:22+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-20-24.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/UEBA.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/User-and-Entity-Behavior-Analytics-UEBA.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/air-europa-data-breach/</loc>
		<lastmod>2023-10-11T12:54:01+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Air-Europa-Data-breach-2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Air-Europa-Data-Breach.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cyber-kill-chain-model/</loc>
		<lastmod>2023-10-11T12:57:35+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Bianca-Cyber-Kill-Chain-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/the-7-cyber-kill-chain-steps.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/crypto-ransomware/</loc>
		<lastmod>2023-10-11T12:59:47+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/crypto-ransomware.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-email-spoofing/</loc>
		<lastmod>2023-10-11T17:24:22+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-7-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/email-spoofing.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/facebook-email-phishing.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/dropdown-underneath-sender-name.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/dropped-down-details.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/yahoo-raw-message.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/yahoo-mail-spf.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/yahoo-dkim.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-multi-factor-authentication-mfa/</loc>
		<lastmod>2023-10-12T08:18:47+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-46-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-46-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-48-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/balada-injector-wordpress/</loc>
		<lastmod>2023-10-13T13:47:53+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Balada-Injector-wordpress.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/fairfax-healthcare-company-announces-data-breach/</loc>
		<lastmod>2023-10-16T11:24:01+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-186.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/d-link-data-breach/</loc>
		<lastmod>2023-10-18T15:14:46+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/dlink-data-breach.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-malware-as-a-service-bunny-loader/</loc>
		<lastmod>2023-10-19T12:27:46+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/New-Malware-as-a-Service-Gains-Traction-Among-Cybercriminals-Bunnyloader.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-smishing/</loc>
		<lastmod>2023-10-19T12:29:04+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-38-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/SMISHING-ATTACK-PHASES.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/social-engineering-strategies-used-in-callback-phishing-attacks-are-evolving/</loc>
		<lastmod>2023-10-19T12:31:24+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-37-11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/BazarCall-Campaign-Heatmap.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/BazarCall.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Example-Callback-Phishing.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/fake-tripadvisor-emails-to-distribute-knight-ransomware/</loc>
		<lastmod>2023-10-19T12:33:54+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-1-105.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Stire-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/stire-1-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/rackspace-warns-clients-about-phishing-risks-after-suffering-a-ransomware-attack/</loc>
		<lastmod>2023-10-19T12:36:24+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-12-12T123542.827.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-penetration-testing-as-a-service/</loc>
		<lastmod>2023-10-19T12:36:46+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/ptaas.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-69.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/luna-moth-big-money-callback-phishing/</loc>
		<lastmod>2023-10-19T12:37:43+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/callback-phishing-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/phishing-campaign-uses-reverse-tunnels-and-url-shorteners/</loc>
		<lastmod>2023-10-19T12:39:22+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Phishing-attack-new-methods.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-hive-ransomware/</loc>
		<lastmod>2023-10-19T12:39:38+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Hive-ransomware-featured-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Hive-ransomware-admin-panel.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Hive-ransomware-disclaimer.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Hive-ransom-note.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Hive-ransomware-Rust.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Hive-ransomware-parameters-for-Rust.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/excluded-versions-from-Rust-encryption.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/targeted-industries-by-hive-ransomware.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/phishing-scams-are-targeting-netflix-users/</loc>
		<lastmod>2023-10-19T12:39:57+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-20-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/consumers-of-brand-name-companies-targeted-in-phishing-attacks-fbi-alerts/</loc>
		<lastmod>2023-10-19T12:40:31+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_9336960118.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/malicious-generative-ai-tools-solution/</loc>
		<lastmod>2023-10-19T12:40:51+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/malicious-generative-ai.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/CEO-Fraud.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/chatgpt-generated-malicious-code.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/thousands-of-cisco-ios-xe-devices-compromised-due-to-zero-day-vulnerability/</loc>
		<lastmod>2023-10-20T13:27:03+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-10-20T161907.309.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/progress-software-under-legal-and-financial-scrutiny-after-moveit-incident/</loc>
		<lastmod>2023-10-24T10:25:17+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Progress-Software-Under-Legal-and-Financial-Scrutiny-After-MOVEit-Incident.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/us-energy-company-reveals-how-akira-ransomware-compromised-its-systems/</loc>
		<lastmod>2023-10-25T08:55:33+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/US-Energy-Company-Reveals-How-Akira-Ransomware-Compromised-its-Systems-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/european-governments-email-servers-targeted-by-threat-actors/</loc>
		<lastmod>2023-10-27T14:03:59+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-10-27T162804.778.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/university-of-michigan-data-breach/</loc>
		<lastmod>2023-10-31T16:53:36+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/University-of-Michigan-Data-breach.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/toronto-public-library-cyberattack/</loc>
		<lastmod>2023-10-31T19:44:42+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Cyberattack-Disrupts-Toronto-Public-Library.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Toronto-Public-Library-Cyberattack-page.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/daixin-threat-group-claims-ransomware-attack-on-5-hospitals-in-ontario/</loc>
		<lastmod>2023-11-08T15:13:29+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/ontario-hospitals-data-breach.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/atlassian-vulnerabilities-cerber-ransomware/</loc>
		<lastmod>2023-11-08T16:25:34+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/atlassian-vulnerabilities-cerber-ransomware.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/macos-vulnerability-bypass-sip-root-restrictions/</loc>
		<lastmod>2023-11-09T09:38:49+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/macos-SIP-vulnerability.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/macstealer-macos-malware-steals-passwords-icloud/</loc>
		<lastmod>2023-11-09T09:43:10+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/macstealer-macos-malware-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-dnssec/</loc>
		<lastmod>2023-11-09T10:16:54+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/DNSSEC-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Screenshot-2022-09-22-105022-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/man-in-the-middle-mitm-attack/</loc>
		<lastmod>2023-11-09T10:17:17+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Elena-Man-in-the-Middle-1030x360-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/man-in-the-middle-attack-mitm-flow.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Man-in-the-Middle-Attack-Prevention-Strategies-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/35-million-linkedin-users-information-shared-on-hacking-forum/</loc>
		<lastmod>2023-11-09T17:54:17+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/35-Million-LinkedIn-Users-Information-Shared-on-Hacking-Forum.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Linkedin-Data-Leak-2023.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-icmp/</loc>
		<lastmod>2023-11-10T10:01:16+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/network-cables-in-server.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Most-Common-ICMP-attacks.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/How-to-Prevent-ICMP-attacks.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/reptar-intel-cpu-vulnerability/</loc>
		<lastmod>2023-11-15T13:03:10+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/intel-cpu-vulnerability-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/truepill-data-breach/</loc>
		<lastmod>2023-11-15T16:22:58+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/truepill-data-breach.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/samsung-uk-online-store-suffers-data-breach/</loc>
		<lastmod>2023-11-16T17:06:11+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Samsung-UK-Online-Store-Suffers-Data-Breach.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Samsung-Alert-Data-breach-UK.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/fbi-and-cisa-issue-advisory-on-rhysida-ransomware/</loc>
		<lastmod>2023-11-17T08:02:25+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/rhysida-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/netsupport-rat-attacks/</loc>
		<lastmod>2023-11-22T13:11:09+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/NetSupport-RAT-3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/atomic-stealer-malware/</loc>
		<lastmod>2023-11-22T15:59:07+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/atomic-stealer-malware-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cyberlink-supply-chain-attack/</loc>
		<lastmod>2023-11-24T13:14:11+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Blog-Cover-1200-x-628-ratio-300-157-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/cyberlink-trojan.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/fbi-warns-scattered-spider-forms-alliance-with-black-cat-ransomware/</loc>
		<lastmod>2023-11-27T12:36:56+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/FBI-Warns-Scattered-Spider-Forms-Alliance-with-Black-Cat-Ransomware.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/edr-vs-mdr-vs-xdr-a-comparison/</loc>
		<lastmod>2023-11-28T08:41:24+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-17-20.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/flagstar-bank-breached-third-time/</loc>
		<lastmod>2023-11-28T14:34:00+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-185.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/vulnerability-management-lifecycle/</loc>
		<lastmod>2023-11-28T15:03:02+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-07-19T123945.801.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/VULNERABILITY-MANAGEMENT-LIFECYCLE-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/cta-heimdal-request-a-demo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/gloucester-city-council-ransomware-recovery-1million/</loc>
		<lastmod>2023-11-29T17:47:07+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Gloucester-City-Council-Incurs-%C2%A31.1-Million-Cost-in-Ransomware-Recovery.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-privilege-management/</loc>
		<lastmod>2023-12-06T09:52:01+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Cezarina-Privilege-Management-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Privilege-Management-Benefits.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/See-Heimdal-in-Action-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Infographic-Photo-Template-2000-x-1200-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/privilege-overreach/</loc>
		<lastmod>2023-12-06T10:20:10+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Privilege-overreach.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Insider-Threat-Ponemon-Threats-Report.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-separation-of-privilege/</loc>
		<lastmod>2023-12-06T12:30:34+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-5-33.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/separation-of-privileges.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/privilege-access-management-solution.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/access-governance-strategy/</loc>
		<lastmod>2023-12-06T14:46:09+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Vladimir-Governance-1030x360.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-a-cve/</loc>
		<lastmod>2023-12-06T15:29:13+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-77.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/dns-rebinding/</loc>
		<lastmod>2023-12-07T12:30:01+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/dns-rebinding-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/role-based-access-control-rbac/</loc>
		<lastmod>2023-12-07T14:37:36+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_5_6354975767.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/policy-based-access-control/</loc>
		<lastmod>2023-12-07T14:52:23+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-49-12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/RBAC.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/PBAC.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/navy-contractor-austal-usa-confirms-cyberattack/</loc>
		<lastmod>2023-12-07T15:40:05+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Navy-Contractor-Austal-USA-Confirms-Cyberattack.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Hunters-International-Navy-Contractor-Austal-USA.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/zero-standing-privileges-zsp/</loc>
		<lastmod>2023-12-08T08:19:59+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Zero-Standing-Privileges-ZSP-as-a-Privileged-Access-Management.2-Strategy-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Zero-Standing-Privileges-ZSP-as-a-Privileged-Access-Management-Strategy.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/password-spraying-definition-how-it-works-and-how-to-stop-it/</loc>
		<lastmod>2023-12-08T08:34:27+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-9-33.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/identity-lifecycle-management-ilm/</loc>
		<lastmod>2023-12-08T08:37:29+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-85-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Tips-for-an-Effective-ILM-Strategy-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/User-provisioning-process.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/software-restriction-policy/</loc>
		<lastmod>2023-12-08T09:01:18+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-04-07T123928.293.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Software-Restriction-Policies.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/the-complete-guide-to-mandatory-access-control-mac/</loc>
		<lastmod>2023-12-08T09:47:33+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/The-Complete-Guide-to-Mandatory-Access-Control-MAC-Why-Is-MAC-Important-for-Data-Protection-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/understanding-risk-based-authentication-rba/</loc>
		<lastmod>2023-12-08T10:05:39+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/risk-based-authentication-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/risk-based-authentication.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/a-guide-to-dac-an-overview-of-discretionary-access-control/</loc>
		<lastmod>2023-12-08T10:22:03+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/A-Guide-to-DAC-An-Overview-of-the-Most-Important-Aspects-of-Discretionary-Access-Control-Cover.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-federated-identity/</loc>
		<lastmod>2023-12-08T10:24:49+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_4_9577208378.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-identity-governance-and-administration-iga/</loc>
		<lastmod>2023-12-08T10:36:42+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_4598362426.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Asset-8-100.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Asset-9-100.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Asset-7-100.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/continuous-adaptive-risk-and-trust-assessment/</loc>
		<lastmod>2023-12-08T12:00:39+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-25-11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Continuous-Adaptive-Risk-and-Trust-Assessment-CARTA.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/credential-management-definition-best-practices/</loc>
		<lastmod>2023-12-08T12:09:24+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-16-25.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Credential-Management-System-Features.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Password-Policy.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/macos-patching/</loc>
		<lastmod>2023-12-11T10:23:31+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/macOS-patching.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/zero-day-vulnerability/</loc>
		<lastmod>2023-12-13T12:52:06+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Alina-Target-of-a-Zero-Day-Attack-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/cta-heimdal-request-a-demo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Infographic-Photo-Template-2000-x-1200-5.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Pink-Temlate-1600-x-1600-4-sections-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/toyota-data-breach/</loc>
		<lastmod>2023-12-13T17:04:21+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/toyota-data-breach.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/lockbit-ransomware-targets-german-energy-agency-dena/</loc>
		<lastmod>2023-12-14T14:19:43+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/LockBit-Ransomware-Targets-German-Energy-Agency-Dena.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/LockBit-Ransomwares-ransom-message-for-Dena.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/kyivstar-cyberattack/</loc>
		<lastmod>2023-12-15T12:13:56+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Blog-Cover-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/kyivstar-facebook-post.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/kyivstar-site.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-lockbit-ransomware/</loc>
		<lastmod>2023-12-20T13:23:51+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-135.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/The-Top-5-Deadliest-Ransomware-Groups-in-the-World.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Colorful-Elegant-Linear-Steps-Process-Diagram.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/jaskago-malware/</loc>
		<lastmod>2023-12-20T14:06:10+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/JaskaGO-malware-.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/prevent-JaskaGO-malware.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/fbi-disrupts-blackcat/</loc>
		<lastmod>2023-12-22T10:02:25+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/fbi-takes-down-blackcat-website.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/cisa-advisory-on-blackcat.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/major-data-breach-at-eso-solutions-affects-2-7-million-patients/</loc>
		<lastmod>2023-12-22T10:42:37+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Major-Data-Breach-at-ESO-Solutions-Affects-2.7-Million-Patients.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/nsa-releases-2023-cybersecurity-year-in-review-report/</loc>
		<lastmod>2023-12-22T11:37:48+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/NSAs-2023-Report.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/christmas-scams/</loc>
		<lastmod>2023-12-22T12:37:00+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Elena-Scams-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Online-Christmas-Scams_blog-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/lockbit-ransomware-attack-affects-three-german-hospitals/</loc>
		<lastmod>2023-12-29T11:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Blog-Cover-5.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/data-breach-impacts-loancare-customers/</loc>
		<lastmod>2023-12-29T14:38:41+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Blog-Cover-6.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-digital-forensics-and-incident-response-dfir/</loc>
		<lastmod>2024-01-01T12:46:53+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/incident-response.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/black-basta-buster/</loc>
		<lastmod>2024-01-04T14:18:17+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/16.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Black-Basta-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/epss-score-system/</loc>
		<lastmod>2024-01-04T14:31:40+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/EPSS-scoring-system.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/vulnerability-prioritization.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/EPSS-vs-CVSS.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/major-data-breach-at-healthec-affects-millions/</loc>
		<lastmod>2024-01-04T15:27:50+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Major-Data-Breach-at-HealthEC-Affects-Millions-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/widespread-vulnerability-in-ssh-servers-the-terrapin-attack-threat/</loc>
		<lastmod>2024-01-05T09:15:40+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Widespread-Vulnerability-in-SSH-Servers-The-Terrapin-Attack-Threat-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Terrapin-attack.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/incident-response/</loc>
		<lastmod>2024-01-05T15:49:10+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/incident-response-concept-image-blog.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-s-mime/</loc>
		<lastmod>2024-01-09T11:07:49+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-9-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-11-6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cybersecurity-trends/</loc>
		<lastmod>2024-01-10T11:28:01+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Blog-Cover-7.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Infographic-Photo-Template-1600-x-1800-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/sea-turtle-dutch-isps/</loc>
		<lastmod>2024-01-10T17:13:17+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/sea-turtle-hack-dutch-ISPs.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/microsoft-sql-servers-mimic-ransomware/</loc>
		<lastmod>2024-01-10T17:14:03+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Microsoft-SQL-server-Mimic-ransomware.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/framework-data-breach/</loc>
		<lastmod>2024-01-12T16:39:25+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Blog-Cover-9.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/dns-security-for-business/</loc>
		<lastmod>2024-01-16T09:26:06+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Bianca-DNS-Security-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/DNS-security-solutions.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/androxgh0st-malware-iocs-and-ttps/</loc>
		<lastmod>2024-01-17T14:30:48+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Androxgh0st-malware.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/akira-ransomware-finnish-companies/</loc>
		<lastmod>2024-01-17T16:43:40+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/akira-ransomware.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/akira-ransomware-attacks.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/best-cyber-security-blogs/</loc>
		<lastmod>2024-01-18T22:46:05+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/50-Amazing-Internet-Security-Blogs_AC69BA.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/teamviewer-ransomware-attacks/</loc>
		<lastmod>2024-01-19T14:39:36+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Blog-Cover-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/teamviewer-ransomware-attack-file.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/lockbit-3-builder.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/mac-patch-management-strategy/</loc>
		<lastmod>2024-01-22T14:31:15+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Mac-Patch-Management.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Main-Steps-of-the-Mac-Patch-Management-Process.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/practical-online-protection-where-malware-hides/</loc>
		<lastmod>2024-01-25T12:26:05+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/where-malware-hides-featured_554455.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/top-10-malware-families-Q2-2016.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/types-of-malicious-files-blocked-by-office-365-dvanced-threat-protection.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/simple-ransomware-infection-chain-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/percentage-of-phishing-emails-delivering-ransomware.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/phishing-emails-open-and-click-rates.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/how-angler-exploit-kit-works-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/How-JavaScript-malware-is-used-in-drive-by-attacks-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Torrent-Flowchart.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/network-firewall-security-essentials/</loc>
		<lastmod>2024-01-25T14:12:47+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Alina-Firewall-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/firewall.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/experts-reveal-dataset-with-26-billion-leaked-records/</loc>
		<lastmod>2024-01-26T07:29:11+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Experts-Reveal-Dataset-with-26-Billion-Leaked-Records.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/moab-brand-leaks.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-spyware-what-it-does-and-how-to-block-it/</loc>
		<lastmod>2024-01-30T08:22:31+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-3-49.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-cyber-resilience-strategy/</loc>
		<lastmod>2024-01-30T08:25:46+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-11-17.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/doxxing/</loc>
		<lastmod>2024-01-30T08:27:47+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Valdimir-Doxxing-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/ai-generated-mental-health-counseling-raises-moral-concerns/</loc>
		<lastmod>2024-01-30T08:54:01+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-142.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/essential-guide-instagram/</loc>
		<lastmod>2024-01-30T08:56:54+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hs-Essential-Instagram-Security-measures_77339C.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Instagram-Security-Make-your-account-private-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Instagram-Security-How-to-block-followers-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Instagram-Security-How-to-edit-your-profile-information-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Instagram-security-how-to-add-photo-tags-manually-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/story-settings.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2fa.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Capture-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/booking-com-phishing-campaign/</loc>
		<lastmod>2024-01-30T09:26:57+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-10-22T151011.776.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/whatsapp-booking-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/whatsapp-booking-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/whatsapp-booking-3.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/booking-tweet-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/booking-tweet-response.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/booking-facebook-post.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/booking-tweet-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/booking-reddit-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/booking-reddit-post-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/booking-phishing-message.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/booking-phishing-platform.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/booking-phishing-code.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cybersecurity-threat-report/</loc>
		<lastmod>2024-01-30T09:27:51+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-48-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/heimdal_threat_report_2023_key_takeways..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/heimdal_threat_report_2023_detections_resolutions.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-sim-swapping/</loc>
		<lastmod>2024-01-30T13:04:13+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Cezarina-SIM-Swapping-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/sms-swap-diag-full.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/10-surprising-cyber-security-facts-that-may-affect-your-online-safety/</loc>
		<lastmod>2024-01-30T15:19:45+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hs-10-Little-Known-Security-Facts-Every-User-Should-Know_503B01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Cost-of-Cyber-Crime-statistics-2017-ponemon-accenture.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/most-wanted-cyber-criminals-in-the-world-heimdal-security.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/most-expensive-computer-virus-heimdal-security.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/malware-yearly-statistic-2018.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/social-media-hacking-heimdal-security.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/99-percent-of-computers-are-vulnerable-heimdal-security.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/cyber-security-insider-jobs-heimdal-security.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/social-engineering-cyber-hacking-heimdal-security.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/government-malware-heimdal-security.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/changing-attacker-profiles.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/real-time-map-of-cyber-attacks-heimdal-secuity.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hacktivism-statistic-heimdal-security.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/financial-losses-cyber-hacking-heimdal-security.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cactus-schneider-electric-data-breach/</loc>
		<lastmod>2024-01-31T16:54:40+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/schneider-electric-data-breach.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/schneider-electric-data-breach.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cloudflare-falls-victim-to-cyberattack-leveraging-credentials-from-okta-breach/</loc>
		<lastmod>2024-02-02T16:45:03+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Cloudflare-Falls-Victim-to-Cyberattack-Leveraging-Credentials-from-Okta-Breach.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/ransomware-payments-record/</loc>
		<lastmod>2024-02-08T08:46:33+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/ransomware-payments-record-2023.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/us-infrastructure-networks-volt-typhoon/</loc>
		<lastmod>2024-02-09T15:57:02+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/NEW-Blog-Cover-4.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/llms-can-turn-nasty-machine-learning/</loc>
		<lastmod>2024-02-19T15:00:26+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/You%E2%80%99re-Saying-LLMs-Can-Turn-Nasty-A-Machine-Learning-Engineer%E2%80%99s-View.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Deceptive-LLMs-2023-vs-2024-Anthropic.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Deceptive-LLMs-Stop-sign-vs-100km-per-h-Anthropic.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Deceptive-LLMs-Before-and-After-Safety-Training-Anthropic.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/You%E2%80%99re-Saying-LLMs-Can-Turn-Nasty-A-Machine-Learning-Engineer%E2%80%99s-View-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/viamedis-almerys-data-breaches/</loc>
		<lastmod>2024-02-20T12:48:46+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Viamedis-Almerys-Data-Breaches.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/viamedis-data-breach.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/avaddon-ransomware/</loc>
		<lastmod>2024-02-22T13:29:11+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-35.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/avaddon-ransomware-message.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/avaddon-whats-the-matter.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/avaddon-ransomwarefrench-insurance-axa-3tb-data-stolen-3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/sodinokibi-ransomware-101/</loc>
		<lastmod>2024-02-22T14:09:44+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Elena-Sodinokibi-Ransomware-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/revils-ransomware-success-formula-constant-innovation-showcase_image-7-a-16976.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/REvil-Attack.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/being-sold.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/prevention-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/google-cloud-run-banking-trojan-operation/</loc>
		<lastmod>2024-02-23T13:48:16+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/NEW-Blog-Cover-12.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Google-Cloud-banking-trojan.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/subdomailing-phishing-campaign/</loc>
		<lastmod>2024-02-28T16:07:48+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/subdomain-hijacking.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/screenconnect-ioc-ransomware-advisory/</loc>
		<lastmod>2024-02-29T13:12:50+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/screenconnect-vulnerability.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/windows-kernel-zero-day/</loc>
		<lastmod>2024-03-07T07:13:46+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/windows-kernel-zero-day.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/drive-by-download/</loc>
		<lastmod>2024-03-07T15:48:26+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-57-12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Anatomy-of-a-Drive-by-Download-Attack.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/cta-heimdal-request-a-demo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/generative-ai-phishing/</loc>
		<lastmod>2024-03-07T17:13:53+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/theres-something-phishy-about-gen-ai-Preview.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/phishing-infographic.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/phishing-example.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/dns-zone/</loc>
		<lastmod>2024-03-08T13:45:53+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/DNS-zone.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/DNS-security-solution-free-trial.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/The-DNS-zone-transfer-process.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/wordpress-websites-brute-force-attacks/</loc>
		<lastmod>2024-03-08T15:13:35+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/NEW-Blog-Cover-20.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/wordpress-brute-force-attacks.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/mssps-on-the-rise-a-vendors-view-on-current-landscape-future-trends/</loc>
		<lastmod>2024-03-11T09:54:19+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-175.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-2-3.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-1-47.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-79.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/ransomware-profits-declined-by-40-in-2022/</loc>
		<lastmod>2024-03-11T22:13:38+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-01-20T134934.578.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Ransomware-profits-per-year-Chainalysis.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Ransomware-gang-activity-per-quarter-Chainalysis.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Ransomware-payment-percentage-Coveware.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-dns/</loc>
		<lastmod>2024-03-11T22:19:51+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/What-is-DNS-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/DNS-server-types.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/DNS-query-process.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-mutual-authentication/</loc>
		<lastmod>2024-03-13T14:32:51+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_2_9538791196.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/mutual-authentication.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/mutual-authentication-use-cases.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Mutual-Authentication-Main-Components.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/types-of-attacks-mutual-authentication-stops.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/microsofts-stolen-source-code/</loc>
		<lastmod>2024-03-13T15:25:25+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/microsoft-stolen-source-code.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/ghostrace-attack-poc/</loc>
		<lastmod>2024-03-13T16:54:43+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/ghostrace-attack-poc.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/anydesk-system-breach/</loc>
		<lastmod>2024-03-14T08:40:18+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/AnyDesk-System-Breach.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/broken-access-control/</loc>
		<lastmod>2024-03-19T14:35:34+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/NEW-Blog-Cover-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Broken-Access-Control-Attacks.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/cta-heimdal-request-a-demo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/defense-in-depth-cybersecurity/</loc>
		<lastmod>2024-03-20T09:56:01+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Alina-Strategy-1030x360.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/phishing-netsupport-rat/</loc>
		<lastmod>2024-03-20T14:12:01+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/phishing-NetSupport-RAT.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/nvd-stopped-updating-cves/</loc>
		<lastmod>2024-03-20T17:42:45+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/nvd-stops-updating-cves.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/nvd-notice.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/triple-extortion-ransomware/</loc>
		<lastmod>2024-03-21T11:49:53+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_9_6185400722-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Triple-Extortion-Ransomware.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/how-to-clear-dns-cache/</loc>
		<lastmod>2024-03-22T09:49:58+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-73.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/flush-dns-windows.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/flush_dns_windows10_cmd.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/flush-dns-xhrome.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/clear_dns_cache_microsoft_edge.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/clear_dns_cache_mozilla_firefox.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-conti-ransomware/</loc>
		<lastmod>2024-03-22T12:00:05+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/What-is-Conti-Ransomware.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/ransomware-encryption-protection.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/managed-service-provider-msp/</loc>
		<lastmod>2024-03-25T15:19:38+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/NEW-Blog-Cover-21.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/heimdal-platform-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/cta-heimdal-request-a-demo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Launches-Partner-NEXUS-Program.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Launches-Partner-NEXUS.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-identity-as-a-service-idaas/</loc>
		<lastmod>2024-03-26T17:09:18+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Asset-27@2x-100.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Call-to-action-button-13.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Asset-5@2x-100.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/encryption-as-a-service/</loc>
		<lastmod>2024-03-26T17:16:01+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/what-is-encryption-as-a-service.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Call-to-action-button-14.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/how-encryption-works.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/us-announces-10-million-reward-for-leads-on-blackcat-ransomware-group/</loc>
		<lastmod>2024-03-29T09:10:25+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/U.S.-Announces-10-Million-Reward-for-Leads-on-Blackcat-Ransomware-Group-3.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/REP-Heimdal.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/online-privacy-security/</loc>
		<lastmod>2024-04-02T11:58:02+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hs-Heimdal-Security_Privacy-Tools_0256AB.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2015/01/VPN.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2015/01/proxy.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/netwalker-ransomware-explained/</loc>
		<lastmod>2024-04-02T21:45:45+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Alina-Netwalker-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Ransomware-Encryption-Protection.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/powerhosts-esxi-servers-encrypted-with-new-sexi-ransomware/</loc>
		<lastmod>2024-04-05T09:16:42+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Powerhost-ESXi-Servers-Encrypted-with-New-SEXi-Ransomware.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/sexi-ransom-note.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/rheinmetall-suffers-cyberattack/</loc>
		<lastmod>2024-04-08T15:00:24+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2023-04-18T130721.633.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/d-link-nas-devices-vulnerable/</loc>
		<lastmod>2024-04-10T14:27:39+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/D-link-NAS-device-vulnerable.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/d-link-nas-vulnerability-exploit.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/d-link-nas-EOL-models.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/sharepoint-flaws-could-help-threat-actors-evade-detection-easier/</loc>
		<lastmod>2024-04-12T12:50:53+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/NEW-Blog-Cover-33.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/sharepoint-flaw-article1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/years-old-vulnerability-in-ami-megarac-bmcs-impacts-intel-and-lenovo-hardware/</loc>
		<lastmod>2024-04-17T11:57:27+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/lighttpd-vulnerability.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/tp-link-archer-command-injection-vulnerability/</loc>
		<lastmod>2024-04-17T19:51:14+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/tp-link-archer-router-command-injection-vulnerability.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/crushftp-zero-day/</loc>
		<lastmod>2024-04-24T14:47:57+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/crushftp-zero-day.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/mitre-breached-ivanti-zero-days/</loc>
		<lastmod>2024-04-25T09:50:07+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/mitre-breach.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/mitre-breach-cause.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/rapid-reset-ddos-attacks-explained/</loc>
		<lastmod>2024-04-25T09:57:07+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/rapid-reset-ddos-attacks-explained-3.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/rapid-reset-ddos-attacks-explained-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/rapid-reset-ddos-attack-why-not-go-back-to-http1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/kaiser-permanente-data-breach/</loc>
		<lastmod>2024-04-26T12:43:25+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/NEW-Blog-Cover-40.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/heimdal-teams-up-with-dacta-to-strengthen-cybersecurity-in-the-apac-region/</loc>
		<lastmod>2024-05-07T11:48:25+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Teams-Up-with-DACTA-to-Strengthen-Cybersecurity-in-the-APAC-Region.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Launches-Partner-NEXUS.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/heimdal-adds-pasm-to-the-worlds-widest-cybersecurity-platform/</loc>
		<lastmod>2024-05-07T11:48:51+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal%C2%AE-Adds-PASM-to-the-World%E2%80%99s-Widest-Cybersecurity-Platform.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/PASM-Heimdal.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Privileged-Account-and-Session-Management-PASM-by-Heimdal.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/heimdal-joins-iwf-to-combat-child-sexual-abuse-imagery/</loc>
		<lastmod>2024-05-07T11:49:20+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Joins-IWF-blog-cover.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/heimdal-partners-with-jupiter-technology-japan/</loc>
		<lastmod>2024-05-07T11:50:22+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/1250-x-703-Blog-Cover.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal%C2%AE-Partners-with-Jupiter-Technology-to-Distribute-Cybersecurity-Solutions-in-Japan-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Launches-Partner-NEXUS.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/heimdal-collaborates-microsoft/</loc>
		<lastmod>2024-05-07T11:51:03+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Feature-Heimdal-Microsoft.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/introducing-heimdal-xdr-a-game-changer-disrupting-the-market-with-the-widest-range-of-next-generation-solutions/</loc>
		<lastmod>2024-05-07T11:51:57+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-80.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/XDR-Heimdal-press-visual-.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/nhs-free-ransomware-protection/</loc>
		<lastmod>2024-05-07T11:52:19+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-76.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/heimdal-and-spp-join-forces-to-deliver-award-winning-unified-security-capabilities-to-us-service-providers/</loc>
		<lastmod>2024-05-07T11:52:41+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Visual-blog-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/partners.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/heimdal-threat-prevention-endpoint-wins-cloud-based-solution-of-the-year-at-the-network-computing-awards-2023/</loc>
		<lastmod>2024-05-07T11:53:08+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Asset-68-100.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-30-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/heimdal-wins-risk-management-award-for-best-patch-and-asset-management-solution/</loc>
		<lastmod>2024-05-07T11:53:36+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Asset-60-100.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/threat-hunting-and-action-center/</loc>
		<lastmod>2024-05-07T11:54:06+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/threat-hunting-and-action-center-cover.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/TAC-infographic.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/heimdal-announces-revolutionary-new-product/</loc>
		<lastmod>2024-05-07T11:54:24+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Threat-Hunting-and-Action-Center-cover-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/heimdal-announces-rebrand-and-name-consolidation/</loc>
		<lastmod>2024-05-07T11:54:46+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Cover_1@4x-100.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Master_Logo-Navy_RGB.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/morten-quote-logo-launch.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/catalin-quote-logo-launch.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/heimdal-threat-prevention-recognized-in-getapps-category-leaders-cybersecurity-report/</loc>
		<lastmod>2024-05-07T11:55:10+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-11-23.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/getapp.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/95.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/heimdal-recognized-as-top-cybersecurity-software-by-software-advice-in-2022/</loc>
		<lastmod>2024-05-07T11:55:27+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-11-18T130322.255.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/softadv.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Screenshot-2022-11-17-155829.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/heimdal-threat-prevention-named-emerging-favorite-in-capterra-shortlist-for-cybersecurity-software-2022/</loc>
		<lastmod>2024-05-07T11:55:47+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-11-04T142906.338.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/capterra2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/capterra.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/heimdal-high-performer-g2-fall-reports-2022/</loc>
		<lastmod>2024-05-07T11:56:07+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-93.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/heimdal-named-expert-insights-fall-2022-best-of-winner-in-four-categories/</loc>
		<lastmod>2024-05-07T11:56:26+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_4572340621-1-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/heimdal-threat-prevention-adds-new-feature/</loc>
		<lastmod>2024-05-07T11:57:03+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-92.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/heimdal-is-a-finalist-at-the-csa-2022-in-eight-categories/</loc>
		<lastmod>2024-05-07T11:57:28+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-45-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/heimdal-announces-expansion-and-new-office-opening-in-london-uk/</loc>
		<lastmod>2024-05-07T11:57:51+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Bianca-New-Office-1030x360-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-08-01T124343.950.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-2022-08-01T124544.100.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/heimdal-completes-soc-2-type-ii-and-isae-3000-examination/</loc>
		<lastmod>2024-05-07T11:58:12+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_2_5211093861.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/heimdal-security-featured-in-g2-summer-reports-niche-quadrant-2022/</loc>
		<lastmod>2024-05-07T11:58:43+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_4572340621-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-68.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/log4j-vulnerability/</loc>
		<lastmod>2024-05-07T11:59:18+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/imageedit_1_2419860253.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/heimdal-security-and-techni-team-announce-strategic-partnership/</loc>
		<lastmod>2024-05-07T11:59:44+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-24-5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/heimdal-typosquatting-domain/</loc>
		<lastmod>2024-05-07T12:00:01+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-1-35.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/heimdal-sumillion-cyberattack-prevention-webinar/</loc>
		<lastmod>2024-05-07T12:00:26+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-51.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/network-computing-awards-2021/</loc>
		<lastmod>2024-05-07T13:17:40+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-45.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/heimdal-ai-discovers-new-cryptocurrency-scam/</loc>
		<lastmod>2024-05-07T13:18:33+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-9-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/heimdal-protects-microsoft-exchange-server/</loc>
		<lastmod>2024-05-07T13:19:11+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Miriam-Microsoft-Exchange-Server-Exploit-1030x360.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/nsa-warns-doh-dns-security-approach/</loc>
		<lastmod>2024-05-07T13:19:27+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Miriam-DNS-Security-1030x360.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/heimdal-announcements-a-change-in-our-product-names/</loc>
		<lastmod>2024-05-07T13:19:51+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Miriam-Branding-1030x360.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/heimdal-security-announces-opening-of-its-second-office-in-the-uk/</loc>
		<lastmod>2024-05-07T13:27:58+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Bianca-New-Office-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Security-Leeds-Office.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/gangs-hiding-behind-multiple-domains-to-avoid-ttpc-detection/</loc>
		<lastmod>2024-05-07T13:29:03+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/VLADIMIR-TTPC-1030x360.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/heimdal-security-nominated-for-computing-security-awards-2019/</loc>
		<lastmod>2024-05-07T13:30:48+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Miriam-Award-1030x360-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Screenshot-32.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/heimdal-security-acquires-basicbytes-heimdal-privileged-access-management/</loc>
		<lastmod>2024-05-07T13:31:09+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Miriam-Thor-AdminPrivilege-1030x360-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/heimdal-threat-prevention-microsoft-azure-marketplace-appsource/</loc>
		<lastmod>2024-05-07T13:32:13+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/thor-foresight-enterprise-microsoft-azure-marketplace-appsource.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/endpoint-security-suite-best-anti-malware-solution-of-the-year/</loc>
		<lastmod>2024-05-07T13:32:31+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/thor-enterprise-best-anti-malware-solution-2018-computing-security-awards.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/nominated-for-anti-malware-solution-of-the-year/</loc>
		<lastmod>2024-05-07T13:32:54+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Nominated-for-Anti-Malware-Solution-of-the-Year.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/award-Blog_Banner@100x-100.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Security-Computing-Security-Awards.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/award-Blog_Banner@100x-100.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/introducing-our-new-security-products/</loc>
		<lastmod>2024-05-07T13:33:10+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Announcing-Heimdals-new-security-products-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/anti-ransomware-solution-of-the-year/</loc>
		<lastmod>2024-05-07T13:33:34+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Security-%E2%80%93-Nominated-for-Anti-Ransomware_3B3B48.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/vote-for-heimdal-security-anti-ransomware-solution-of-the-year-2017.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/heimdal-joins-no-more-ransom/</loc>
		<lastmod>2024-05-07T13:33:57+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hs-No-more-ransome_451B28.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/new-ransomware-families.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/20-xiaomi-vulnerabilities/</loc>
		<lastmod>2024-05-08T12:46:13+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/xiaomi-vulnerabilities.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/heimdal-launches-partner-nexus/</loc>
		<lastmod>2024-05-08T16:43:34+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Partner-NEXUS.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Launches-Partner-NEXUS.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Launches-Partner-NEXUS-Program.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/dell-data-breach/</loc>
		<lastmod>2024-05-10T21:09:16+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/NEW-Blog-Cover-42.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/dell-breach-notification.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/dell-database-sale-post.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-bandwidth-usage/</loc>
		<lastmod>2024-05-14T08:06:49+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-19-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/global-privacy-agencies-urge-social-media-to-protect-user-data-from-scraping/</loc>
		<lastmod>2024-05-14T08:08:52+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-4-51.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/ransomware-distribution/</loc>
		<lastmod>2024-05-16T07:41:29+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Vladimir-Ransomware-Network-1030x360.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/domain-hijacking-vs-dns-poisoning-do-you-know-the-difference/</loc>
		<lastmod>2024-05-16T15:02:56+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Domain-Hijacking-vs-DNS-Poisoning-Do-You-Know-the-Difference.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/libreoffice-one-click-vulnerability/</loc>
		<lastmod>2024-05-17T12:32:55+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/NEW-Blog-Cover-47.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/patch-management-free-demo-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/singing-river-health-system-ransomware-attack-affects-nearly-900000/</loc>
		<lastmod>2024-05-17T14:18:36+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Singing-River-Health-System-Ransomware-Attack-Affects-Nearly-900000.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Rhysida-ransomware-leak-dark-web.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/removing-admin-rights/</loc>
		<lastmod>2024-05-20T06:48:58+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/removing-admin-rights.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/pros-and-cons-of-local-admin-rights.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/list-of-products-heimdal-dashboard.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/how-to-remove-local-admin-rights-with-Heimdal%E2%84%A2-Privileged-and-Access-Management.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/critical-github-saml-auth-bypass-vulnerability/</loc>
		<lastmod>2024-05-22T11:31:06+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/NEW-Blog-Cover-49.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/heimdal-to-showcase-widest-cybersecurity-tech-stack-at-infosecurity-europe-2024/</loc>
		<lastmod>2024-05-23T12:12:12+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/1250-x-703-Blog-Cover-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/heimdal-things-to-do-at-infosecurity-europe-2024.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cloudreverser-malware-google-drive-dropbox/</loc>
		<lastmod>2024-05-24T14:24:30+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/CLOUDREVERSER.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/researchers-uncover-fake-antivirus-sites-spreading-malware/</loc>
		<lastmod>2024-05-28T17:01:29+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Researchers-Uncover-Fake-Antivirus-Sites-Spreading-Malware.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Avast-fake-website.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/sav-rx-data-breach/</loc>
		<lastmod>2024-05-29T13:39:30+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Sav-Rx-data-breach.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/ticketmaster-breach/</loc>
		<lastmod>2024-05-31T14:47:04+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/NEW-Blog-Cover-52.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/shinyhunters-ticketmaster-breach.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/hugging-face-spaces-platform-breached-authentication-tokens-stolen/</loc>
		<lastmod>2024-06-04T16:43:55+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/06/Hugging-Face-Spaces-Platform-Breached-Authentication-Tokens-Stolen-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/synnovis-ransomware-attack-impacts-nhs/</loc>
		<lastmod>2024-06-05T14:14:41+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/06/Synnovis-ransomware-attack-impacts-NHS.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/zyxel-patches-eol-nas-vulnerabilities/</loc>
		<lastmod>2024-06-05T15:06:40+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/06/zyxel-patches-eol-nas-vulnerabilities.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/06/zyxel-vulnerabilities-on-eol-nas.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/operation-endgame/</loc>
		<lastmod>2024-06-06T15:28:47+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/06/Operation-Endgame-The-Largest-Ever-Operation-Against-Botnets-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/06/Operation-Endgame-Seizure-Banner.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/lockbit-keys-recovered-by-the-fbi/</loc>
		<lastmod>2024-06-07T09:14:10+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/06/NEW-Blog-Cover-56.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/v3b-phishing-kit-affects-european-banks/</loc>
		<lastmod>2024-06-07T14:38:08+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/06/NEW-Blog-Cover-57.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/ransomware/</loc>
		<lastmod>2024-06-11T15:13:29+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/ransomware-explained-cover-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/nocry-ransomware-pop-up-ransom-message-stf.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/How-Ransomware-Works-Heimdal%E2%84%A2-Ilustration-.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/ransomware-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/ransomware-statistics-illustra.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cleveland-cyberattack/</loc>
		<lastmod>2024-06-12T12:12:13+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/06/cleveland-cyberattack.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/msmq-rce-vulnerability/</loc>
		<lastmod>2024-06-12T14:47:22+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/06/MSMQ-RCE-Vulnerability.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/access-as-a-service/</loc>
		<lastmod>2024-06-14T07:14:59+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-82-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Access-Broker.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/locky-ransomware-101/</loc>
		<lastmod>2024-06-14T15:02:23+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Miriam-Locky-Ransomware-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/pic-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/pic-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/jesper-frederiksen-new-ceo/</loc>
		<lastmod>2024-06-14T19:11:57+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Jesper-Frederiksen.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/a-comprehensive-guide-to-security-assertion-markup-language-saml/</loc>
		<lastmod>2024-06-14T19:25:22+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/A-Comprehensive-Guide-to-the-Security-Assertion-Markup-Language-SAML-cover.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/saml.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/adware-definition-removal/</loc>
		<lastmod>2024-06-14T19:29:33+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/hs-Adware-can-take-over-your-PC-with-commercials_A26378.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/adware-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/adware-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/adware-example.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/install-adware-toolbar.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/adware-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/adware-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/adware-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/adware-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/adware-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/adware-9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/adware-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/adware-11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/adware-12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/adware-13.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/adware-14.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/adware-15.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/adware-16.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/adware17.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/adware-18.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/adware-19.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/adware-20.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/adware-21.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/adware-22.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/linkedin-phishing-email.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/system-administrator-patch-management-challenges/</loc>
		<lastmod>2024-06-17T11:57:26+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/system-administrator-patch-management-challenges-2-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/patch-and-asset-management-solution.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/System-Administrator-Alex-Panait-on-patch-management-challenges.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/best-patch-management-software-5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/microsoft-365-onnx-phishing/</loc>
		<lastmod>2024-06-21T09:48:36+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/06/ONNX-Phishing-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cdk-group-cyberattacks/</loc>
		<lastmod>2024-06-21T13:29:40+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/06/NEW-Blog-Cover-61.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/grimresource-windows-xss-flaw/</loc>
		<lastmod>2024-06-26T13:10:58+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/06/grimsource.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/06/grimresource.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/lockbit-claims-breaching-federal-reserve/</loc>
		<lastmod>2024-06-26T17:49:19+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/06/lockbit-breaching-federal-reserve.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/06/lockbit-breaching-federal-reserve-claim.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/mxdr.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/heimdal-and-escom-bulgaria-partner-to-strengthen-cybersecurity-in-bulgaria/</loc>
		<lastmod>2024-06-27T12:34:42+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/06/Heimdal-and-Escom-Bulgaria-Partner-to-Strengthen-Cybersecurity-in-Bulgaria-blog-cover.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/06/Alexander_Zhekov_ESCOM_Bulgaria_Heimdal-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Launches-Partner-NEXUS.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/moveit-transfer-critical-vulnerability/</loc>
		<lastmod>2024-06-28T10:43:41+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/06/NEW-Blog-Cover-64.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/crypter-specialist-involved-in-the-conti-and-lockbit-attack-arrested/</loc>
		<lastmod>2024-06-28T12:46:05+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/06/Crypter-Specialist-Involved-in-the-Conti-and-LockBit-Attack-Arrested-min.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/product-release-heimdal-integrates-with-halopsa/</loc>
		<lastmod>2024-07-01T10:31:19+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/06/Cross-Product-Release_-Heimdal-Integrates-with-HaloPSA.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/1-14.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/1-14.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/regresshion-linux-vulnerability/</loc>
		<lastmod>2024-07-03T14:30:37+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/07/regresshion-linux-vulnerability.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/07/best-patch-management-software.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/healthequity-partner-data-breach/</loc>
		<lastmod>2024-07-05T15:06:48+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/07/NEW-Blog-Cover-67.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/dns-leak/</loc>
		<lastmod>2024-07-08T13:27:56+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2022/12/dns-leak.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2022/12/DNS-leak-diagram-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2022/12/DNS-filtering-solution.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2022/12/DNS-Security-Network.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/heimdal-4-2-3-production/</loc>
		<lastmod>2024-07-09T15:10:58+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/05/Blog-Dashboard-4.2.3.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/1-14.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/1-14.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-a-remote-access-trojan-rat/</loc>
		<lastmod>2024-07-09T15:32:24+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2021/03/hacker_typing_at_laptop-min.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2021/03/hacker_in_yellow_hoodie-min.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/blastradius-flaw/</loc>
		<lastmod>2024-07-10T15:16:00+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/07/blastradius-flaw.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/07/radius-attack-diagram.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-heimdal-halopsa-integration-boosts-efficiency-for-managed-service-providers/</loc>
		<lastmod>2024-07-11T17:48:35+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/07/New-Heimdal-HaloPSA-Integration-Boosts-Efficiency-for-Managed-Service-Providers.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/22-minutes-exploit-poc/</loc>
		<lastmod>2024-07-17T13:01:09+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/07/22-Minutes-Exploit-PoC.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/07/enforce-layered-defense.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/07/xdr-solution.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/att-data-breach-109-million-customers/</loc>
		<lastmod>2024-07-17T15:41:59+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/07/ATT-data-breach.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/07/att-data-breach-notification.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/zero-trust-implementation/</loc>
		<lastmod>2024-07-18T15:07:41+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/07/NEW-Blog-Cover-70.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/07/Call-to-action-button-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/07/Call-to-action-button-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/07/Call-to-action-button-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2023/09/Quote-3.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Unified-XDR-Platform-for-MSPs-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/dns-attack/</loc>
		<lastmod>2024-07-24T13:10:51+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2022/07/dns-attack.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2022/07/dns-attack-prevention.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2022/07/DNS-attacks-DoS-types.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2022/07/DNS-attacks-DDoS-types.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2022/07/DNS-attacks-Hijacking-types.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2022/07/dns-security-tool.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/servicenow-rce-flaws/</loc>
		<lastmod>2024-07-26T13:04:08+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/07/NEW-Blog-Cover-74.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/digicert-revokes-certificates/</loc>
		<lastmod>2024-07-31T11:10:44+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/07/digicert-revokes-certificates-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/sitting-ducks-dns-attacks/</loc>
		<lastmod>2024-08-02T14:00:56+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/08/NEW-Blog-Cover3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/raas-sharprhino-rat/</loc>
		<lastmod>2024-08-07T15:07:12+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/08/sharprhino-rat.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/adt-breached-customer-data-leaked-online/</loc>
		<lastmod>2024-08-09T12:53:49+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/08/NEW-Blog-Cover7.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/0-0-0-0-day-vulnerability-exploited/</loc>
		<lastmod>2024-08-09T15:03:42+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/08/NEW-Blog-Cover9.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/heimdal-and-virosafe-partner-to-strengthen-nordic-cybersecurity/</loc>
		<lastmod>2024-08-20T09:14:05+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/08/Blog-Cover-Heimdal-and-ViroSafe-Partner-to-Strengthen-Nordic-Cybersecurity.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Launches-Partner-NEXUS.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/advanced-endpoint-protection/</loc>
		<lastmod>2024-08-26T14:11:45+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Advanced-Endpoint-Protection.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/parkn-fly-data-breach/</loc>
		<lastmod>2024-08-28T09:09:14+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/08/parknfly-data-breach-.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/windows-endpoint-security-ecosystem-summit/</loc>
		<lastmod>2024-08-28T15:02:17+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/08/Windows-Endpoint-Security-Ecosystem-Summit.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/supply-chain-attack/</loc>
		<lastmod>2024-08-29T10:29:44+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Bianca-Vendor-1030x360.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/ransomhub-fbi-advisory/</loc>
		<lastmod>2024-08-30T14:25:44+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/08/NEW-Blog-Cover5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/04/Call-to-action-button-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/tfl-cyberattack/</loc>
		<lastmod>2024-09-04T11:07:55+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/09/tfl-cyberattack.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/09/transport-for-london-cyberattack-statement.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/09/tfl-cyberattack-email-to-customers.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/09/tfl-cyberattack-response.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/09/xdr-solution.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/zyxel-vulnerability-os-command-injection/</loc>
		<lastmod>2024-09-04T15:35:28+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/09/zyxel-vulnerability-os-command-injection.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/09/zyxel-vulnerability-os-command-injection-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/09/close-zyxel-vulnerabilities-faster.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/russian-threat-actors-target-critical-infrastructure-in-the-us-and-across-the-world/</loc>
		<lastmod>2024-09-06T10:39:06+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/09/NEW-Blog-Cover14.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/microchip-cyberattack/</loc>
		<lastmod>2024-09-06T12:29:29+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/08/microchip-cyberattack-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/08/microchip-cyberattack.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/microchip-technology-cyberattack/</loc>
		<lastmod>2024-09-06T13:14:03+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/09/NEW-Blog-Cover15.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/slim-cd-data/</loc>
		<lastmod>2024-09-11T10:10:11+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/09/slim-cd-data-breach-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/09/slim-cd-data-breach.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/08/heimdal-XDR-solution-1-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/dns-filtering/</loc>
		<lastmod>2024-09-11T15:05:38+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2022/09/dns-filtering.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2022/09/dns-filtering-solution-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2022/09/DNS-filtering-benefits.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2023/10/dns-security-against-dns-cache-poisoning-attacks.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/windows-mshtml-platform-spoofing-vulnerability/</loc>
		<lastmod>2024-09-18T14:19:58+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/09/Windows-MSHTML-Platform-Spoofing-Vulnerability-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/09/patch-windows-vulnerabilities-faster.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/09/Windows-MSHTML-Platform-Spoofing-Vulnerability.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/kaspersky-installs-ultraav/</loc>
		<lastmod>2024-09-25T12:37:40+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/09/kaspersky-installs-ultraAV.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/09/kaspersky-installing-ultraav-notice.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/09/kaspersky-installs-ultraav-user-reactions.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/09/ultraav-pango-group.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cyberattack-kansas-water-plant/</loc>
		<lastmod>2024-09-25T14:37:39+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/09/Cyberattack-Kansas-Water-Plant.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/09/incident-response-template-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/mxdr.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/heimdal-and-emt-distribution-aim-to-dominate-the-middle-east-cybersecurity-market/</loc>
		<lastmod>2024-09-30T07:29:10+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/09/Heimdal-and-emt-Distribution-Aim-to-Dominate-the-Middle-East-Cybersecurity-Market.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/windows-update-kb5043145/</loc>
		<lastmod>2024-10-02T10:30:25+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/10/Windows-update-KB5043145.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/10/free-patch-management-templates.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/ransomware-attack-umc-health/</loc>
		<lastmod>2024-10-02T14:40:38+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/10/Ransomware-Attack-Disrupts-UMC-Health.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cups-vulnerability/</loc>
		<lastmod>2024-10-04T14:20:27+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/10/NEW-Blog-Cover8-min.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/patch-and-asset-management-solution.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/superuser-accounts/</loc>
		<lastmod>2024-10-08T12:08:59+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Vladimir-Superuser-1030x360.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/westrock-ransomware-attack/</loc>
		<lastmod>2024-10-08T12:32:11+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-16-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/westrock-january-press-release.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/1996871-16158862175021274.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-privilege-creep-and-how-to-prevent-it/</loc>
		<lastmod>2024-10-08T14:31:39+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Untitled-design-7-27.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/09/11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/07/Call-to-action-button-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/09/Privileged-Account-and-Session-Management-PASM-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/heimdalpam1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/cta-heimdal-request-a-demo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/what-is-endpoint-privilege-management/</loc>
		<lastmod>2024-10-17T11:39:15+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/MicrosoftTeams-image-16-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Endpoint-Privilege-Management.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/access-review/</loc>
		<lastmod>2024-10-17T11:39:22+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/NEW-Blog-Cover-9.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/microsoft-customer-security-logs/</loc>
		<lastmod>2024-10-18T15:03:29+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/10/NEW-Blog-Cover39.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/manage-xdr-alerts-heimdal/</loc>
		<lastmod>2024-10-24T12:15:10+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/08/Adelina-How-to-Manage-Alert-Fatigue-with-Heimdal-XDR-min.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/alert-monitoring-view.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-XDR-request-a-demo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/visualize-globe-tac-portal-heimdal-product.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-XDR-Agent-TLS-Communication-with-Heimdal-XDR-Dashboard.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Agent-TPN-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-TPN-VectorN-view-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Agent-TPN-TTPC-view-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Agent-TPE-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Agent-TPE-Next-Gen-AV-view-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Antivirus.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Agent-REP-view.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-REP-diagram.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-XDR-request-a-demo-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/XDR-Dashboard-No-Background-Front-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Threat-Prevention-Network-View.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Threat-Prevention-Network-Detailed-View.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Intercepted-Logs.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-block-page.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Threat-Prevention-Endpoint-View.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Hostname-view.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Block-by-Category.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Threat-Prevention-%E2%80%93-VectorN-Detection-view-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-VectorN-Endpoint.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-VectorN-Network.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Endpoint-Detection-Next-Gen-Antivirus-MDM-view.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Zero-Trust-Execution-Protection.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Endpoint-Detection-Extended-Threat-Protection-XTP-Standard-view.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Endpoint-Detection-Extended-Threat-Protection-XTP-Raw-view.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Next-Gen-Antivirus-with-XTP.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Endpoint-Detection-Firewall-Alerts-view.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Latest-Detections-view.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Latest-Detections-view-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Process-Details-view.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Network-Activity-view.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Heimdal-Awards.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/dns-iocs-red-flags-cyberattacks/</loc>
		<lastmod>2024-10-24T15:09:19+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2023/09/Livia-5-Examples-of-DNS-IoCs-That-Are-Red-Flags-for-Cyberattacks.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/DNS-IoCs-examples.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/unitedhealth-change-healthcare-data-breach/</loc>
		<lastmod>2024-10-25T13:03:56+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/10/NEW-Blog-Cover40.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/new-qilin-ransomware-variant/</loc>
		<lastmod>2024-10-25T14:02:02+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/10/NEW-Blog-Cover9-min.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cyberpanel-psaux-ransomware/</loc>
		<lastmod>2024-10-30T10:36:39+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/10/cyberpanel-psaux-ransomware.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/01/28.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/zero-trust-security/</loc>
		<lastmod>2024-10-30T16:12:53+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/zero-trust-security-cover-image-.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/zero-trust-execution-protection-from-Heimdal-dashboard.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/modern-patch-management-stress-free-it-security/</loc>
		<lastmod>2024-10-31T14:44:12+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/09/NEW-Blog-Cover35.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/09/Have-you-ever-been-stressed-by-the-patch-management-process_-min.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/09/The-Flaws-in-Traditional-Patch-Management-min.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/09/Call-to-action-button9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/09/Call-to-action-button10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/09/GOOD-PATCH-MANAGEMENT-IS.-min.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2023/02/Patch-Asset-Management-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/patch-and-asset-management-solution.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/microsoft-warning-midnight-blizzard-spear-phishing-rdp/</loc>
		<lastmod>2024-11-01T13:14:17+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/11/NEW-Blog-Cover41.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/07/Call-to-action-button-8.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/microsoft-chinese-threat-actors-botnet-credential-theft/</loc>
		<lastmod>2024-11-01T15:54:54+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/11/NEW-Blog-Cover42.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/cyber-insurance/</loc>
		<lastmod>2024-11-04T16:09:18+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Bianca-Cyber-Insurance-1030x360.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/spiceworks-cyber-insurance-study.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/spiceworks-cyber-insurance-study2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/privileged-account-and-session-management-pasm/</loc>
		<lastmod>2024-11-05T14:09:35+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/What-Is-Privileged-Account-and-Session-Management-PASM_.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/PASM-Architecture-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/principle-of-least-privilege/</loc>
		<lastmod>2024-11-05T14:34:34+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Blog-Cover-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/09/13.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/01/Call-to-action-button14.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/01/Windows-Patch-Management-Best-Practices.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/01/Windows-Patch-Management-Best-Practices1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/heimdalpam2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/Call-to-action-button-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/schneider-electric-investigates-cybersecurity-incident/</loc>
		<lastmod>2024-11-05T23:24:22+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/11/Cyberattack-on-Schneider-Electric-125000-in-Baguettes-Request.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/11/Schneider-Electric-Grep-Bleeping-Computer.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://heimdalsecurity.com/blog/interlock-ransomware-freebsd-servers/</loc>
		<lastmod>2024-11-06T15:18:54+00:00</lastmod>
		<image:image>
			<image:loc>https://heimdalsecurity.com/blog/wp-content/uploads/2024/11/interlock-ransomware-freebsd-servers.jpg</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->